Software

New tool detects unsafe security practices in Android apps

Computer scientists at Columbia Engineering have shown for the first time that it is possible to analyze how thousands of Android apps use cryptography without needing to have the apps' actual codes. The team's new tool, ...

Software

New method enables automated protections for sensitive data

Just as people need to protect their sensitive data, such as social security numbers, manufacturing companies need to protect their sensitive corporate data. There are currently fewer protections for proprietary manufacturing ...

Security

Crowdsourcing challenge to de-identify public safety data sets

The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has launched a crowdsourcing challenge to spur new methods to ensure that important public safety data sets can be de-identified to protect ...

Security

Popular messenger services are extremely insecure

Researchers from the Technical University of Darmstadt and the University of W├╝rzburg show that popular mobile messengers expose personal data via discovery services that allow users to find contacts based on phone numbers ...

Security

Helping companies prioritize their cybersecurity investments

One reason that cyberattacks have continued to grow in recent years is that we never actually learn all that much about how they happen. Companies fear that reporting attacks will tarnish their public image, and even those ...

page 1 from 5