Hi Tech & Innovation

A three-stage authentication system for the metaverse

In recent years, many computer scientists have been exploring the notion of metaverse, an online space in which users can access different virtual environments and immersive experiences, using VR and AR headsets. While navigating ...

Security

A model to classify cyberattacks using swarm intelligence

In recent years, new technological advances have led to a growing number of devices, ranging from more conventional computers to other gadgets and smart home appliances, communicating and sharing data with one another. Despite ...

Computer Sciences

How randomly moving electrons can improve cyber security

In October 2017, tech giant Yahoo! disclosed a data breach that had leaked sensitive information of over 3 billion user accounts, exposing them to identity theft. The company had to force all affected users to change passwords ...

Software

Mouse movements reveal your behavior

In two recently published research papers, computer scientists from the University of Luxembourg and international partners show how mouse movements can be used to gain additional knowledge about the user behavior. While ...

Internet

Unsecured database exposes 76,000 fingerprints

A security firm handling employee fingerprint identification for companies worldwide has exposed more than 2 million bits of data, including 76,000 fingerprints, according to a cyberthreat research group.

page 1 from 10