Security

New CPU vulnerability extends to virtual machine environments

In the area of cloud computing—on-demand access to IT resources via the internet—so-called trusted execution environments (TEEs) play a major role. They are designed to ensure that the data on the virtual work environments ...

Computer Sciences

Toward affective computing that works for everyone

Diversity and inclusion are critical aspects of the responsible development of artificial intelligence (AI) technologies, including affective computing. Affective computing, which focuses on recognizing, interpreting, and ...

Security

Research offers novel approach for combating phishing attacks

Research in the International Journal of Electronic Security and Digital Forensics offers a new approach to combating phishing attacks in order to enhance online security and reduce cybercrime against individuals and businesses ...

Security

Researchers discover new vulnerability in large language models

Large language models (LLMs) use deep-learning techniques to process and generate human-like text. The models train on vast amounts of data from books, articles, websites and other sources to generate responses, translate ...

page 3 from 17