Software

Boosting faith in the authenticity of open source software

Open source software—software that is freely distributed, along with its source code, so that copies, additions, or modifications can be readily made —is "everywhere," to quote the 2023 Open Source Security and Risk Analysis ...

Software

Researchers break Apple's new MacBook pro weeks after release

A Georgia Tech researcher has successfully evaded security measures on Apple's latest MacBook Pro with the M3 processor chip to capture his fictional target's Facebook password and second-factor authentication text.

Security

New CPU vulnerability extends to virtual machine environments

In the area of cloud computing—on-demand access to IT resources via the internet—so-called trusted execution environments (TEEs) play a major role. They are designed to ensure that the data on the virtual work environments ...

Computer Sciences

Toward affective computing that works for everyone

Diversity and inclusion are critical aspects of the responsible development of artificial intelligence (AI) technologies, including affective computing. Affective computing, which focuses on recognizing, interpreting, and ...

Security

Research offers novel approach for combating phishing attacks

Research in the International Journal of Electronic Security and Digital Forensics offers a new approach to combating phishing attacks in order to enhance online security and reduce cybercrime against individuals and businesses ...

page 2 from 16