Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points.
As governments try to mitigate the spread of COVID-19, many are turning to contact tracing, including apps that track your location and electronic check-in QR codes. But with that technology come questions of personal safety, privacy, trust, control and collective action. Katina Michael is an expert in public interest technology. She will share the challenges of deploying these types of services and ways to improve them.
Systems designed to detect deepfakes --videos that manipulate real-life footage via artificial intelligence--can be deceived, computer scientists showed for the first time at the WACV 2021 conference which took place online Jan. 5 to 9, 2021. Researchers showed detectors can be defeated by inserting inputs called adversarial examples into every video frame. The adversarial examples are slightly manipulated inputs which cause artificial intelligence systems such as machine learning models to make a mistake.
Most zoombombing incidents are "inside jobs" according to a new study featuring researchers at Binghamton University, State University of New York.
Super-fast quantum computers and communication devices could revolutionize countless aspects of our lives -- but first, researchers need a fast, efficient source of the entangled pairs of photons such systems use to transmit and manipulate information. Researchers at Stevens Institute of Technology have done just that, not only creating a chip-based photon source 100 times more efficient that previously possible, but bringing massive quantum device integration within reach.
Researchers at the University of Portsmouth and Solent University explored moral injury amongst child exploitation investigators and interviewed police officers from two Constabularies during a year-long study. The CREST (Centre for Research and Evidence on Security Threats) funded project asked questions relating to motivations for beginning the role, any personality changes, prior trauma, difficulties relating to their current role, coping mechanisms, moral decision making and use of professional support.
The multilateral nature of cybersecurity today makes it markedly different than conventional security, according to a study co-authored by Alexander Wolitzky of MIT. The researchers' new model shows why countries that retaliate too much against online attacks can make things worse for themselves.
Purdue University engineers propose a built-in security measure that would better protect computer chip hardware from hackers
Researchers have developed the first technology capable of sending digital information, such as a photo or password, by touching a surface with your finger.
The researchers found that accessibility and automation of the synthetic gene engineering workflow, combined with insufficient cybersecurity controls, allow malware to interfere with biological processes within the victim's lab, closing the loop with the possibility of an exploit written into a DNA molecule.