A team of researchers from Clemson University, Columbia University and the University of Washington has discovered a security success in an unlikely place: the 'Panama Papers.' "Success stories in computer security are rare,'" said Franzi Roesner, assistant professor at the University of Washington and one of the principal investigators on this project. "But we discovered that the journalists involved in the Panama Papers project seem to have achieved their security goals."
A UC Berkeley PhD candidate has developed the first automated techniques to identify adult ads tied to human trafficking rings by linking the ads to public information from Bitcoin -- the primary payment method for online sex ads.
Researchers at the University of Washington have demonstrated how it is possible to transform a smart device into a surveillance tool that can collect information about the body position and movements of the user, as well as other people in the device's immediate vicinity.
Electricity distribution systems in the USA are gradually being modernized and transposed to smart grids, which make use of two-way communication and computer processing. This is making them increasingly vulnerable to cyber attacks. In a recent paper in Elsevier's International Journal of Critical Infrastructure Protection, Dr. Sujeet Shenoi and his colleagues from the Tandy School of Computer Science, University of Tulsa, US, have analyzed these security issues.
Researchers have developed a three-layer system to verify that components produced using additive manufacturing have not been compromised by malicious activity or quality issues.
With cyberattacks on 3-D printers likely to threaten health and safety, researchers at Rutgers University-New Brunswick and Georgia Institute of Technology have developed novel methods to combat them, according to a groundbreaking study.
Researchers have learned that most users of popular messaging apps are leaving themselves exposed to hacking and fraud because they aren't using important security options.
USB connections, the most common interface used globally to connect external devices to computers, are vulnerable to information 'leakage,' making them even less secure than has been thought, Australian research has shown.
A new study analyzing the security hygiene of common, open-source DNA processing programs finds evidence of poor computer security practices used throughout the field. In a scientific first, the UW team also demonstrated it is possible to compromise a computer system with a malicious computer code stored in synthetic DNA.
Understanding a cybercriminal's backstory - where they live, what they do and who they know, is key to cracking cybercrime, new research suggests. Online crime is of course online, but there is also a surprisingly strong offline and local dimension. Cybercriminals are often seen as faceless, international, computer masterminds, who are almost impossible to identify or understand as a result. But, according to new Oxford University research, contextualising their threat and motivations is key to stopping them.