UW security researchers have created ShareAR, a toolkit that lets developers build collaborative and interactive features into AR apps without sacrificing their users' privacy and security.
According to Adar Ovadya, a master's student in BGU's Department of Software and Information Systems Engineering, 'all of the routers we surveyed regardless of brand or price point were vulnerable to at least some cross-network communication once we used specially crafted network packets. A hardware-based solution seems to be the safest approach to guaranteeing isolation between secure and non-secure network devices.'
You likely know to avoid suspicious emails to keep hackers from gleaning personal information from your computer. But a new study from SMU (Southern Methodist University) suggests that it's possible to access your information in a much subtler way: by using a nearby smart phone to intercept the sound of your typing.
A team of computer scientists at UC San Diego and the University of Illinois has developed an app that allows state and federal inspectors to detect devices that steal consumer credit and debit card data at gas pumps. The devices, known as skimmers, use Bluetooth to transmit the data they steal.
Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don't even know exists.
Cybersecurity researchers at Tel Aviv University and the Technion Institute of Technology have discovered critical vulnerabilities in the Siemens S7 Simatic programmable logic controller (PLC), one of the world's most secure PLCs, which are used to run industrial processes.
Just over 15 years after the first reported incident of phishing, new research from the University of Plymouth suggests tech companies could be doing more to protect users from the threat of scams. However, greater awareness of the issue is also needed among individuals and organisations.
Current methods for anonymizing data leave individuals at risk of being re-identified, according to new research from University of Louvain (UCLouvain) and Imperial College London.
Research led by the University of California, Riverside has developed a deep neural network architecture that can identify manipulated images at the pixel level with high precision by studying the boundaries of objects in the image.
DGIST made a small AESA radar system with a super-resolution algorithm. It is expected to make huge contributions to strengthening of Korean industries and defense capabilities with domestic technology.