A new CU Boulder study shows that Facebook ads developed and shared by Russian trolls around the 2016 election were clicked on nine times more than typical social media ads. The authors say the trolls are likely at it again, as the 2020 election approaches and the COVID-19 pandemic wears on.
Researchers at the University of York have shown that some commercial password managers may not be a watertight way to ensure cyber security. After creating a malicious app to impersonate a legitimate Google app, they were able to fool two out of five of the password managers they tested into giving away a password.
A German-American team of IT security researchers has investigated how users choose the PIN for their mobile phones and how they can be convinced to use a more secure number combination. They found that six-digit PINs actually provide little more security than four-digit ones. They also showed that the blacklist used by Apple to prevent particularly frequent PINs could be optimised and that it would make even greater sense to implement one on Android devices.
In recent years, organizations have experienced countless DDoS attacks, during which internet-connected devices are flooded with traffic -- often generated by many computers or phones called 'bots' that are infected by malware by a hacker and act in concert with each other. When an attacker ties up all the available connections with malicious traffic, no legitimate information -- like calling 911 in a real emergency -- can make it through.
Computer scientists at KU Leuven have once again exposed a security flaw in Intel processors. Jo Van Bulck, Frank Piessens, and their colleagues in Austria, the United States, and Australia gave the manufacturer one year's time to fix the problem.
Researchers at the Army's corporate laboratory in collaboration with the University of California, Riverside have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies.
Whether it's coronavirus or misinformation, scientists can use mathematical models to predict how something will spread across populations. But what happens if a pathogen mutates, or information becomes modified, changing the speed at which it spreads? In a new study appearing in the Proceedings of the National Academy of Sciences, a team of Carnegie Mellon University researchers show for the first time how important these considerations are.
Tracking communication and movement in this hyperconnected world can seem overwhelming. People (and things) share information through countless platforms. Networks online and off both impact how people live their lives and interact with their surroundings. Scientists will present their findings on the dynamics and structure of communication at the 2020 American Physical Society March Meeting.
Using ultrasound waves propagating through a solid surface, researchers at Washington University in St. Louis were able to read text messages and make fraudulent calls on a cellphone sitting on a desk up to 30 feet away.
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers' tactics. The information is then used to train the computer to recognize and stop future attacks.