A University at Buffalo-led team of researchers has discovered how to identify smartphones by examining just one photo taken by the device. The advancement opens the possibility of using smartphones -- instead of body parts -- as a form of identification to deter cybercrime.
An international team of researchers, affiliated with South Korea's Ulsan National Institute of Science and Technology (UNIST) has presented a core technology for quantum photonic devices used in quantum information processing. Their work has been published in the November issue of the prestigious journal, Nano Letters.
Computer scientists have built and successfully tested a tool designed to detect when websites are hacked by monitoring the activity of email accounts associated with them. The researchers were surprised to find that almost 1 percent of the websites they tested had suffered a data breach during their 18-month study period, regardless of how big the companies' reach and audience are.
In several recent papers, researchers from MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) and the Qatar Computing Research Institute have used a recently developed interpretive technique, which had been applied in other areas, to analyze neural networks trained to do machine translation and speech recognition.
A quantum information scientist from the National University of Singapore has developed efficient 'toolboxes' comprising theoretical tools and protocols for quantifying the security of high-speed quantum communication.
Biology and biotechnology have entered a digital age, but security policies around such activities have not kept pace. That's according to Colorado State University's Jean Peccoud, Abell Chair of Synthetic Biology and professor in the Department of Chemical and Biological Engineering. Peccoud is lead author on a new paper in Trends in Biotechnology, urging awareness of "cyberbiosecurity" risks for researchers, government and industry.
Researchers from the University of Birmingham have developed a tool to perform semi-automated security testing of mobile phone apps. After running the tool on a sample of 400 security critical apps, they were able to identify a critical vulnerability in banking apps; including apps from HSBC, NatWest, Co-op and Bank of America Health.
The next generation of electronic hardware security may be at hand as researchers at NYU Tandon School of Engineering introduce a new class of unclonable cybersecurity security primitives made of a low-cost nanomaterial with the highest possible level of structural randomness. Randomness is highly desirable for constructing the security primitives that encrypt and thereby secure computer hardware and data physically, rather than by programming.
Quantum encryption may be one step closer to wide-scale use thanks to a new system developed by scientists at Duke University, The Ohio State University and Oak Ridge National Laboratory. Their system is capable of distributing encryption codes at megabit-per-second rates, five to 10 times faster than existing methods and on par with current internet speeds when running several systems in parallel. New theory shows that the technique is secure from common security attacks.
Skilful voice impersonators are able to fool state-of-the-art speaker recognition systems, as these systems generally aren't efficient yet in recognising voice modifications, according to new research from the University of Eastern Finland. The vulnerability of speaker recognition systems poses significant security concerns.