New University of Washington research finds that for a budget of roughly $1,000, it is possible for someone to track your location and app use by purchasing and targeting mobile ads. The team hopes to raise industry awareness about the potential privacy threat.
Failure to make necessary upgrades to software code can have dire consequences, such as the major data breach at Equifax. A recent study finds that auto-fix tools are effective ways to get programmers to make the relevant upgrades - if programmers opt to use them.
A method developed by Oak Ridge National Laboratory could protect connected and autonomous vehicles from possible network intrusion. A new ORNL technique makes ultrafast measurements using atomic force microscopy.
Researchers have developed a solution to a longstanding problem in the field of end-to-end encryption, a technique that ensures that only sender and recipient can read a message.
Computerised face recognition is an important part of initiatives to develop security systems, in building social networks, in curating photographs, and many other applications. Systems that allow a computer to estimate with precision a person's age based on an analysis of their face are discussed in the International Journal of Applied Pattern Recognition.
Forget fingerprint computer identification or retinal scanning. A University at Buffalo-led team has developed a computer security system using the dimensions of your heart as your identifier. The system uses low-level Doppler radar to measure your heart, and then continually monitors your heart to make sure no one else has stepped in to run your computer. The technology will be presented next month at the 23rd MobiCom conference.
Mathematicians have opened a new chapter in the theory of moonshine, one which begins to harness the power of the pariahs -- sporadic simple groups that previously had no known application.
MSU biometric expert Anil Jain and doctoral student Joshua Engelsma have for the first time designed and created a fake finger containing multiple key properties of human skin. Commonly called a spoof, this fake finger has been used to test two of the predominant types of fingerprint readers to help determine their resilience to spoof attacks.
A new study from the US Army Research Laboratory presents evidence that the number of cyber intrusions can be predicted, particularly when analysts are already observing activities on a company or government organization's computer network.
The cyber team led by Dr. Mordechai Guri, head of research and development for BGU's Cyber Security Research Center (CSRC), shows how IR can be used to create a covert communication channel between malware installed on an internal computer network and an attacker located hundreds of yards outside or even miles away with direct line of sight. The attacker can use this channel to send commands and receive response messages.