How Uncertainty in the Bitcoin Market Responds to Cyberattacks
A University of Vaasa researcher, Klaus Grobys, investigates how the uncertainty in the Bitcoin market reacts if Bitcoin is subject to hacking incidents – or…
A University of Vaasa researcher, Klaus Grobys, investigates how the uncertainty in the Bitcoin market reacts if Bitcoin is subject to hacking incidents – or…
Systems designed to detect deepfakes — videos that manipulate real-life footage via artificial intelligence — can be deceived, computer scientists showed for the first time…
New model shows why countries that retaliate too much against online attacks make things worse for themselves. During the opening ceremonies of the 2018 Winter…
An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion University of…
Researchers hacked a robotic vacuum cleaner to record speech and music remotely. A team of researchers demonstrated that popular robotic household vacuum cleaners can be…
WhatsApp, Signal & Co: Billions of users vulnerable to privacy attacks. Researchers from the Technical University of Darmstadt and the University of Würzburg show that…
A new tool to protect yourself against facial recognition software designed by University of Chicago researchers. The rapid rise of facial recognition systems has placed…
Wits Researchers have demonstrated a new quantum approach for sharing a secret amongst many parties, setting a new record for the highest dimensions and parties…
A research team led by Princeton University has developed a technique for tracking online foreign misinformation campaigns in real-time, which could help mitigate outside interference…
This method exposes fake images created by computer algorithms rather than by humans. They look deceptively real, but they are made by computers: so-called deep-fake…
An international study has used data from a major home Internet Protocol (IP) security camera provider to evaluate potential privacy risks for users. IP home…
Chaos could help put cyberhackers out of business with a patterned silicon chip that will be uncrackable even in the future. Confidential data—including credit card…
Researchers from University of Pennsylvania published a new paper in the Journal of Marketing that explains that the device people use to communicate can affect the extent…
Quantum computers that are exponentially faster than any of our current classical computers and are capable of code-breaking applications could be available in 12 to…
To deter attempts to disable U.S. electrical utilities and to defend U.S. nuclear weapon systems from evolving technological threats, Sandia National Laboratories has begun two…
Researchers use ultrasound waves vibrating through tables to access cellphones. Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone…
Does the common stereotype for “organized crime” hold up for organizations of hackers? Research from Michigan State University is one of the first to identify…
Researchers from Ben-Gurion University of the Negev’s (BGU) Cyber Security Research Center have found that they can cause the autopilot on an autonomous vehicle to…