-
'Over-the-horizon' vision technology tested using high-altitude balloons and dronesThe U.S. Naval Research Laboratory in conjunction with the Marine Corps Expeditionary Energy Office (E2O); the Operational Energy Capability Improvement Fund with the Office of the Assistant Secretary of Defense for Energy, Installations, and Environment; Aerostar; and Lockheed Martin conducted a technical demonstration held at Outlying Landing Field Seagle in... Read more
-
Study examines whether policy intervention could combat ransomwareAs ransomware attacks become more common and complex—and costly to the crimes' targets—a University of Texas at Dallas researcher is examining how policymakers might combat cybercriminals.... Read more
-
Login system helps spot online hacks without sacrificing privacyA new system developed by Cornell Tech researchers helps users detect when their online accounts have been compromised—without exposing their personal devices to invasive tracking by web services.... Read more
-
Contrastive learning framework can detect blockchain-based smart Ponzi schemesBlockchain technologies are digital systems that work by distributing copies of information across several computers, also referred to as nodes, all of which are connected to a common network. These technologies underpin the trading of cryptocurrencies, as well as the functioning of other emerging digital services.... Read more
-
Researchers uncover hidden risks of passkeys in abusive relationshipsA new study reveals that passkeys—widely promoted as a safer login method compared with passwords—may unintentionally expose users to serious risks in situations involving interpersonal abuse. The research introduces the first framework for analyzing how digital authentication tools can be exploited in contexts such as intimate partner violence, elder abuse... Read more
-
Ultra-fast random numbers: New generator boosts security and speedIn computer security, random numbers are crucial values that must be unpredictable—such as secret keys or initialization vectors (IVs)—forming the foundation of security systems. To achieve this, deterministic random bit generators (DRBGs) are used, which produce numbers that appear random. However, existing DRBGs had limitations in both security (unpredictability against... Read more
-
Unique fingerprints in 3D printing may foil adversaries3D printing is a simple way to create custom tools, replacement pieces and other helpful objects, but it is also being used to create untraceable firearms, such as ghost guns, like the one implicated in the late 2024 killing of UnitedHealthcare CEO Brian Thompson.... Read more
-
Hijacked satellites and orbiting space weapons: In the 21st century, space is the new battlefieldAs Russia held its Victory Day parade this year, hackers backing the Kremlin hijacked an orbiting satellite that provides television service to Ukraine.... Read more
-
Sibling and friend game time key to keeping children safe in online video games, say researchersOlder siblings and friends may play important, and sometimes overlooked, roles in helping parents keep their children safe on online gaming platforms like Roblox and Minecraft, according to new research led by Penn State.... Read more
-
Study finds that school-based online surveillance companies monitor students 24/7A recent study by researchers at the University of California San Diego is the first detailed assessment of companies offering school-based online surveillance services such as social media monitoring, student communications monitoring and online activity monitoring to middle and high schools. Schools pay for the services directly or may request... Read more
-
AI Chatbots can be exploited to extract more personal information, study indicatesAI chatbots that provide human-like interactions are used by millions of people every day, however new research has revealed that they can be easily manipulated to encourage users to reveal even more personal information.... Read more
-
One tiny flip can open a dangerous back door in AIA self-driving motor vehicle is cruising along, its numerous sensors and cameras telling it when to brake, change lanes, and make turns. The vehicle approaches a stop sign at a high rate of speed, but instead of stopping, it barrels through, causing an accident. The problem will probably never be... Read more
-
'Lightweight cryptography' standard to protect small devices finalizedIt's the little things that matter most, as the saying goes, and the National Institute of Standards and Technology (NIST) has got their back. NIST's newly finalized lightweight cryptography standard provides a defense from cyberattacks for even the smallest of networked electronic devices.... Read more
-
How poisoned data can trick AI, and how to stop itImagine a busy train station. Cameras monitor everything, from how clean the platforms are to whether a docking bay is empty or occupied. These cameras feed into an AI system that helps manage station operations and sends signals to incoming trains, letting them know when they can enter the station.... Read more
-
Passwords under threat as tech giants seek tougher securityFingerprints, access keys and facial recognition are putting a new squeeze on passwords as the traditional computer security method -- but also running into public hesitancy.... Read more