Alexa, Disarm the Victim's Home Security System

Researchers from the University of Michigan and The University of Electro-Communications (Tokyo) who last year hacked popular voice assistants with laser pointers take their work to the next level.

Researchers Scan for Supply-Side Threats in Open Source

A recent project to scan the main Python repository's 268,000 packages found only a few potentially malicious programs, but work earlier this year uncovered hundreds of instances of malware.

Blockchain voting risks undetectable nation-scale failures: MIT researchers

Claims that "voting on the blockchain" would increase election security have been found wanting and even dubbed "misleading" by researchers from the Massachusetts Institute of Technology (MIT).

Researchers claim to perform Radio Frequency fingerprinting of aircraft ADS-B transmitters

In a paper titled “Real-World ADS-B signal recognition based on Radio Frequency Fingerprinting,” three Chinese researchers describe a method of identifying unique transmitters fitted to aircraft.

Researchers Demonstrate ‘Triggerless’ Backdoors That Can Infect Machine Learning Models

Malicious actors can cause AI systems to act erratically without using visible ‘triggers’, researchers at the Germany-based CISPA Helmholtz Center for Information Security have found.

Researchers Break the Encryption Used to Secure Intel CPU Code

Researchers extracted the secret key that encrypts updates to an assortment of Intel CPUs, a feat that could have wide-ranging consequences for the way the chips are used and the way they’re secured.

Microsoft develops new machine learning model to detect password spray attacks

Microsoft has developed a new machine learning-based algorithm that detects password spray attacks with considerably improved performance than its previous heuristic mechanism.

Neural Networks Help Users Pick More-Secure Passwords

Neural networks trained to learn approaches to brute-force password guessing can be used to enforce minimal password security without resorting to large blocklists and cumbersome combinations.

Researchers open the door to new distribution methods for secret cryptographic keys

The latest research opens the door to new methods of distributing secret cryptographic keys – used to encrypt and decrypt data, ensure secure communication, and protect private information.

Next-gen Airborne Collision Avoidance System just as vulnerable to spoofing as its predecessor

Researchers at the UK's University of Oxford and Switzerland's Federal Office for Defence Procurement found that the critical aviation system can be manipulated to produce fake collision alerts.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags