User data privacy decisions can be easily manipulated

Research from Copenhagen Business School finds designers of cookie banners can affect privacy choices by manipulating choice architecture and with simple changes can increase absolute consent by 17%.

Researchers Successfully Hide Malware Inside an AI Neural Network

According to the study by Chinese researchers, malware can be embedded directly into the artificial neurons that make up machine learning models in a way that keeps them from being detected.

Image encryption technique could keep photos safe on popular cloud photo services

A study from computer scientists at Columbia Engineering reveals a way to encrypt personal images on popular cloud photo services without requiring any changes to – or trust in – those services.

Encryption issues account for minority of flaws in encryption libraries – research

An analysis of cryptographic libraries and the vulnerabilities affecting them has concluded that memory handling issues give rise to more vulnerabilities than encryption implementation errors.

Enhancing cloud security with a two-step cryptography technique

In a recent study, a team of researchers from India and Yemen described a novel, two-step cryptography technique – the first to combine genetic technology with mathematical technique.

A New Attack on AI-driven Facial Recognition Systems

A New Attack on AI-driven Facial Recognition Systems - Cybersecurity news - Innovation and Research
Researchers developed an attack technique named Adversarial Octopus that could perform a targeted attack on AI-based facial recognition systems. This attack shows that AI systems require much more attention at the security front, and such new attack methods will help raise awareness.

Researchers promise protection and perfect performance with new ZeRØ, No-FAT memory safety techniques

Researchers at the Columbia University School of Engineering and Applied Science have showcased two new approaches to providing computers with memory protection without sacrificing performance.

Poltergeist attack could leave autonomous vehicles blind to obstacles – or haunt them with new ones

Researchers at the Zhejiang University and the University of Michigan found a way to blind autonomous vehicles to obstacles using simple audio signals to tamper with the camera sensor.

TimeCache aims to block side-channel cache attacks – without hurting performance

Researchers from the University of Rochester have created TimeCache, an approach to system security claimed to protect against side-channel attacks without the usual deleterious impact on performance.

PrivacyMic: A smart home system that doesn’t record speech

A team of University of Michigan researchers has developed a system that can inform a smart home – or listen for the signal that would turn on a smart speaker – without eavesdropping on audible sound.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags