Researchers Trick Facial-Recognition Systems

At Black Hat USA 2020, McAfee researchers showed how they were able to successfully trick a facial-recognition system into misclassifying one individual as an entirely different person.

Hackers Could Use IoT Botnets to Manipulate Energy Markets

Researchers say that an attacker would be able to stealthily force price fluctuations in the service of profit, chaos, or both, by deploying high-wattage IoT botnets in a strategic manner.

Legacy Programming Languages Pose Serious Risks to Industrial Robots

Researchers studied 100 open-source automation programs developed with legacy languages and discovered several vulnerabilities, including flaws that could allow hackers to control or disrupt a robot.

New defense method enables telecoms, ISPs to protect consumer IoT devices

Researchers from BGU and NUS developed a method to detect connected, vulnerable IoT models before they are compromised by monitoring the data traffic from each smart home device.

Texas College to Improve Cybersecurity of Smart Buildings

Over the next three years, the project aims to research, develop, and demonstrate a real-time, advanced, building-resilient platform through multi-layer prevention and adaption mechanisms.

Researchers extract personal data from video conference screenshots

The researchers report that is it possible to extract private information from collage images of meeting participants posted on Instagram and Twitter.

Using Adversarial Machine Learning, Researchers Look to Foil Facial Recognition

Researchers at the National University of Singapore published a technique that locates the image areas where changes can best disrupt image-recognition algorithms, without being noticed by humans.

Home security cameras ‘could give away when homeowners are on holiday’, study warns

Cybersecurity researchers found that if attackers could monitor the data uploaded by internet protocol (IP) security cameras, they could predict if people were at home.

Researchers discover how to pinpoint the location of a malicious drone operator

The researchers trained a deep neural network to predict the location of drone operators, using only the path of the drones, which does not require additional sensors.

Sixteen Facebook apps caught secretly sharing data with third-parties

A team of academics has described this week a method that can help identify when Facebook app developers surreptitiously share user data with third-parties.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags