Smiles, winks in face recognition could increase phone security

As hackers find ways to bypass your phone security based on face recognition, researchers have developed a way to strengthen security by adding facial features such as smiles and winks to the mix.

Can private data be recovered from “sanitized” images?

Researchers at the NYU Tandon School of Engineering found that PP-GAN designs can be subverted to pass privacy checks, while still allowing secret information to be extracted from sanitized images.

Intel CPU interconnects can be exploited by malware to leak encryption keys and other info, academic study finds

This was tested on Intel Coffee Lake and Skylake CPUs, client-class CPUs, and should work on server CPUs like Xeon Broadwell. It's unknown whether more recent Intel server chips are susceptible.

Scientists have built this ultrafast laser-powered random number generator

Using a single, chip-scale laser, scientists have managed to generate streams of completely random numbers at about 100 times the speed of the currently fastest random-numbers generator systems.

New tool spots to identify security and privacy issues with COVID-19 tracing apps

"COVIDGuardian", the first automated security and privacy assessment tool, tests contact tracing apps for potential threats such as malware, embedded trackers, and private information leakage.

Researchers warn that installed Alexa Skills can double-cross their users

In research presented on Wednesday at the NDSS conference, researchers describe flaws in the process Amazon uses to review third-party Alexa applications known as Skills.

Experts Find a Way to Learn What You're Typing During Video Calls

A new attack framework aims to infer a user's keystrokes at the opposite end of a video conference call by leveraging the video feed to correlate observable body movements to the text being typed.

The cybersecurity issues of seismic monitoring devices

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points.

Researchers develop tool that ensures secure sensitive data sharing

A data privacy tool has been developed to help ensure key datasets – such as those tracking COVID-19 – can be publicly shared with an extra layer of security for sensitive personal information.

Alexa, Disarm the Victim's Home Security System

Researchers from the University of Michigan and The University of Electro-Communications (Tokyo) who last year hacked popular voice assistants with laser pointers take their work to the next level.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags