A research paper presented at the Usenix security conference last week detailed a new technique for retrieving encryption keys from electronic devices, a method that is much faster than all previously known techniques.
A trio of academics from the University of Florida has developed a device that can detect different types of payment card skimmers —devices developed by cyber-criminals to collect data from credit and debit cards inserted inside ATMs or gas pump card readers.
Researchers from NVIDIA, Aalto University, and MIT have developed an AI algorithm, first of its kind, that can remove noise and artifacts from images without having to look at clean photos in advance.
Academics say they've mounted a successful GPS spoofing attack against road navigational systems that can trick humans into driving to incorrect locations.
A person's fingers leave thermal residue on keyboard keys that a malicious observer could record and later determine the text a user has entered on the keyboard, according to a recently published research paper by three scientists from the University of California, Irvine (UCI).
Scientists from the University of Wisconsin-Madison (UWM) have developed a new type of material that can hide an object's heat signature from infrared sensors.
Mobile app developers are going through the same growing pains that the webdev scene has gone through in the 90s and 2000s when improper input validation led to many security incidents.
Three researchers from Columbia University have created a technique named FontCode that can be used to embed hidden messages inside font glyphs (characters).
Nvidia scientists have created what they call a "first of its kind" AI system that can learn by observing the actions of a human, and then complete tasks based on the observed patterns.
A team of Chinese and US researchers has discovered a new method of attacking smart assistants like Amazon Alexa and Google Home, which they have named "voice squatting."
A study carried out at a college in the Philippines shows that students with better grades use bad passwords in the same proportion as students with bad ones.
Five academics from the Vrije University in Amsterdam and one from the University of Cyprus have discovered a way for launching Rowhammer attacks via network packets and network cards.
Nvidia researchers have developed a new AI technology that can reconstruct holes or intentionally removed content from images.
Google Research engineers have developed a deep learning system that can separate voices from audio-visual data recorded in crowded environments.
Purdue University scientists have developed a data protection technique called Reactive Redundancy for Data Destruction (R2D2) that can protect data sitting inside a virtual machine from modern data-wiping malware and even some secure file deletion methods.
One of every 200 Google search autocomplete suggestions are poisoned and are used to drive traffic to misleading sites, to malware, or other malicious content, a team of academics from three US universities has discovered.
A well-established research team from the Ben-Gurion University of the Negev in Israel has detailed today a new method of extracting data from air-gapped computers using speakers, headphones, earphones, or earbuds.
Academics have designed a new facial recognition system that relies on the way light patterns reflect off the human face to distinguish between individuals, and on the speed with which the system reads the reflected light to detect forgery attempts.
Researchers say that threat actors looking for a covert channel for stealing data from a firewalled network can abuse X.509 certificates to hide and extract data without being detected.
Research published earlier today by a group of scientists from Israel with a prodigious history of extravagant and extraordinary hacks reveal that an attacker can steal data from air-gapped devices protected by Faraday cages.