Researchers say that threat actors looking for a covert channel for stealing data from a firewalled network can abuse X.509 certificates to hide and extract data without being detected.
Research published earlier today by a group of scientists from Israel with a prodigious history of extravagant and extraordinary hacks reveal that an attacker can steal data from air-gapped devices protected by Faraday cages.
Professors from universities in China and the US are warning about the impending danger of "transduction attacks" on sensors deployed with everyday devices.
Deep convolutional neural networks (CNN) have become a popular tool for image generation and restoration, with a few algorithms released in the last months of 2017 that achieve spectacular results when it comes to recovering and reconstructing corrupted or low-quality images.
Japanese scientists have discovered a new polymer glass that can heal itself and could be used as screen material for smartphones, TVs, PCs, laptops, tablets, and other electronics equipment.
Malicious applications can freely access sensor data on modern smartphones and use this highly sensitive data stream to collect vasts amounts of intel on the phone's owner, information that they can later use to guess the user's phone PIN.
A team of three researchers from the University of California, San Diego (UCSD) has created a tool that can detect when user-registration-based websites suffer a data breach.
Most source code files hosted on GitHub are actually clones of previously created files, according to a recent study conducted by a joint team of researchers from the University of California, Irvine, the Czech Technical University, Microsoft Research, and Northeastern University.
Research carried out by Google engineers and academics from the University of California, Berkeley and the International Computer Science Institute has revealed that phishing attacks pose a more significant threat to users losing access to their Google accounts when compared to keyloggers or password reuse.
A security researcher has discovered a new code injection technique that works on all recent Windows versions and allows miscreants to inject malicious code into other applications undetected.
Advances in artificial intelligence are coming fast and furious these days, and one of the most impressive is an AI bot created by Nvidia researchers that can generate images of random and extremely realistic human faces.
Rutgers engineers have created a new type of user authentication system that relies on transmitting vibrations through a surface and having the user touch the surface to generate a unique signature. This signature is then used to approve or deny a user access to an app, room, or building.
unCAPTCHA is the name of a new automated system designed by a team of four computer science experts from the University of Maryland (UM) that can break Google's reCAPTCHA challenges with an accuracy of 85%.
Scientists from Florida International University and Bloomberg have created a custom two-factor authentication (2FA) system that relies on users taking a photo of a personal object.
Computer scientists have created an AI algorithm that works on the same principles of the human eye, and that can break various CAPTCHA systems with accuracies of over 50%.
Security researchers have come up with a variation of the Rowhammer attack that bypasses all previously proposed countermeasures.
Scientists at MIT have developed a new tool called CodeCarbonCopy (CCC) that can automatically port code from one project to another, mapping differences and adapting the imported code to the new codebase.