Mobile app developers are going through the same growing pains that the webdev scene has gone through in the 90s and 2000s when improper input validation led to many security incidents.
Three researchers from Columbia University have created a technique named FontCode that can be used to embed hidden messages inside font glyphs (characters).
Nvidia scientists have created what they call a "first of its kind" AI system that can learn by observing the actions of a human, and then complete tasks based on the observed patterns.
A team of Chinese and US researchers has discovered a new method of attacking smart assistants like Amazon Alexa and Google Home, which they have named "voice squatting."
A study carried out at a college in the Philippines shows that students with better grades use bad passwords in the same proportion as students with bad ones.
Five academics from the Vrije University in Amsterdam and one from the University of Cyprus have discovered a way for launching Rowhammer attacks via network packets and network cards.
Nvidia researchers have developed a new AI technology that can reconstruct holes or intentionally removed content from images.
Google Research engineers have developed a deep learning system that can separate voices from audio-visual data recorded in crowded environments.
Purdue University scientists have developed a data protection technique called Reactive Redundancy for Data Destruction (R2D2) that can protect data sitting inside a virtual machine from modern data-wiping malware and even some secure file deletion methods.
One of every 200 Google search autocomplete suggestions are poisoned and are used to drive traffic to misleading sites, to malware, or other malicious content, a team of academics from three US universities has discovered.
A well-established research team from the Ben-Gurion University of the Negev in Israel has detailed today a new method of extracting data from air-gapped computers using speakers, headphones, earphones, or earbuds.
Academics have designed a new facial recognition system that relies on the way light patterns reflect off the human face to distinguish between individuals, and on the speed with which the system reads the reflected light to detect forgery attempts.
Researchers say that threat actors looking for a covert channel for stealing data from a firewalled network can abuse X.509 certificates to hide and extract data without being detected.
Research published earlier today by a group of scientists from Israel with a prodigious history of extravagant and extraordinary hacks reveal that an attacker can steal data from air-gapped devices protected by Faraday cages.
Professors from universities in China and the US are warning about the impending danger of "transduction attacks" on sensors deployed with everyday devices.
Deep convolutional neural networks (CNN) have become a popular tool for image generation and restoration, with a few algorithms released in the last months of 2017 that achieve spectacular results when it comes to recovering and reconstructing corrupted or low-quality images.
Japanese scientists have discovered a new polymer glass that can heal itself and could be used as screen material for smartphones, TVs, PCs, laptops, tablets, and other electronics equipment.
Malicious applications can freely access sensor data on modern smartphones and use this highly sensitive data stream to collect vasts amounts of intel on the phone's owner, information that they can later use to guess the user's phone PIN.