Search query: attackers

Categories: All Categories


13142 records searched, 196 records found, top 20 matches displayed

Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption
Published

IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...

Computer Science: Encryption Computer Science: General
Published

Computer scientists unveil novel attacks on cybersecurity      (via sciencedaily.com)     Original source 

Researchers have found two novel types of attacks that target the conditional branch predictor found ...

Computer Science: General
Published

Researchers unveil new way to counter mobile phone 'account takeover' attacks      (via sciencedaily.com)     Original source 

Computer science researchers have developed a new way to identify security weaknesses that leave peo...

Computer Science: Encryption Computer Science: General
Published

This tiny chip can safeguard user data while enabling efficient computing on a smartphone      (via sciencedaily.com)     Original source 

A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones wh...

Mathematics: General
Published

Math model predicts efficacy of drug treatments for heart attacks - Math Model Predicts Efficacy of Drug Treatments for Heart Attacks      (via sciencedaily.com) 

Researchers used mice to develop a mathematical model of a myocardial infarction. The new model pred...

Geoscience: Environmental Issues Geoscience: Severe Weather
Published

Risk of fatal heart attack may double in heat wave and high fine particulate pollution days      (via sciencedaily.com)     Original source 

An analysis of more than 202,000 heart attack deaths between 2015-2020 in a single Chinese province ...

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information fr...

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas o...

Engineering: Biometric
Published

Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature      (via sciencedaily.com)     Original source 

Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter...

Environmental: Water
Published

Gaming strategy helps plan for and prevent attacks on infrastructure      (via sciencedaily.com)     Original source 

As technology continues to advance, the likelihood of malevolent attacks and subsequent failures on ...

Biology: Microbiology
Published

Attacking COVID-19's moving antibody target - Attacking COVID-19's Moving Antibody Target      (via sciencedaily.com) 

A new study demonstrates that a portable electrochemical sensing technology known as eRapid could be...

Computer Science: General
Published

Denial of service threats detected thanks to asymmetric behavior in network traffic      (via sciencedaily.com) 

Scientists have developed a better way to recognize denial-of-service internet attacks, improving de ...

Chemistry: Biochemistry Computer Science: Artificial Intelligence (AI) Engineering: Robotics Research
Published

New cyber algorithm shuts down malicious robotic attack      (via sciencedaily.com)     Original source 

Researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on...

Computer Science: Artificial Intelligence (AI)
Published

AI networks are more vulnerable to malicious attacks than previously thought      (via sciencedaily.com)     Original source 

Artificial intelligence tools hold promise for applications ranging from autonomous vehicles to the...

Offbeat: Earth and Climate
Published

Reliance on moose as prey led to rare coyote attack on human - Reliance on Moose as Prey Led to Rare Coyote Attack on Human      (via sciencedaily.com) 

Wildlife researchers have completed a study that may settle the question of why, in October 2009, a...