Search query: cyber-attacker

Categories: All Categories


13142 records searched, 15 records found


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas o...

Engineering: Biometric
Published

Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature      (via sciencedaily.com)     Original source 

Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter...

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information fr...

Computer Science: General Computer Science: Quantum Computers
Published

Misinformation and irresponsible AI -- experts forecast how technology may shape our near future      (via sciencedaily.com)     Original source 

From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involvi ...

Mathematics: General
Published

Agriculture tech use opens possibility of digital havoc - Agriculture Tech Use Opens Possibility of Digital Havoc      (via sciencedaily.com) 

Wide-ranging use of smart technologies is raising global agricultural production but international r...

Computer Science: Encryption
Published

Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment      (via sciencedaily.com) 

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...

Mathematics: Puzzles
Published

Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication      (via sciencedaily.com) 

The world is one step closer to having a totally secure internet and an answer to the growing threat...

Computer Science: Encryption
Published

Graphene key for novel hardware security - Graphene Key for Novel Hardware Security      (via sciencedaily.com) 

As more private data is stored and shared digitally, researchers are exploring new ways to protect d...

Computer Science: Encryption
Published

IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...

Computer Science: Encryption Mathematics: Puzzles
Published

Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data      (via sciencedaily.com) 

Scientists have developed algorithms that more efficiently measure how difficult it would be for an...

No more articles found that match the search criteria