Search query: cyber-attacker
Categories: All Categories
13142 records searched, 15 records found
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data (via sciencedaily.com)
Researchers have shown that a component of modern computer processors that enables different areas o...
Published Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature (via sciencedaily.com) Original source
Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter...
Published A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers (via sciencedaily.com)
Researchers developed a technique that effectively protects computer programs' secret information fr...
Published Misinformation and irresponsible AI -- experts forecast how technology may shape our near future (via sciencedaily.com) Original source
From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involvi ...
Published Agriculture tech use opens possibility of digital havoc - Agriculture Tech Use Opens Possibility of Digital Havoc (via sciencedaily.com)
Wide-ranging use of smart technologies is raising global agricultural production but international r...
Published Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment (via sciencedaily.com)
Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...
Published Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication (via sciencedaily.com)
The world is one step closer to having a totally secure internet and an answer to the growing threat...
Published Researchers discover that privacy-preserving tools leave private data anything but - Researchers Discover That Privacy-Preserving Tools Leave Private Data Anything But (via sciencedaily.com)
Researchers explored whether private data could still be recovered from images that had been 'saniti...
Published Computer scientists discover new vulnerability affecting computers globally - Computer Scientists Discover New Vulnerability Affecting Computers Globally (via sciencedaily.com)
A team o computer science researchers has uncovered a line of attack that breaks all Spectre defense...
Published Graphene key for novel hardware security - Graphene Key for Novel Hardware Security (via sciencedaily.com)
As more private data is stored and shared digitally, researchers are exploring new ways to protect d...
Published Technology has the potential to change the patient-provider relationship - Technology and the Patient-Provider Relationship: A New Era of Healthcare (via sciencedaily.com)
As personal health records (AKA patient portals) allowing patients to see test results, medications...
Published IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light (via sciencedaily.com)
Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...
Published Chromo-encryption method encodes secrets with color - Chromo-encryption method encodes secrets with color (via sciencedaily.com)
In a new approach to security that unites technology and art, E researchers have combined silver nan...
Published Scientific advance leads to a new tool in the fight against hackers - Scientific Advance Leads to a New Tool in the Fight Against Hackers (via sciencedaily.com)
A new form of security identification could soon see the light of day and help us protect our data f...
Published Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data (via sciencedaily.com)
Scientists have developed algorithms that more efficiently measure how difficult it would be for an...