A new system can more effectively protect modern PC architectures against vulnerabilities exploited by malware like Meltdown and Spectre, researchers say.
ZDNet From ACM TechNews | October 25, 2018
At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...ZDNet From ACM Opinion | September 7, 2018
Researchers from the Xi'an Jiaotong-Liverpool University in China have developed an authentication method that uses semantically linked images.
ZDNet From ACM TechNews | July 20, 2018
A coalition of Silicon Valley tech giants has doubled down on its criticism of encryption backdoors following a proposal that would give law enforcement access...ZDNet From ACM News | May 4, 2018
Distributed Denial of Service attackers have found a new way of magnifying their attacks, with experts warning that bigger attacks are likely.
ZDNet From ACM News | March 1, 2018
Researchers have developed a method to block background "chatter," which they say solves a common problem associated with quantum sensing devices.
ZDnet From ACM TechNews | December 20, 2017
Google researchers have developed an "electronic screen protector" application that can immediately spot people glancing at a user's handheld screen.
ZDNet From ACM TechNews | November 28, 2017
Researchers have developed a simulator employing convolutional neural networks and deep learning to enhance how vehicle artificial intelligence systems manage environmental...ZDNet From ACM TechNews | January 9, 2017
Researchers are looking into the construction of new quantum-proof cryptography ito thwart quantum-based schemes future hackers could use to crack sensitive data...ZDNet From ACM TechNews | August 8, 2016
The director of the Defense Science and Technology Group's Cyber and Electronic Warfare Division recommends a big-science approach to cybersecurity in Australia...ZDNet From ACM TechNews | April 20, 2016
To reduce conflicts within the Linux development community, the group has adopted a new code of conduct that comes in the form of a Linux patch. ZDNet From ACM TechNews | March 17, 2015
The Chinese Academy of Science plans to unveil a face-recognition payment application with near-perfect accuracy next year. ZDNet From ACM TechNews | September 10, 2014
The algorithm used by Google's Street View team to improve Google Maps also can beat CAPTCHAs with 99.8-percent accuracy. ZDNet From ACM TechNews | April 22, 2014
Women interested in the theory and practice of cybersecurity can now turn to a new scholarship program launched by Hewlett-Packard to support their studies. ZDNet From ACM TechNews | February 28, 2014
A security freelancer has published a proof-of-concept code for exploiting a security flaw in the Dual Elliptic Curve Deterministic Random Bit Generator. ZDNet From ACM TechNews | January 7, 2014
Microsoft has announced plans to launch three bug bounty programs designed to eliminate security vulnerabilities in its software. ZDNet From ACM TechNews | June 21, 2013
Israel is recruiting top students for a new cyberwarfare training program. The program shows how Israel is advancing in the field of cybernetics to develop "high...ZDNet From ACM TechNews | January 3, 2013
It appears that Osama bin Laden didn’t encrypt any of his computer files. If he had, U.S. authorities probably wouldn’t have been able to do much after confiscating...ZDNet From ACM News | May 4, 2012