Search query: cyber-attacker
Categories: All Categories
13142 records searched, 15 records found
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data


Researchers have shown that a component of modern computer processors that enables different areas o...
Published Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature



Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter...
Published A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers


Researchers developed a technique that effectively protects computer programs' secret information fr...
Published Misinformation and irresponsible AI -- experts forecast how technology may shape our near future



From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involvi ...
Published Agriculture tech use opens possibility of digital havoc - Agriculture Tech Use Opens Possibility of Digital Havoc


Wide-ranging use of smart technologies is raising global agricultural production but international r...
Published Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment


Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...
Published Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication


The world is one step closer to having a totally secure internet and an answer to the growing threat...
Published Researchers discover that privacy-preserving tools leave private data anything but - Researchers Discover That Privacy-Preserving Tools Leave Private Data Anything But


Researchers explored whether private data could still be recovered from images that had been 'saniti...
Published Computer scientists discover new vulnerability affecting computers globally - Computer Scientists Discover New Vulnerability Affecting Computers Globally


A team o computer science researchers has uncovered a line of attack that breaks all Spectre defense...
Published Graphene key for novel hardware security - Graphene Key for Novel Hardware Security


As more private data is stored and shared digitally, researchers are exploring new ways to protect d...
Published Technology has the potential to change the patient-provider relationship - Technology and the Patient-Provider Relationship: A New Era of Healthcare


As personal health records (AKA patient portals) allowing patients to see test results, medications...
Published IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...
Published Chromo-encryption method encodes secrets with color - Chromo-encryption method encodes secrets with color


In a new approach to security that unites technology and art, E researchers have combined silver nan...
Published Scientific advance leads to a new tool in the fight against hackers - Scientific Advance Leads to a New Tool in the Fight Against Hackers


A new form of security identification could soon see the light of day and help us protect our data f...
Published Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data


Scientists have developed algorithms that more efficiently measure how difficult it would be for an...