Search query: attacks
Categories: All Categories
13142 records searched, 196 records found, top 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...
Published Computer scientists unveil novel attacks on cybersecurity



Researchers have found two novel types of attacks that target the conditional branch predictor found ...
Published Researchers unveil new way to counter mobile phone 'account takeover' attacks



Computer science researchers have developed a new way to identify security weaknesses that leave peo...
Published This tiny chip can safeguard user data while enabling efficient computing on a smartphone



A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones wh...
Published Math model predicts efficacy of drug treatments for heart attacks - Math Model Predicts Efficacy of Drug Treatments for Heart Attacks


Researchers used mice to develop a mathematical model of a myocardial infarction. The new model pred...
Published Risk of fatal heart attack may double in heat wave and high fine particulate pollution days



An analysis of more than 202,000 heart attack deaths between 2015-2020 in a single Chinese province ...
Published A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers


Researchers developed a technique that effectively protects computer programs' secret information fr...
Published Specific outdoor air pollutants linked to asthma attacks in urban children - Specific Outdoor Air Pollutants Linked to Asthma Attacks in Urban Children


Moderate levels of two outdoor air pollutants, ozone and fine particulate matter, are associated wit...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data


Researchers have shown that a component of modern computer processors that enables different areas o...
Published Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature



Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter...
Published Gaming strategy helps plan for and prevent attacks on infrastructure



As technology continues to advance, the likelihood of malevolent attacks and subsequent failures on ...
Published Number of shark bites consistent with recent trends, with small spike in fatalities



There was an increase in the number of unprovoked shark attacks worldwide and an uptick in fatalitie ...
Published Predatory fish use rapid color changes to coordinate attacks



Striped marlin are some of the fastest animals on the planet and one of the ocean's top predators. W...
Published Unusual fossil shows rare evidence of a mammal attacking a dinosaur



Scientists have described an unusual fossil from around 125 million years ago in China that shows a...
Published Attacking COVID-19's moving antibody target - Attacking COVID-19's Moving Antibody Target


A new study demonstrates that a portable electrochemical sensing technology known as eRapid could be...
Published Denial of service threats detected thanks to asymmetric behavior in network traffic


Scientists have developed a better way to recognize denial-of-service internet attacks, improving de ...
Published New cyber algorithm shuts down malicious robotic attack



Researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on...
Published AI networks are more vulnerable to malicious attacks than previously thought



Artificial intelligence tools hold promise for applications ranging from autonomous vehicles to the...
Published Dog attacks on mountain tapirs highlight a growing threat to endangered wildlife



Researchers who captured footage of dog attacks on endangered mountain tapirs in Colombia are callin ...
Published Reliance on moose as prey led to rare coyote attack on human - Reliance on Moose as Prey Led to Rare Coyote Attack on Human


Wildlife researchers have completed a study that may settle the question of why, in October 2009, a...