Popular Security News and Current Events

Popular Security News and Current Events, Security News Articles.
Sort By: Most Relevant | Most Recent
Page 1 of 25 | 1000 Results
An ionic black box
While we embrace the way the Internet of Things already is making our lives more streamlined and convenient, the cybersecurity risk posed by millions of wirelessly connected gadgets, devices and appliances remains a huge concern. Even single, targeted attacks can result in major damage; when cybercriminals control and manipulate several nodes in a network, the potential for destruction increases. (2018-04-25)

Speed of light: Toward a future quantum internet
University of Toronto Engineering researchers have demonstrated proof-of-principle for a device that could serve as the backbone of a future quantum Internet. U of T professor Hoi-Kwong Lo and his collaborators have developed a prototype for a key element for all-photonic quantum repeaters, a critical step in long-distance quantum communication. (2019-01-28)

Sustainable but smartly: Tackling security and privacy issues in smart agriculture
Smart agriculture is set to revolutionize food production in the next few decades. However, the integration of information technology in agricultural processes also brings security and privacy concerns. In a new survey published in IEEE/CAA Journal of Automatica Sinica, scientists discuss these challenges and propose countermeasures applicable to different areas of agricultural production. They also provide guidance for future research, suggesting key areas of focus in the ever-growing field of smart agriculture. (2021-02-23)

NUS scientist develops 'toolboxes' for quantum cybersecurity
A quantum information scientist from the National University of Singapore has developed efficient 'toolboxes' comprising theoretical tools and protocols for quantifying the security of high-speed quantum communication. (2017-12-08)

MIT system aims to prevent attacks made possible by Meltdown/Spectre
Researchers from MIT have developed a new security system that has been shown to outperform Intel's own approach at preventing so-called 'timing attacks' made possible by vulnerabilities like Meltdown and Spectre. (2018-10-18)

McLean researchers uncover security issues with health apps for dementia patients
In a recent paper, a team of McLean Hospital researchers reported that many health apps designed to assist dementia patients and their caregivers have inadequate security policies or lack security policies altogether. (2017-08-21)

Values and gender shape young adults' entrepreneurial and leadership
Young adults who are driven by extrinsic rewards and money and less by a sense of security are more likely to want to become entrepreneurs and leaders, according to a recent study. (2018-03-26)

High numbers of elderly Japanese women will soon live in poverty, predicts new model
Roughly one in four elderly Japanese women will live below the poverty level in the near future, predicts a model of the Japanese pension system. Never-married and divorced women will be the most affected, with around 50 percent of these women predicted to become impoverished in the next 50 years. (2018-03-14)

First-ever US experiments at new X-ray facility may lead to better explosive modeling
For the first time in the US, time-resolved small-angle x-ray scattering (TRSAXS) is used to observe ultra-fast carbon clustering and graphite and nanodiamond production in the insensitive explosive Plastic Bonded Explosive (PBX) 9502, potentially leading to better computer models of explosive performance. (2017-11-06)

Off-the-shelf smart devices found easy to hack
'It only took 30 minutes to find passwords for most of the devices and some of them were found only through a Google search of the brand,' says Omer Shwartz, a Ph.D. student and member of Dr. Oren's lab. 'Once hackers can access an IoT device, like a camera, they can create an entire network of these camera models controlled remotely.' (2018-03-13)

Scalable clusters make HPC R&D easy as Raspberry Pi
A quest to help the systems software community work on very large supercomputers without having to actually test on them has spawned an affordable, scalable system using thousands of inexpensive Raspberry Pi nodes. (2017-11-13)

Counterfeits and product piracy can be prevented by security features, such as printed 3-D microstructures
Security features are to protect bank notes, documents, and branded products against counterfeiting. Losses caused by product forgery and counterfeiting may be enormous. According to the German Engineering Association, the damage caused in 2016 in its branch alone amounted to EUR 7.3 billion. In the Advanced Materials Technologies journal, researchers of Karlsruhe Institute of Technology (KIT) and the ZEISS company now propose to use printed 3-D microstructures instead of 2-D structures, such as holograms, to improve counterfeit protection. (2017-11-15)

New 3-D printed polymer can convert methane to methanol
Lawrence Livermore National Laboratory scientists have combined biology and 3-D printing to create the first reactor that can continuously produce methanol from methane at room temperature and pressure. (2016-06-15)

Trust is good, quantum trickery is better
An international team of scientists prove, for the first time, the security of so-called device-independent quantum cryptography in a regime that is attainable with state-of-the-art quantum technology, thus paving the way to practical realization of such schemes in which users don not have to worry whether their devices can be trusted or not. (2018-01-31)

Finding order in disorder demonstrates a new state of matter
Physicists have identified a new state of matter whose structural order operates by rules more aligned with quantum mechanics than standard thermodynamic theory. (2018-04-02)

Nature imagery calms prisoners
Sweeping shots of majestic landscapes. Glaciers, forests and waterfalls. Research published today shows that these images, shown to people deprived of access to nature, can reduce tension, help defuse anger and make some of the harshest environments, like a solitary confinement cellblock in a maximum-security prison, a little easier to bear. (2017-09-01)

Researchers found a security flaw that had 10 million banking app users at risk
Researchers from the University of Birmingham have developed a tool to perform semi-automated security testing of mobile phone apps. After running the tool on a sample of 400 security critical apps, they were able to identify a critical vulnerability in banking apps; including apps from HSBC, NatWest, Co-op and Bank of America Health. (2017-12-06)

Satellite imagery analysis reveals economic decay within Islamic State
A new RAND Corporation report paints a bleak picture of economic life under the Islamic State. RAND estimates that the Islamic State contributed to a 23 percent reduction in the GDP of cities under its control, based on novel applications of satellite-derived data. (2017-09-13)

Geopolitical risks to US oil supply lowest since the early 1970s
The geopolitical risks to the United States' oil supply are the lowest since the early 1970s, due to fracking, climate action and a more diverse global supply, according to a new paper by experts at Rice University's Baker Institute for Public Policy. America's energy prosperity contrasts with a more fraught period for energy-exporting countries where geopolitical challenges have been compounded by fiscal stress and rising domestic energy demand, the authors said. (2018-01-05)

Modern security technology in Intel processors not watertight
Technology giant Intel has been including an innovative security method in its processors for a number of years. This method works as a vault for your personal data. However, KU Leuven researchers (Belgium) have shown that the system can, in fact, be hacked using the Foreshadow attack. What's more, information processed in cloud systems also seems vulnerable to this kind of attack. Intel will be releasing patches to resolve the flaw in millions of processors. (2018-08-14)

Heartbeat could be used as password to access electronic health records
Researchers at Binghamton University, State University of New York have devised a new way to protect personal electronic health records using a patient's own heartbeat. (2017-01-18)

Wave energy researchers dive deep to advance clean energy source
One of the biggest untapped clean energy sources on the planet -- wave energy -- could one day power millions of homes across the US. But more than a century after the first tests of the power of ocean waves, it is still one of the hardest energy sources to capture. Now, engineers at Sandia National Laboratories are conducting the largest model-scale wave energy testing of its kind to improve the performance of wave-energy converters. (2016-10-13)

Single-photon emitter has promise for quantum info-processing
Los Alamos National Laboratory has produced the first known material capable of single-photon emission at room temperature and at telecommunications wavelengths. (2017-07-31)

Millions of novel genetic variants found in 1000 Swedish individuals
An extensive exercise to map genetic variation in Sweden has found 33 million genetic variants, 10 million of which are novel. Large-scale DNA sequencing methods were used to analyse the whole genome of 1000 individuals from different parts of the country. The study was led by researchers at Uppsala University, who have published their findings in the European Journal of Human Genetics. (2017-08-25)

High food insecurity found in a sample of adults on probation in Rhode Island
A new study led by public health researchers at Tufts University School of Medicine reports significant food insecurity for adults on probation in Rhode Island. Nearly three-quarters of the participants experienced food insecurity over a 30-day period, with almost half having very low food security. (2018-06-08)

Terrorism and the Olympics by-the-numbers: Analysis from UMD-based START
History offers a warning, but no clear pattern on the true risk of terrorism at the Olympic Games, concludes a new report by the National Consortium for the Study of Terrorism and Responses to Terrorism based at the University of Maryland. The Olympics have been terror targets on three separate occasions since 1970, claiming 22 lives and wounding more than 100, the report says. It compiles and analyzes data from START's comprehensive Global Terrorism Database. (2012-07-26)

By 2040, artificial intelligence could upend nuclear stability
A new RAND Corporation paper finds that artificial intelligence has the potential to upend the foundations of nuclear deterrence by the year 2040. While AI-controlled doomsday machines are considered unlikely, the hazards of artificial intelligence for nuclear security lie instead in its potential to encourage humans to take potentially apocalyptic risks, according to the paper. (2018-04-24)

Improving cyber security in harsh environments
Many people don't worry about the security of their personal information until it's too late. And protecting data is even more important for military personnel, whose lives could be in danger if some types of information were to get into the wrong hands. Now, one group reports in ACS Nano a new way to protect data, especially when it is subjected to extreme environmental conditions. (2017-12-13)

Common bricks can be used to detect past presence of uranium, plutonium
Researchers have demonstrated a technique that can determine whether bricks -- the common building material -- have ever been near a radiological source, and identify the specific type of source, such as high enriched uranium or plutonium. (2018-03-01)

Smartphone app directs first responders to cardiac arrest three minutes before ambulance
A novel smartphone application (app) has been developed that can direct first responders to cardiac arrest victims more than three minutes before the emergency services arrive. Each minute increases the chance of survival by 10%. (2017-06-19)

New plant breeding technologies for food security
An international team, including researchers from the University of Göttingen, argues in a perspective article recently published in ''Science'' that new plant breeding technologies can contribute significantly to food security and sustainable development. Genome editing techniques in particular, such as CRISPR/Cas, could help to make agriculture more productive and environmentally friendly. The researchers advocate the responsible use and support of these new technologies. (2019-03-29)

The ultimate defense against hackers may be just a few atoms thick
The next generation of electronic hardware security may be at hand as researchers at NYU Tandon School of Engineering introduce a new class of unclonable cybersecurity security primitives made of a low-cost nanomaterial with the highest possible level of structural randomness. Randomness is highly desirable for constructing the security primitives that encrypt and thereby secure computer hardware and data physically, rather than by programming. (2017-11-29)

UC Davis hosts the second Climate-Smart Agriculture Global Science Conference
The University of California, Davis, will host the second Climate-Smart Agriculture Global Science Conference on March 20-22, 2013. Co-organized by UC Davis and the World Bank, the conference will focus on science-based actions that can provide resilience for food systems despite the future uncertainty of climate change and extreme events. (2013-02-19)

UBC study: Publicizing a firm's security levels may strengthen security over time
New research from the UBC Sauder School of Business has quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime. (2018-09-27)

Study: There is almost no research on what distinguishes potential terrorists
A recent analysis of the existing research on factors associated with an individual's risk for engaging in terrorist activity highlights how little we know about these factors and the need for additional research in this area. (2017-09-25)

Extra vigilance required to combat growing sophistication of phishing attacks
Enterprising hackers can spoof the email address of a trusted friend, co-worker, or business and send forged emails to victims. With the right amount of social engineering, it's easy to obtain crucial and sensitive information from an unsuspecting recipient with a simple request. (2018-06-11)

A new advanced forensics tool
Polymers are highly prized by industry and increasingly used as replacements for metals in the manufacture of e.g. automobile parts and firearms. Such parts are marked with serial numbers, for security and traceability purposes. The numbers may however be partially or completely erased, and although there are techniques for recovering them from metal parts, this is not the case for polymers. (2017-11-01)

East Greenland ice sheet has responded to climate change over the last 7.5 million
Using marine sediment cores containing isotopes of aluminum and beryllium, a group of international researchers has discovered that East Greenland experienced deep, ongoing glacial erosion over the past 7.5 million years. (2016-12-07)

Americans' views towards refugee resettlement: Not-in-my backyard (NIMBYism) and media frames
A Dartmouth study finds that Americans are consistently less supportive of refugee resettlement within their own communities than nationally, illustrating the prevalence of not-in-my-backyard syndrome (NIMBYism). The manner in which the media links refugee issues to national security concerns was also found to affect public support for resettlement. The findings are published in Science Advances. (2017-09-06)

Fighting terror online
Online terrorism is the use of new technology to elicit fear and panic in society. This new book, Fighting Terror Online, focuses on how different societies react to this new form of terrorism and the ethics behind these responses. In Fighting Terror Online, Prof. Martin Golumbic asks the burning question, (2008-03-19)

Page 1 of 25 | 1000 Results
   First   Previous   Next      Last   
Brightsurf.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.