Current Password News and Events | Page 2

Current Password News and Events, Password News Articles.
Sort By: Most Relevant | Most Viewed
Page 2 of 7 | 254 Results
App uses smartphone compass to stop voice hacking
A University at Buffalo-led team of engineers is creating an app to stop voice hacking. The app uses existing smartphone components, including the magnetometer for the phone's compass, to detect when someone's voice is being broadcast on a speaker. (2017-06-05)

Combination of features produces new Android vulnerability
A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly used features in popular apps. (2017-05-21)

Bitcoin's popular design is being exploited for theft and fraud
The very design features that make Bitcoin technology appealing to its users are also weaknesses being exploited for the theft of the cryptocurrency -- new research reveals. Transparent design features are supposed to promote trust in Bitcoin. However, computer scientists at Lancaster University and Universiti Teknologi MARA (Malaysia) show that these features are presenting opportunities for fraud- undermining trust in the currency. (2017-05-17)

Researchers unveil new password meter that will change how users make passwords
Researchers from Carnegie Mellon University and the University of Chicago have just unveiled a new, state-of-the-art password meter that offers real-time feedback and advice to help people create better passwords. (2017-05-08)

Scientists identify neural basis for parasitic cowbird's secret password
Scientists identify neural basis for parasitic cowbird's secret password. (2017-04-18)

So you think you can secure your mobile phone with a fingerprint?
No two people are believed to have identical fingerprints, but researchers have found that partial similarities between prints are common enough that the fingerprint-based security systems used in electronic devices can be more vulnerable than previously thought. The vulnerability lies in the fact that fingerprint-based authentication systems feature small sensors that store partial fingerprints. The researchers found there could be enough similarities among different people's partial prints that one could create a 'MasterPrint.' (2017-04-11)

A badger can bury a cow by itself
While studying scavenger behavior in Utah's Great Basin Desert, University of Utah biologists observed an American badger do something that no other scientists had documented before: bury an entire calf carcass by itself. (2017-03-31)

Public funding essential for advances in biomedical research
Article shows that publicly-funded research creates knowledge that links to private companies' efforts to develop drugs, medical devices, and other patented biomedical products. (2017-03-30)

Scientists discover how obesity stops 'guardian immune cells' from doing their job
Special immune cells -- ILCs -- cannot function properly once obesity is established. Without their help, we are at risk from inflammation and diabetes. Scientists now have new therapeutic targets to prevent and control obesity-related inflammation and metabolic disease. (2017-03-02)

Simulated ransomware attack shows vulnerability of industrial controls
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable logic controllers (PLCs) to shut valves, increase the amount of chlorine added to water, and display false readings. (2017-02-13)

Heartbeat could be used as password to access electronic health records
Researchers at Binghamton University, State University of New York have devised a new way to protect personal electronic health records using a patient's own heartbeat. (2017-01-18)

Galaxy murder mystery
Across the universe, galaxies are being killed and the question scientists want answered is, what's killing them? New research published today by a global team of researchers, based at the International Centre for Radio Astronomy Research, seeks to answer that question. The study reveals that a phenomenon called ram-pressure stripping is more prevalent than previously thought, driving gas from galaxies and sending them to an early death by depriving them of the material to make new stars. (2017-01-16)

How to protect your laptop -- even when it's asleep
Hypnoguard is a powerful new software system developed by Concordia University researchers to safeguard data even when computer is in sleep mode. (2016-11-23)

'Brainprint' researchers get $900K in funding
The National Science Foundation has awarded $900,000 in grant funding to researchers at Binghamton University, State University of New York to continue investigations into the next-generation of brain biometric technology. The project, (2016-10-26)

'Security fatigue' can cause computer users to feel hopeless and act recklessly
A new study from National Institute of Standards and Technology researchers found that a majority of the typical computer users they interviewed experienced security fatigue -- weariness or reluctance to deal with computer security -- that often leads users to risky computing behavior at work and in their personal lives. (2016-10-04)

VTT's encryption method takes authentication to a new level
VTT Technical Research Centre of Finland has developed new kinds of encryption methods for improving the privacy protection of consumers to enable safer, more reliable and easier-to-use user authentication than current systems allow. (2016-10-04)

Wellesley research: Life's origins may result from low-energy electron reactions in space
At the American Astronomical Society national conference press briefings, Wellesley Professor Chris Arumainayagam presents findings from the first systematic study to demonstrate that early building blocks of life may be produced when low-energy (< 20 eV) electrons interact with cosmic (interstellar, planetary, and cometary) ices. His work adds crucial data to the study of the 'chemistry of the heavens.' (2016-06-13)

Social engineering: Password in exchange for chocolate
It requires a lot of effort and expense for computer hackers to program a Trojan virus and infiltrate individual or company computers. They are therefore increasingly relying on psychological strategies to manipulate computer users into voluntarily divulging their login details. These methods are known as 'social engineering.' For the first time, psychologists at the University of Luxembourg have conducted a large-scale study (involving 1,208 people) to investigate how people are manipulated into sharing their passwords with complete strangers in return for small gifts. (2016-05-12)

Phoney protection for passwords
Corporate data breaches seem to be on the rise, rarely a week passes without a company revealing that its database has been hacked and regrettably usernames, passwords, credit card details and its customers' personal information has been leaked on to the open internet. A new protection, nicknamed Phoney, is reported in the International Journal of Embedded Systems. (2016-05-04)

America's love affair with lips is leading to a boom in cosmetic procedures
A record number of patients underwent lip augmentation procedures in 2015, making them the second-fastest growing facial procedure in the United States since 2000. (2016-04-18)

Breakthrough technology to improve cyber security
An international research team has made a breakthrough in generating single photons, as carriers of quantum information in security systems. The interdisciplinary research is set to revolutionize our ability to exchange data securely -- along with advancing quantum computing, which can search large databases exponentially faster. (2016-03-21)

Smartphone security: Why doodling trumps text passwords
Someday soon, you may be able to log into your smartphone with sweeping gestures or doodling, using one or more fingers. Rutgers University researchers have performed the first study of free-form gesture passwords for smartphones in the field. Such passwords allow people to draw a password of any shape with any number of fingers. Gesture, or doodling, passwords are very suitable for touchscreens, faster to use, easy to remember and hard to guess. (2016-03-10)

Carnegie Mellon, Stanford researchers devise method to safely share password data
An unfortunate reality for cybersecurity researchers is that real-world data for their research too often comes via a security breach. Now computer scientists at Carnegie Mellon and Stanford universities have devised a way to let organizations share statistics about their users' passwords without putting those same customers at risk of being hacked. (2016-02-22)

Researchers to use supercomputer to 'hack' Ebola
Scientists at the University of Leeds will run the equivalent of password cracking software to find the chemical keys to defeating the Ebola virus. (2016-02-11)

Researchers develop hack-proof RFID chips
Researchers at MIT and Texas Instruments have developed a new type of radio frequency identification (RFID) chip that is virtually impossible to hack. If such chips were widely adopted, it could mean that an identity thief couldn't steal your credit card number or key card information by sitting next to you at a café, and high-tech burglars couldn't swipe expensive goods from a warehouse and replace them with dummy tags. (2016-02-03)

Images and codes could provide secure alternative to multiple device password systems
A system using images and a one-time numerical code could provide a secure and easy to use alternative to multi-factor systems dependent on hardware or software and one-time passwords, a study by Plymouth University published in Information Security Journal: A Global Perspective suggests. (2015-12-23)

Email security improving, but far from perfect
Email security helps protect some of our most sensitive data: password recovery confirmations, financial data, confidential correspondences, and more. According to a new report, published by computer science researchers at the University of Illinois at Urbana-Champaign, in collaboration with colleagues at the University of Michigan and Google, email security is significantly better than it was two years ago, but still has widespread issues. (2015-11-19)

Northeastern researchers develop system to control information leaks from smartphone apps
A research team led by Northeastern's David Choffnes has found 'extensive' leakage of users' personal identifying information from apps on mobile devices, including passwords. Their unique ReCon cloud-based system can detect those leaks and give you the tools to stop them. (2015-11-16)

Email, text or web portal? Study probes patients' preferences for receiving test results
The results of common medical tests are sometimes delivered to patients by email, letters or voice mail, but are these the most preferred methods? According to one of the first studies to look at this question, the answer is no. (2015-10-31)

You too can learn to farm on Mars!
Scientists at Washington State University and the University of Idaho are helping students figure out how to farm on Mars, much like astronaut Mark Watney, played by Matt Damon, attempts in the critically acclaimed movie 'The Martian.' (2015-10-20)

Making IoT configuration more secure and easy to use
With an ever increasing number of everyday objects from our homes, workplaces and even from our wardrobes, getting connected to the Internet, known as the 'Internet of Things,' researchers from the University of Southampton have identified easy-to-use techniques to configure IoT objects, to make them more secure and hence help protect them from online attacks. (2015-09-09)

Facebook use can worsen as well as improve mental health conditions
Facebook can help people recover from mental health problems but it needs to be used cautiously and strategically as it can also make symptoms worse, new research shows. (2015-04-14)

Does your password pass muster?
New research from Concordia University exposes the weakness of password strength meters, and shows consumers should remain sceptical when the bar turns green in order to create strong passwords. (2015-03-25)

Smart keyboard cleans and powers itself -- and can tell who you are
In a novel twist in cybersecurity, scientists have developed a self-cleaning, self-powered smart keyboard that can identify computer users by the way they type. The device, reported in the journal ACS Nano, could help prevent unauthorized users from gaining direct access to computers. (2015-01-21)

Detection thresholds drop with low noise quantum cascade laser driver
Electronic noise from Quantum Cascade Laser drivers has long limited the detection threshold of chemical sensors. No longer. Patented low noise technology is now available to both researchers and developers. Wavelength Electronics introduces the QCL LAB family of instruments that couple an intuitive touchscreen display with low noise drive electronics that have a proven track record of dropping detection thresholds up to an order of magnitude. (2015-01-13)

Researchers work to counter a new class of coffee shop hackers
If you're sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn't connect to the shop's Wi-Fi, think again. The bad guys may be able to see what you're doing just by analyzing the low-power electronic signals your laptop emits even when it's not connected to the Internet. (2015-01-08)

Study reveals major websites could be doing more to promote improved password security
Online giants including Amazon and LinkedIn could be doing far more to raise awareness of the need for better password practices among their users, a study by Plymouth University has found. (2014-12-22)

Rice team sets sights on better voting machine
At the urging of county election officials in Austin, Texas, a group of Rice University engineers and social scientists has pulled together a team of US experts to head off a little-known yet looming crisis facing elections officials nationwide. (2014-10-27)

Power can corrupt even the honest
New research published in The Leadership Quarterly looked to discover whether power corrupts leaders. Study author John Antonakis and his colleagues from the University of Lausanne explain, 'We looked to examine what Lord Acton said over 100 years ago, that 'Power corrupts and absolute power corrupts absolutely.'' (2014-10-01)

Existing power plants will spew 300 billion more tons of carbon dioxide during use
Existing power plants around the world will pump out more than 300 billion tons of carbon dioxide over their expected lifetimes, significantly adding to atmospheric levels of the climate-warming gas, according to UC Irvine and Princeton University scientists. (2014-08-26)

Page 2 of 7 | 254 Results
   First   Previous   Next      Last is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to