Password Current Events | Page 2

Password Current Events, Password News Articles.
Sort By: Most Viewed | Most Recent
Page 2 of 7 | 254 Results
Carnegie Mellon researchers use inkblots to improve security of online passwords
Carnegie Mellon University computer scientists have developed a new password system that incorporates inkblots to provide an extra measure of protection when, as so often occurs, lists of passwords get stolen from websites. This new type of password, dubbed a GOTCHA (Generating panOptic Turing Tests to Tell Computers and Humans Apart), would be suitable for protecting high-value accounts, such as bank accounts, medical records and other sensitive information. (2013-11-07)

BioVault locks up biometrics
A system that allows biometric data to be used to create a secret key for data encryption has been developed by researchers in South Africa. They describe details of the new technology in the International Journal of Electronic Security and Digital Forensics this month. (2009-07-31)

New cyber security protocol for online banking, and more
A new security approach could improve safeguarding of credit card numbers, bank passwords and other sensitive information for those who surf the Internet using wireless connections, researchers told the annual meeting of the American Association for the Advancement of Science (AAAS) today. (2005-02-19)

Are squiggly lines the future of password security?
As more people use smart phones and tablets to store personal information and perform financial transactions, the need for robust password security is more critical than ever. A new Rutgers study shows that free-form gestures -- sweeping fingers in shapes across the screen -- can be used to unlock phones and grant access to apps. These gestures are less likely to be observed and reproduced by 'shoulder surfers' who spy on users to gain unauthorized access. (2014-06-04)

Speak to your credit card
A credit card that cannot be used unless it hears a password spoken in the owner's voice could help prevent fraudulent use of stolen cards. A prototype built by engineers in California is the first attempt to pack a loudspeaker, microphone, battery and voice-recognition chip onto a standard size card. (2004-04-21)

Bacteria's password for sporulation hasn't changed in 2.7 billion years
When it comes to changing their passwords, bacteria are just as bad as you and me -- maybe even worse. A Carnegie Mellon University research team has found that despite 2.7 billion years of evolution, bacteria are still using the same 'password' to initiate the process for making spores. Their findings were published in the September issue of PLOS Genetics. (2018-09-25)

New technology protects against password theft and phishing attacks
New technology launched today by Royal Holloway University, will help protect people from the cyber attack known as (2013-08-20)

Smart keyboard cleans and powers itself -- and can tell who you are
In a novel twist in cybersecurity, scientists have developed a self-cleaning, self-powered smart keyboard that can identify computer users by the way they type. The device, reported in the journal ACS Nano, could help prevent unauthorized users from gaining direct access to computers. (2015-01-21)

How to protect your laptop -- even when it's asleep
Hypnoguard is a powerful new software system developed by Concordia University researchers to safeguard data even when computer is in sleep mode. (2016-11-23)

Like other offenses, cyberdeviance and cybercrime seem to start and peak in the teen years
A snapshot survey by University of Cincinnati researchers indicates that cyberdeviance and cybercrime start among teens at about age 15 and peak at about age 18. This is in line with the traditional onset and peak ages for other types of misdemeanor and criminal offenses. (2013-11-18)

HPV vaccination does not lead to an increase in sex
A study published in Vaccine reveals that contrary to recent discussions, the HPV vaccination does not increase sexual activity in adolescent girls. (2012-10-10)

Data security: A problem in search of a mathematical theory
The need for security in electronic communications is crucial in today's world. The foundation for providing this security rests on mathematics. In particular, a certain kind of mathematical function called a (2006-02-08)

Improve your information security by giving employees more options
A recent study published in the Journal of Management Information Systems suggests information security managers and supervisors could have greater success in motivating employees to act more securely by avoiding cold, authoritative commands, and instead create security messages that are relatable and provide options for how employees can better protect information and respond to threats. (2018-03-26)

Physiological effects of reduced gravity on bacteria
In this study, water system bacterial isolates from the ISS were compared to other isolates from corresponding type strains of the same species. Findings suggest that conditions on the ISS might have favoured bacteria that were able to thrive under the unusual environmental conditions of this habitat. Responses to reduced gravity, coupled with impacts of other features (such as radiation resistance and the ability to persist under very low nutrient conditions), may contribute to the success of these water system bacteria. (2005-03-10)

New study highlights strong anti-cancer properties of soybeans
First study to report that proteins found in soybeans, could inhibit growth of colon, liver and lung cancers, published in Food Research International. (2013-03-20)

Study reveals security weaknesses in file-sharing methods used in clinical trials
Patients who participate in clinical trials expect that their personal information will remain confidential, but a recent study led by Dr. Khaled El-Emam, Canada Research Chair in Electronic Health Information at the CHEO Research Institute, found that the security practices used to transfer and share sensitive files were inadequate. (2011-02-16)

RIT professor recommends tougher computer security measures to beat hackers
Hackers beware. A Rochester Institute of Technology professor knows how to thwart sophisticated and determined intruders from stealing personal and corporate information. His secret? Anchor your online activities to the physical world. RIT scientist and entrepreneur Roger Dube takes a close look at user authentication and computer security in his recently published book, (2008-12-03)

MIT: Simple security for wireless
MIT researchers demonstrate the first wireless security scheme that can protect against (2011-08-22)

Northeastern researchers develop system to control information leaks from smartphone apps
A research team led by Northeastern's David Choffnes has found 'extensive' leakage of users' personal identifying information from apps on mobile devices, including passwords. Their unique ReCon cloud-based system can detect those leaks and give you the tools to stop them. (2015-11-16)

Scientists discover how obesity stops 'guardian immune cells' from doing their job
Special immune cells -- ILCs -- cannot function properly once obesity is established. Without their help, we are at risk from inflammation and diabetes. Scientists now have new therapeutic targets to prevent and control obesity-related inflammation and metabolic disease. (2017-03-02)

Authentication of patients in medicine via online system should be discussed ethically
A group of researchers led by Osaka University indicated that the authentication system for medical research/treatment using ICT needs consideration to ethical issues including 1) respect for autonomy, 2) privacy protection and 3) relationship of trust.. With that in mind, they proposed two-factor authentication: (1) login authentication using a user ID and password and (2) authentication using a one-off password. (2018-06-25)

Agent 007: Organic Molecules as bearers of secrets
In the digital age, security of sensitive information is of utmost importance. Many data are encrypted these methods use a password for decryption, and in most cases, exactly this password is the entrance gate for hackers. Scientists of Karlsruhe Institute of Technology (KIT) use a new and highly secure approach by combining computer science with chemistry and a conventional encryption method with a chemical password. (Nature Communications, DOI: 10.1038/s41467-018-03784-x External Link). (2018-04-25)

A majority of medical professionals improperly share log-in credentials to EMRs
Nearly three-quarters (73 percent) of the 299 participants claimed to have used another medical staff member's password to access an EMR at work. More than 57 percent of participants (171 out of 299) estimated they have used someone else's password an average of 4.75 times. (2017-09-26)

No keys to the kingdom: New single sign-on algorithm provides superior privacy
Single sign-on systems (SSOs) allow us to login to multiple websites and applications using a single username and password combination. But these are third party systems usually handled by Big Tech companies who have been reported to gather and leak personal information without user consent. Now, researchers from Tokyo University of Science, Japan, have developed a new and secure single sign-on algorithm that eliminates all these problems. (2020-06-29)

Pesticide application as potential source of noroviruses in fresh food supply chains
Contaminated water used to dilute pesticides could be responsible for viruses entering the food chain, warn scientists. (2013-03-12)

Excessive alcohol use when you're young could have lasting impacts on your brain
Excessive alcohol use accounts for four percent of the global burden of disease, and binge drinking particularly is becoming an increasing health issue. A new review article published Cortex highlights the significant changes in brain function and structure that can be caused by alcohol misuse in young people. (2013-01-30)

Images and codes could provide secure alternative to multiple device password systems
A system using images and a one-time numerical code could provide a secure and easy to use alternative to multi-factor systems dependent on hardware or software and one-time passwords, a study by Plymouth University published in Information Security Journal: A Global Perspective suggests. (2015-12-23)

New password in a heartbeat
Researchers at Rice University propose a system to prevent cyberattacks on pacemakers, defibrillators and other devices that use wireless communications. (2013-09-23)

Power can corrupt even the honest
New research published in The Leadership Quarterly looked to discover whether power corrupts leaders. Study author John Antonakis and his colleagues from the University of Lausanne explain, 'We looked to examine what Lord Acton said over 100 years ago, that 'Power corrupts and absolute power corrupts absolutely.'' (2014-10-01)

Standard feature of Web browser design leaves opening for privacy attacks
Princeton computer scientists have discovered a trait of Web browser design that allows Web sites to cull private information about the recent browsing histories of visitors. (2000-12-04)

Through, Institutions Gain Streamlined Access to Federal Research Systems
National Science Foundation (NSF) grantee institutions that are participants of InCommon can now provide their faculty and staff with the ability to log into using their university-issued user ID and password. Once logged into using university credentials, PIs and co-PIs can connect seamlessly to FastLane's Principal Investigator (PI/co-PI) services without having to log in again. (2011-07-08)

Vibrio bacteria could be a risk to fish as well as humans
About half of new marine vibrio bacteria discovered in the last five years, can kill fish and crustacea, according to researchers at Heriot-Watt University in Edinburgh. (2005-08-11)

New research paper says we are still at risk of the plague
This study, published in Infection, Genetics and Evolution, analyzed the Great Plague of Marseille, which caused 100,000 deaths between 1720 and 1723. The researchers aimed to highlight issues we are facing with infectious diseases today, to identify the best ways to respond to epidemics and whether we are still at risk of the plague re-emerging again. (2013-03-15)

'Security fatigue' can cause computer users to feel hopeless and act recklessly
A new study from National Institute of Standards and Technology researchers found that a majority of the typical computer users they interviewed experienced security fatigue -- weariness or reluctance to deal with computer security -- that often leads users to risky computing behavior at work and in their personal lives. (2016-10-04)

Simulated ransomware attack shows vulnerability of industrial controls
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable logic controllers (PLCs) to shut valves, increase the amount of chlorine added to water, and display false readings. (2017-02-13)

How much information is there in the world?
Think you're overloaded with information? Not even close. A new Science study calculates how much information humankind can handle. (2011-02-10)

For secure software: X-rays instead of passport control
Trust is good, control is better. This also applies to the security of computer programs. Instead of trusting 'identification documents' in the form of certificates, JOANA, the new software analysis tool, examines the source code of programs. It detects leaks, via which secret information may get out or outsiders may enter the system. JOANA also minimizes false alarms. Developed by Karlsruhe Institute of Technology the tool has already proven itself in realistic test scenarios. (2014-08-21)

Hubble eyes a powerful galaxy with a password name
Not all galaxies have the luxury of possessing a simple moniker or quirky nickname. This impressive galaxy imaged by the NASA/ESA Hubble Space Telescope is one of the unlucky ones, and goes by a name that looks more like a password for a computer: 2XMM J143450.5+033843. (2017-06-30)

RSVP for embargoed STEP Study Teleconference
On Tuesday, April 4, the American Heart Journal will publish the results of the Study of the Therapeutic Effects of Intercessory Prayer (STEP), the largest study to examine the effects of intercessory prayer--prayer provided by others. The STEP research team evaluated the impact of such prayer on patients recovering from coronary artery bypass graft (CABG) surgery. (2006-03-29)

Getting wise to the influenza virus' tricks
One of the tactics used by influenza virus to take over the machinery of infected cells has been laid bare by structural biologists at the European Molecular Biology Laboratory and the joint Unit of Virus Host-Cell Interaction in Grenoble, France. In the current issue of Nature Structural and Molecular Biology they publish a high-resolution image of a key protein domain whose function is to allow the virus to multiply by hijacking the host cell protein production machinery. (2008-05-04)

Page 2 of 7 | 254 Results
   First   Previous   Next      Last is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to