Massive public protests taking place in Hong Kong over the past week are aimed at…
Speculative memory side-channel attacks are security vulnerabilities in computers for which no efficient solutions have…
To help train government and industry organizations on how to prevent cyberattacks, as part of…
For more than a year, GozNym, a gang of five Russian cyber criminals, stole login…
Smart electricity meters are useful because they allow energy utilities to efficiently track energy use…
Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called…
In the online world, where incivility is all too common, new research from the McCombs…
Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components…
Successful new field tests of a continuous-variable quantum key distribution (CV-QKD) system over commercial fiber…
To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School…











