Cyber-enabled espionage against the United States has been a challenge for more than 20 years and is likely to remain so in the future. In the aftermath of the 2020 SolarWinds cyber…
Cyber-enabled espionage against the United States has been a challenge for more than 20 years and is likely to remain so in the future. In the aftermath of the 2020 SolarWinds cyber…
Fifth-generation (5G) networks are being deployed in the United States and globally and, one day, will replace many older, third- and fourth-generation cellular networks. 5G will provide much higher data rates and…
Privacy and security and control of those things are paramount in the world of cryptocurrencies. “The whole cryptocurrency decentralized business is about giving control of the digital coins to you,” says Aravinda…
Before virtual assistants such as Amazon’s Alexa and Google Assistant became ubiquitous household technology, thieves needed to gain physical access into a home to inflict harm. Now all they need is their…
Dr. Nitin Agarwal, chair and distinguished professor of information science at University of Arkansas (UA) at Little Rock, has received a grant for $165,540 that will support research efforts to monitor cyber…
Algorithms recommend products while we shop online or suggest songs we might like as we listen to music on streaming apps. These algorithms work by using personal information like our past purchases…
Crafty hackers can make a tool to eavesdrop on some 6G wireless signals in as little as five minutes using office paper, an inkjet printer, a metallic foil transfer and a laminator.…
Engineering researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than previous systems. Ransomware is a type of…
When the draft of a Supreme Court decision that would overturn Roe v. Wade was leaked to the press, many of us who have been studying privacy for vulnerable individuals came to…