Speculative memory side-channel attacks are security vulnerabilities in computers for which no efficient solutions have…
STRATEGY & THREATS
Smart electricity meters are useful because they allow energy utilities to efficiently track energy use…
Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called…
To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School…
The human body’s mechanisms are marvelous, yet they haven’t given up all their secrets. In…
One of the latest cyber threats involves hackers encrypting user files and then charging “ransom”…
ZombieLoad and Store-to-Leak Forwarding are the names of the new exploits which have just been…
Technology used in exercise and lifestyle apps may hold the key to answering that most…
Researchers at North Carolina State University have identified design flaws in “smart home” Internet-of-Things (IoT)…
Researchers from North Carolina State University and the University of Texas at Austin have developed…