Over the past decade or so, computer scientists developed a variety of machine learning (ML) models that can analyze large amounts of data both quickly and efficiently. To be applied in real-world situations that involve the analysis of highly sensitive data, however,...
Security
A new feature selection technique for intrusion detection systems
Network-based technologies have become increasingly widespread, and they are now being used by countless individuals, professionals, and businesses worldwide. Despite their advantages, most network-based systems are highly vulnerable to malicious attacks.
Study estimates the prevalence of CCTV cameras in large cities worldwide
Over the past few decades, surveillance cameras, also known as closed-circuit television (CCTV) cameras, have become widely used by governments, law enforcement officers and private citizens to monitor public spaces, prevent crime and identify criminals. While the...
NEMS IDs: Secure nanoelectromechanical tags for identification and authentication
In recent years, hackers have become increasingly good at counterfeiting identification and authentication tags. This has led to an increase in cases of identity theft, fraud, security breaches and other concerning privacy or security related incidents.
An attacker can steal sensitive user data over the phone using smart speakers
In recent years, voice assistants such as Siri, Amazon Alexa, Google Assistant and Cortana have become increasingly popular. People in many countries worldwide communicate with these artificial intelligence (AI) agents on a daily basis, asking them to search for...
Study unveils security vulnerabilities in EEG-based brain-computer interfaces
Brain-computer interfaces (BCIs) are tools that can connect the human brain with an electronic device, typically using electroencephalography (EEG). In recent years, advances in machine learning (ML) have enabled the development of more advanced BCI spellers, devices...
Online attack ‘disrupted Clinton Campaign’s phone-dialling software’
Hillary Clinton's campaign operations were disrupted by a cyber attack on the eve of the US presidential election, it has been claimed.
Companies up spending on cybersecurity
Enterprises are spending more on hiring cyber-security staff and employing security-relevant tools, according to this year's PwC Global State of Information Security survey (GSISS)
Apple fixes bug that lets hackers take control of iPhone, Apple Watch and Mac
Apple's latest update fixes a bug that lets hackers take over iPhones, iPads and Macs after showing a picture to users.
Hillary Clinton emails scandal: Will the FBI cost Hillary the election?
Even if you've - with good reason - tapped out of reading about the ongoing US election, it's impossible to miss headlines about Hillary Clinton's emails.