News

The output of computer-vision research is overwhelmingly aimed towards monitoring humans. The potential ethical implications need more scrutiny.
Human-surveillance technologies have advanced in the past few years with the rapid development of artificial intelligence (AI ...
As governments renew their push for encryption access, practitioners on the front lines argue that trust, privacy, and ...
UAB is designated as a Center for Academic Excellence in Research by the National Security Agency. UAB Cyber Corps SFS program is part of a broader strategy to promote cybersecurity education and ...
However, the increasing reliance on these devices raises significant concerns regarding data security, privacy, and integrity, especially within distributed consumer electronics environments. To ...
Dr. Chuck Easttom is the author of 42 books, including several on computer security, forensics, and cryptography. He is also an inventor with 26 patents and the author of over 70 research papers.
When trying to find a vulnerability in Apple iPhones or Android devices, many cybersecurity researchers now use a tool from Florida-based startup Corellium. Rather than risk breaking a physical ...
Security Vulnerabilities Continue To Emerge The finance industry ranked ninth in vulnerability-related discussions, representing 4.05% of all identified security flaws. Injection attacks, one of the ...
Every product development stage must incorporate a security element, she added. “That also means that once you place your product on the market, you can’t just drop it and forget about it. You have to ...
The Texas Cyber Command Center is expected to be fully operational by the end of next year. The governor held his bill signing Monday afternoon at 2:30 p.m. This is a developing story.
Names are how we make sense of the threat landscape and organize insights into known or likely cyberattacker behaviors. At Microsoft, we’ve published our own threat actor naming taxonomy to help ...