researchers

Mon
31
Oct
John Lister's picture

Thermal Images Could Reveal Passwords

Researchers say a thermal imaging camera could help crack passwords. It's not exactly a looming threat for the average user, though the study does reinforce the important of longer passwords. The research from the University of Glasgow appears to ... have been inspired by noticing that thermal-imaging cameras are becoming more affordable (less than $220 in some cases) and wondering how they could combine with machine learning. The researchers say they same idea may have struck would-be criminals, so it was worth trying to get one step ahead of them. (Source: zdnet.com ) The project followed a ... (view more)

Wed
19
Oct
John Lister's picture

Study: Smart Assistants May Hamper Development

Two researchers say voice controlled "assistant" devices could harm children's development. The claims are more of a warning than proven results at this stage. The claims come from Ananya Arora and Anmol Arora, both of the School of Clinical ... Medicine at the University of Cambridge. They were writing in the publication Archives of Diseases in Childhood. (Source: bmj.com ) The pair say they have three main fears about the uses of devices such as the Amazon Echo and Google Home, along with Apple's Siri. In all three cases, the researchers say it appears some parents may have mistaken ... (view more)

Thu
24
Jun
John Lister's picture

Key To Viral Posts: Naming Political Opponents

Social media users are more likely to share posts that criticize political opponents by name than those which praise people and ideas they support according to newly-published research. The pattern was consistent across different sites and people ... with different views. Researchers at the University of Cambridge were exploring what makes some posts on Facebook and Twitter more likely to be shared. Previous research had suggested the main driver was the tone of the language, with negative emotions such as anger, or a "sense of moral indignation" the most likely to lead to a post being widely ... (view more)

Tue
11
Feb
John Lister's picture

Scientists use Light, Sound to Produce 100 Gbps Internet

Researchers believe a new type of cable could carry Internet data at speeds 100 times greater than even the fastest on offer today. The new technology could benefit hospitals and research facilities in particular. The technique was developed by ... researchers at universities in Leeds and Nottingham in the United Kingdom, and is based around similar technology found in fiber optic cables. Those are the fastest data-carrying cables and work by sending pulses of light down a tiny transparent tube. By far, the greatest benefit of utilizing fiber optic cables is that it can transfer data over long ... (view more)

Wed
20
Nov
John Lister's picture

Android Malware Records Calls, Tracks Location

Google is fixing an Android bug that let hackers remotely capture videos and images without permission. The bug could also have revealed the user's precise location, making it particularly dangerous if exploited by stalkers. Security researchers at ... Checkmarx discovered the bug in several default camera apps on a variety of Android phones, including the Google and Samsung apps. (Source: arstechnica.com ) The bug could only be exploited once malware was on the phone, but even then it still shouldn't have allowed such an attack. That's because it involved using a rogue app on the phone to access ... (view more)

Wed
30
Oct
John Lister's picture

New Malware Hides Inside Audio Files

Most people know not to open an executable file or document attached to an email unless they were expecting it. But a new example of malware means even an audio file could trigger a payload. Researchers at Blackberry Cylance Threat recently ... uncovered malicious code hidden inside WAV files. That's a computer format for audio that was common for music on PCs before MP3 became established. The attackers are using a technique called steganography, which is a way to hide a file inside another file in a way that normally cannot be detected. Steganography has previously been used in image files, and ... (view more)

Wed
02
Oct
John Lister's picture

Major VOIP Security Flaws Discovered in Android

Researchers say they discovered eight security flaws in the way Android handles voice calls through the Internet. Unlike most such bugs which involve specific apps, these problems were with Android itself. The good news is that the researchers ... reported all of the bugs to Google while carrying out the project and most have now been fixed. However, it does raise concerns about the development and design of the system itself. (Source: github.io ) The researchers looked at the three latest Android versions (7, 8 and 9), specifically addressing the components that allow Voice Over Internet ... (view more)

Thu
19
Sep
John Lister's picture

Study Reveals Smart Gadgets Share Data Unexpectedly

Researchers have discovered that many smart gadgets (such as smart TVs and streaming sticks) send data to tech companies, even when idle. The purpose of the experiment was to determine if devices were being used to monitor users, or could ... potentially leak data about the user to a third party. The research was a joint project between Northeastern University and the UK's Imperial College London. They examined 81 devices under the broad category of the Internet of Things (IoT). The study included security cameras, home automation devices such as WiFi plugs, Smart TV sets, smart speakers and home ... (view more)

Thu
15
Aug
John Lister's picture

Over 1 Million Fingerprints Exposed Online

More than one million fingerprints were exposed online for at least a week, according to security researchers. The company responsible for the data says it will take immediate action if there's a security threat. The data is held by Suprema, which ... operates a biometric lock system called Biostar 2. It lets building owners restrict access by fingerprint or facial recognition, rather than relying on measures such as physical keys or pass codes. The Guardian newspaper reports that Biostar 2 is used in a wider system that has 5,700 customers accessing 1.5 million locations across 83 countries. ... (view more)

Mon
10
Jun
John Lister's picture

Scientists: Internet Usage Affects Brain Waves, Memory

Psychiatry experts say using the Internet could "affect our brain's structure, function and cognitive development." An international group of researchers say that as a result of Internet use, we may be losing our abilities to concentrate on a single ... task. The theory has to do with the way many people access the Internet - particularly with email and social media, which often means getting a string of notifications that oftentimes demand immediate attention. This means people spend less time consistently working on one task uninterrupted, which then creates a "use it or lose it" effect on ... (view more)

Pages

Subscribe to RSS - researchers