Inspired by Wall Street financial theories used to invest in the stock market, MIT and Microsoft researchers developed a 'risk-aware' model that improves the performance of cloud-computing infrastructure used across the globe.
A new clinical model developed by Cornell Tech researchers aims to respond systematically and effectively to the growing array of digital threats against victims of intimate partner violence. Working with the New York City Mayor's Office to End Domestic and Gender-Based Violence, the researchers created and piloted a questionnaire, a spyware scanning tool and a diagram for assessing clients' digital footprints.
According to Adar Ovadya, a master's student in BGU's Department of Software and Information Systems Engineering, 'all of the routers we surveyed regardless of brand or price point were vulnerable to at least some cross-network communication once we used specially crafted network packets. A hardware-based solution seems to be the safest approach to guaranteeing isolation between secure and non-secure network devices.'
Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don't even know exists.
The result of the 2016 US presidential election was, for many, a surprise lesson in social perception bias -- peoples' tendency to assume that others think as we do, and to underestimate the size and influence of a minority party. Many psychologists attribute the source of these biases to faulty cognitive processes like 'wishful thinking' or 'social projection,' but according to a study published August 12, 2019 in Nature Human Behavior, the structure of our social networks might offer a simpler explanation.
The internet can serve as a pathway to diagnosis and care for people who suspect they have a rare condition that has not been identified by their physicians, according to a study by researchers at Wake Forest School of Medicine, part of Wake Forest Baptist Health.
Just over 15 years after the first reported incident of phishing, new research from the University of Plymouth suggests tech companies could be doing more to protect users from the threat of scams. However, greater awareness of the issue is also needed among individuals and organisations.
In a future when self-driving and other internet-connected cars share the roads with the rest of us, hackers could not only wreck the occasional vehicle but possibly compound attacks to gridlock whole cities by stalling out a limited percentage of cars. Physicists calculated how many hacked, stalled connected cars would cause how much mayhem.
What does the future of digital spam look like, what risks could it pose to our personal security and privacy, and what can we do to fight it?
Using YouTube to learn about climate-change-related topics will expose you to video content that mostly opposes worldwide scientific consensus. That's the finding of a new study, which also reveals that conspiracy theorists have 'hijacked' some scientific terms, such as 'geoengineering,' so that searches provide entirely non-scientific content. Scientists could counteract this by forming alliances with influential YouTubers, politicians and those in popular culture, to ensure scientifically accurate video content reaches the widest-possible audience.