Remove category research-papers
article thumbnail

GhostTouch: how to remotely control touchscreens with EMI

Security Affairs

Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of researchers from Zhejiang University and Technical University of Darmstadt devised a technique, dubbed GhostTouch, to remotely control capacitive touchscreens using electromagnetic signals.

article thumbnail

Using WiFi connection probe requests to track users

Security Affairs

Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. The researchers conducted a field experiment in a German city where they captured probe requests of passersby and analyzed their content for three hours, with a focus on SSIDs and identifying information. .

Mobile 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PACMAN, a new attack technique against Apple M1 CPUs

Security Affairs

The researchers who devised the attack technique speculate that the principles behind the PACMAN attacks could be used for much more than just PAC. The technique was discovered by researchers at MIT’s Computer Science & Artificial Intelligence Laboratory (CSAIL), Joseph Ravichandran , Weon Taek Na , Jay Lang , and Mengjia Yan.

article thumbnail

Effective AI Regulation Requires Adaptability and Collaboration

Security Boulevard

Recently, two researchers from the University of Ottawa and McGill University performed a meticulous analysis of the AI Act, unraveling its profound impact on the perception of AI systems and potential harms they may bring.

article thumbnail

Insights about the first five years of Right to be Forgotten requests at Google

Elie

So in January 2016, as a preparation to providing better statistical analysis, our RTBF reviewers started manually annotating each requested URL with additional data, including the site category, the type of page content, and the requesting entity. The result of this study was published in a research paper at. paper table 3.

Media 118
article thumbnail

New Year’s resolution: keeping cybercriminals and scammers at bay

BH Consulting

Research from the World Economic Forum found “young people who leave school during recessions are significantly more likely to become involved in crime”. Back in October, we blogged about how phishing scams are becoming more common. Remind people that we tend to put email and text messages into the ‘urgent and important’ category.

Scams 52
article thumbnail

Security Roundup October 2021

BH Consulting

A new category for this edition is ‘insecure design’. We also cover this attack vector in our comprehensive white paper on ransomware. Research from Respect in Security found that 35 per cent of cybersecurity professionals have experienced harassment in person at industry events, in the workplace, or at work social occasions.

VPN 52