Who (secretly) run the world? Algorithms

February 13, 2017

It is likely that everything and anything you do online, from streaming a movie, to browsing for a new handbag, to even applying for a car loan, is slightly controlled by an algorithm. They will always have a say on the outcome. The complex mathematical formulas are playing a growing role in all walks of life: from detecting skin cancers to suggesting new Facebook friends, deciding who gets a job,…

Read More >>

Protecting our power infrastructures from hackers

February 13, 2017

Rising to a new norm, the reliability measures of electrical grid involves physical security and cybersecurity. Threats to both of these can trigger instability, leading to blackouts and economic losses. Scientists from Michigan Technological University have conducted research which delves into so-called ‘nightmare’ scenarios where hackers exploit security weaknesses and execute a disruptive plan of cyberattacks. The journal IEEE Transactions on Smart Grid published their work recently. Lead author Chee-Wooi…

Read More >>

SEM Security Processors win Linley Group’s Analysts’ Choice award

The Linely Group’s 2016 Analysts’ Choice Award for Best Processor IP, has been awarded to Synopsys. Synopsys’ DesignWare ARC SEM security processors were selected based on their power and performance efficiency as well as unique security features that address the needs of low-power embedded applications such as smart metering, NFC payment and embedded SIMs. The Linley Group, publisher of Microprocessor Report, is a leading industry source for independent technology analysis…

January 26, 2017
Read More >>

Machine-learning and neurology for face recognition

facerecognitionimageee
December 2, 2016

A new computational model of the human brain’s face-recognition mechanism that seems to capture aspects of human neurology that previous models have missed, has been developed by MIT researchers. The researchers designed a machine-learning system that implemented their model, and they trained it to recognize particular faces by feeding it a battery of sample images. They found that the trained system included an intermediate processing step that represented a face’s…

Read More >>

Hacking a credit card in six seconds

cardsecurityhimageee
December 2, 2016

It can take as little as six seconds to work out the card number, expiry date and security code of any Visa credit or debit cardand uses nothing more than guesswork, new research has shown. Research published in the academic journal IEEE Security & Privacy, shows how the so-called Distributed Guessing Attack is able to circumvent all the security features put in place to protect online payments from fraud. Exposing…

Read More >>

Protecting your sleepy laptop

November 24, 2016

In this day and age nothing is safe; with WikiLeaks, Russian hacks and spies, and increased government surveillance, computer users are understandably feeling worried about preventing and protecting their personal information. However there could be a solution. Hypnoguard, powerful new software developed by Concordia University researchers to safeguard data even when computer is in sleep mode. Sweet dreams are made of this PhD candidate Lianying Zhao, explained: “Protecting data is…

Read More >>

Shuffling the pack stops cyber attacks

November 17, 2016

Hackers will always be able to exploit coding and software, as long as humans are writing the software and there is the odd coding mistake. Just a single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief. However the new program called ‘Shuffler’ tries to obstruct such attacks by allowing programs to continuously scramble their code as they run, effectively closing…

Read More >>

Handheld device changes shape to help sighted and blind navigate better

September 22, 2016

An engineer from Yale University has created a shape-shifting navigation device for both the sighted and visually impaired populations — basically everyone. Adam Spiers, a postdoctoral associate in the robotics lab of associate professor Aaron Dollar, worked on a London-based interactive production of “Flatland.” The production took place in an old church where both sighted and visually impaired audience members were kept in complete darkness most of the time as they wandered…

Read More >>

New approach to home security lets you be everywhere at once

September 20, 2016

A New York-based engineering product design company called Canary has released a brand new solution for home security. The Canary Flex is the first indoor and outdoor, weatherproof, HD security camera that can be used both wire-free or plugged in. The camera records HD video with its 147-degree wide-angle lens  and audio with automatic night vision and a wide-angle lens. The viewing radius ensures your living room, nursery, backyard or porch is…

Read More >>

Engineers create networks that divert hacker’s attacks

September 12, 2016

Penn State computer scientists have figured out how to create flexible networks that can detect threats from hackers and help deflect the repercussions of those attacks. “Because of the static nature of a computer network, the attacker has a time advantage,” said Dinghao Wu, assistant professor of information sciences and technology. “Hackers can spend a month, two months, six months or more just studying the network and finding vulnerabilities. When…

Read More >>