Skip to content
ScienceBlog.com
  • Featured Blogs
    • EU Horizon Blog
    • ESA Tracker
    • Experimental Frontiers
    • Josh Mitteldorf’s Aging Matters
    • Dr. Lu Zhang’s Gondwanaland
    • NeuroEdge
    • NIAAA
    • SciChi
    • The Poetry of Science
    • Wild Science
  • Topics
    • Brain & Behavior
    • Earth, Energy & Environment
    • Health
    • Life & Non-humans
    • Physics & Mathematics
    • Space
    • Technology
  • Our Substack
  • Follow Us!
    • Bluesky
    • Threads
    • FaceBook
    • Google News
    • Twitter/X
  • Contribute/Contact

cybersecurity

Blockchain based Federated Learning Model

New Blockchain System Could Better Protect Internet of Things from Cyber Attacks

Categories Physics & Mathematics, Technology
The Blast-RADIUS attack flow. More than 90 vendors have been involved in a coordinated disclosure and issued security bulletins.

RADIUS Security Flaw Exposes Decades-Old Vulnerability in Enterprise Networks

Categories Technology
Researcher Jamie Lian leads ORNL’s contributions to a tool suite that uses machine learning for more effective cybersecurity analytics

Artificial intelligence tools secure tomorrow’s electric grid

Categories Earth, Energy & Environment, Technology
Researchers developed a firmware update that hides a device's Bluetooth fingerprint

Simple Update Makes Bluetooth Devices Untraceable, Researchers Say

Categories Technology
Flying single photons emitted from a quantum dot are coupled into a field-based deployed fibre in the city of Hannover, Germany, and sent to Braunschweig, Germany.

‘Artificial Atoms’ Power First Intercity Quantum Communication Link

Categories Physics & Mathematics, Technology
snail illustration with zeroes and ones

New security loophole allows spying on internet users visiting websites and watching videos

Categories Technology
Container ship at night

AI-Driven Cyberattacks Pose Unprecedented Risks to Global Economies and Trade, Study Reveals

Categories Social Sciences, Technology
Illustration on UN report cover

Gender Biases in AI Systems Pose Risks to Women’s Security in South-East Asia

Categories Social Sciences, Technology
A generated image showing a computer processor with a magnifying glass revealing the Path History Register and branch predictor, along with a warning sign indicating a security vulnerability

Researchers Uncover New High-Precision Attacks Targeting Billions of Intel and AMD Processors

Categories Social Sciences, Technology
AI art of mobile account security

Researchers unveil new way to counter mobile phone ‘account takeover’ attacks

Categories Technology
Quantum random number generation based on a perovskite light emitting diode.

Better cybersecurity with new quantum material

Categories Physics & Mathematics
A malware warning on a futuristic computer screen. | Image: Getty Images

Detecting malware through hardware-integrated protection

Categories Technology
Researchers have created a system to examine how a hacker can circumvent a particular type of cybersecurity method, in an effort to determine how much secret information that attacker could steal from a computer program. Credits:Image: iStock

MIT researchers devise a way to evaluate cybersecurity methods

Categories Technology
Older posts
Page1 Page2 Next →

Comments

  • Melissa Baez on Medicinal Mushrooms Show Promise for Treating Brain Disorders
  • Melissa Baez on Ultra-Processed Foods May Speed Up Early Signs of Parkinson’s
  • ScienceBlog.com on Scientists Capture For First Time Mind-Bending Einstein Effect
  • Jeffrey on Medicinal Mushrooms Show Promise for Treating Brain Disorders
  • Mike on Scientists Capture For First Time Mind-Bending Einstein Effect
Substack subscription form sign up

© 2025 ScienceBlog.com | Follow our RSS / XML feed