Skip to content
ScienceBlog.com
  • Featured Blogs
    • EU Horizon Blog
    • ESA Tracker
    • Experimental Frontiers
    • Josh Mitteldorf’s Aging Matters
    • Dr. Lu Zhang’s Gondwanaland
    • NeuroEdge
    • NIAAA
    • SciChi
    • The Poetry of Science
    • Wild Science
  • Topics
    • Brain & Behavior
    • Earth, Energy & Environment
    • Health
    • Life & Non-humans
    • Physics & Mathematics
    • Space
    • Technology
  • Our Substack
  • Follow Us!
    • Bluesky
    • Threads
    • FaceBook
    • Google News
    • Twitter/X
  • Contribute/Contact

cybersecurity

Blockchain based Federated Learning Model

New Blockchain System Could Better Protect Internet of Things from Cyber Attacks

Categories Physics & Mathematics, Technology
The Blast-RADIUS attack flow. More than 90 vendors have been involved in a coordinated disclosure and issued security bulletins.

RADIUS Security Flaw Exposes Decades-Old Vulnerability in Enterprise Networks

Categories Technology
Researcher Jamie Lian leads ORNLโ€™s contributions to a tool suite that uses machine learning for more effective cybersecurity analytics

Artificial intelligence tools secure tomorrowโ€™s electric grid

Categories Earth, Energy & Environment, Technology
Researchers developed a firmware update that hides a device's Bluetooth fingerprint

Simple Update Makes Bluetooth Devices Untraceable, Researchers Say

Categories Technology
Flying single photons emitted from a quantum dot are coupled into a field-based deployed fibre in the city of Hannover, Germany, and sent to Braunschweig, Germany.

‘Artificial Atoms’ Power First Intercity Quantum Communication Link

Categories Physics & Mathematics, Technology
snail illustration with zeroes and ones

New security loophole allows spying on internet users visiting websites and watching videos

Categories Technology
Container ship at night

AI-Driven Cyberattacks Pose Unprecedented Risks to Global Economies and Trade, Study Reveals

Categories Social Sciences, Technology
Illustration on UN report cover

Gender Biases in AI Systems Pose Risks to Women’s Security in South-East Asia

Categories Social Sciences, Technology
A generated image showing a computer processor with a magnifying glass revealing the Path History Register and branch predictor, along with a warning sign indicating a security vulnerability

Researchers Uncover New High-Precision Attacks Targeting Billions of Intel and AMD Processors

Categories Social Sciences, Technology
AI art of mobile account security

Researchers unveil new way to counter mobile phone โ€˜account takeoverโ€™ attacks

Categories Technology
Quantum random number generation based on a perovskite light emitting diode.

Better cybersecurity with new quantum material

Categories Physics & Mathematics
A malware warning on a futuristic computer screen. | Image: Getty Images

Detecting malware through hardware-integrated protection

Categories Technology
Researchers have created a system to examine how a hacker can circumvent a particular type of cybersecurity method, in an effort to determine how much secret information that attacker could steal from a computer program. Credits:Image: iStock

MIT researchers devise a way to evaluate cybersecurity methods

Categories Technology
Older posts
Page1 Page2 Next →

Comments

  • Jeremy Goff on AI Creates Materials That Could Cut Your Cooling Costs
  • Anthony Daniel Rogan on AI Minds Think Like Ours Through Hidden Mathematical Shapes
  • Swetapadma Panda on Researchers Crack the Code to Simulating Error-Proof Quantum Machines
  • Frank on Time Is The Fundamental Fabric of the Universe, Study Suggests
  • Bill on Time Is The Fundamental Fabric of the Universe, Study Suggests
Substack subscription form sign up

© 2025 ScienceBlog.com | Follow our RSS / XML feed