Skip to content
ScienceBlog.com
  • Featured Blogs
    • EU Horizon Blog
    • ESA Tracker
    • Experimental Frontiers
    • Josh Mitteldorf’s Aging Matters
    • Dr. Lu Zhang’s Gondwanaland
    • NeuroEdge
    • NIAAA
    • SciChi
    • The Poetry of Science
    • Wild Science
  • Topics
    • Brain & Behavior
    • Earth, Energy & Environment
    • Health
    • Life & Non-humans
    • Physics & Mathematics
    • Social Sciences
    • Space
    • Technology
  • Our Substack
  • Follow Us!
    • Bluesky
    • Threads
    • FaceBook
    • Google News
    • Twitter/X
  • Contribute/Contact

cybersecurity

Blockchain based Federated Learning Model

New Blockchain System Could Better Protect Internet of Things from Cyber Attacks

The Blast-RADIUS attack flow. More than 90 vendors have been involved in a coordinated disclosure and issued security bulletins.

RADIUS Security Flaw Exposes Decades-Old Vulnerability in Enterprise Networks

Researcher Jamie Lian leads ORNL’s contributions to a tool suite that uses machine learning for more effective cybersecurity analytics

Artificial intelligence tools secure tomorrow’s electric grid

Researchers developed a firmware update that hides a device's Bluetooth fingerprint

Simple Update Makes Bluetooth Devices Untraceable, Researchers Say

Flying single photons emitted from a quantum dot are coupled into a field-based deployed fibre in the city of Hannover, Germany, and sent to Braunschweig, Germany.

‘Artificial Atoms’ Power First Intercity Quantum Communication Link

snail illustration with zeroes and ones

New security loophole allows spying on internet users visiting websites and watching videos

Container ship at night

AI-Driven Cyberattacks Pose Unprecedented Risks to Global Economies and Trade, Study Reveals

Illustration on UN report cover

Gender Biases in AI Systems Pose Risks to Women’s Security in South-East Asia

A generated image showing a computer processor with a magnifying glass revealing the Path History Register and branch predictor, along with a warning sign indicating a security vulnerability

Researchers Uncover New High-Precision Attacks Targeting Billions of Intel and AMD Processors

AI art of mobile account security

Researchers unveil new way to counter mobile phone ‘account takeover’ attacks

Quantum random number generation based on a perovskite light emitting diode.

Better cybersecurity with new quantum material

A malware warning on a futuristic computer screen. | Image: Getty Images

Detecting malware through hardware-integrated protection

Researchers have created a system to examine how a hacker can circumvent a particular type of cybersecurity method, in an effort to determine how much secret information that attacker could steal from a computer program. Credits:Image: iStock

MIT researchers devise a way to evaluate cybersecurity methods

The race to make hospitals cybersecure

Older posts
Page1 Page2 Next →
Substack subscription form sign up

Comments

  • brenojames on Global warming reduces available wind energy
  • Kidreadytobreed on Global warming reduces available wind energy
  • James on Global warming reduces available wind energy
  • James on Global warming reduces available wind energy
  • Booklet AI on Key to online education: Test early and often
© 2026 ScienceBlog.com | Follow our RSS / XML feed