researchers

Thu
24
Jun
John Lister's picture

Key To Viral Posts: Naming Political Opponents

Social media users are more likely to share posts that criticize political opponents by name than those which praise people and ideas they support according to newly-published research. The pattern was consistent across different sites and people ... with different views. Researchers at the University of Cambridge were exploring what makes some posts on Facebook and Twitter more likely to be shared. Previous research had suggested the main driver was the tone of the language, with negative emotions such as anger, or a "sense of moral indignation" the most likely to lead to a post being widely ... (view more)

Tue
11
Feb
John Lister's picture

Scientists use Light, Sound to Produce 100 Gbps Internet

Researchers believe a new type of cable could carry Internet data at speeds 100 times greater than even the fastest on offer today. The new technology could benefit hospitals and research facilities in particular. The technique was developed by ... researchers at universities in Leeds and Nottingham in the United Kingdom, and is based around similar technology found in fiber optic cables. Those are the fastest data-carrying cables and work by sending pulses of light down a tiny transparent tube. By far, the greatest benefit of utilizing fiber optic cables is that it can transfer data over long ... (view more)

Wed
20
Nov
John Lister's picture

Android Malware Records Calls, Tracks Location

Google is fixing an Android bug that let hackers remotely capture videos and images without permission. The bug could also have revealed the user's precise location, making it particularly dangerous if exploited by stalkers. Security researchers at ... Checkmarx discovered the bug in several default camera apps on a variety of Android phones, including the Google and Samsung apps. (Source: arstechnica.com ) The bug could only be exploited once malware was on the phone, but even then it still shouldn't have allowed such an attack. That's because it involved using a rogue app on the phone to access ... (view more)

Wed
30
Oct
John Lister's picture

New Malware Hides Inside Audio Files

Most people know not to open an executable file or document attached to an email unless they were expecting it. But a new example of malware means even an audio file could trigger a payload. Researchers at Blackberry Cylance Threat recently ... uncovered malicious code hidden inside WAV files. That's a computer format for audio that was common for music on PCs before MP3 became established. The attackers are using a technique called steganography, which is a way to hide a file inside another file in a way that normally cannot be detected. Steganography has previously been used in image files, and ... (view more)

Wed
02
Oct
John Lister's picture

Major VOIP Security Flaws Discovered in Android

Researchers say they discovered eight security flaws in the way Android handles voice calls through the Internet. Unlike most such bugs which involve specific apps, these problems were with Android itself. The good news is that the researchers ... reported all of the bugs to Google while carrying out the project and most have now been fixed. However, it does raise concerns about the development and design of the system itself. (Source: github.io ) The researchers looked at the three latest Android versions (7, 8 and 9), specifically addressing the components that allow Voice Over Internet ... (view more)

Thu
19
Sep
John Lister's picture

Study Reveals Smart Gadgets Share Data Unexpectedly

Researchers have discovered that many smart gadgets (such as smart TVs and streaming sticks) send data to tech companies, even when idle. The purpose of the experiment was to determine if devices were being used to monitor users, or could ... potentially leak data about the user to a third party. The research was a joint project between Northeastern University and the UK's Imperial College London. They examined 81 devices under the broad category of the Internet of Things (IoT). The study included security cameras, home automation devices such as WiFi plugs, Smart TV sets, smart speakers and home ... (view more)

Thu
15
Aug
John Lister's picture

Over 1 Million Fingerprints Exposed Online

More than one million fingerprints were exposed online for at least a week, according to security researchers. The company responsible for the data says it will take immediate action if there's a security threat. The data is held by Suprema, which ... operates a biometric lock system called Biostar 2. It lets building owners restrict access by fingerprint or facial recognition, rather than relying on measures such as physical keys or pass codes. The Guardian newspaper reports that Biostar 2 is used in a wider system that has 5,700 customers accessing 1.5 million locations across 83 countries. ... (view more)

Mon
10
Jun
John Lister's picture

Scientists: Internet Usage Affects Brain Waves, Memory

Psychiatry experts say using the Internet could "affect our brain's structure, function and cognitive development." An international group of researchers say that as a result of Internet use, we may be losing our abilities to concentrate on a single ... task. The theory has to do with the way many people access the Internet - particularly with email and social media, which often means getting a string of notifications that oftentimes demand immediate attention. This means people spend less time consistently working on one task uninterrupted, which then creates a "use it or lose it" effect on ... (view more)

Wed
08
May
John Lister's picture

Scientists: Social Media Effects on Kids 'Trivial'

A University of Oxford study claims any negative effects of social media on teens are likely trivial. It said other life events had a far greater effect. The study used data from extensive household surveys that ran between 2009 and 2016 which ... covered a wide range of issues. The researchers mined the survey results for responses from children who were aged 10 to 15 at the time of questioning, with more than 12,000 children covered. (Source: pnas.org ) The researchers looked at questions about how many hours the children spent communicating on social networks on school days. They compared this ... (view more)

Thu
19
Jul
John Lister's picture

Scientists: Internet 'At Risk' of Climate Change

Researchers say key physical infrastructure that keeps the Internet working could be underwater within 15 years. They say the effects of climate change over the next century will have an impact on the equipment sooner than later. The researchers, ... from the Universities of Oregon and Wisconsin, explored the risks to US-based infrastructure including both the cables that carry Internet data and the key 'nodes' in the network such as colocation centers. These facilities not only route Internet data, but also house the computers where many websites are physically stored. Major website often rent ... (view more)

Pages

Subscribe to RSS - researchers