Skip to Main content Open mobile menu Close mobile menu
Real-time monitor tracks the growing use of network filters for censorship
  1. Real-time monitor tracks the growing use of network filters for censorship

    The team says their framework can scalably and semi-automatically monitor the use of filtering technologies for censorship at global scale.

  2. Not enough voters detecting ballot errors and potential hacks, study finds

    Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.

    The post Not enough voters detecting ballot errors and potential hacks, study finds appeared first on Engineering Research News.

  3. Researchers design new solution to widespread side-channel attacks

    The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.

  4. How Let’s Encrypt doubled the percentage of secure websites in four years

    A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.

  5. How Russia’s online censorship could jeopardize internet freedom worldwide

    The nation is using inexpensive commodity equipment to block 170K domains on more than 1K privately-owned ISPs.

    The post How Russia’s online censorship could jeopardize internet freedom worldwide appeared first on Engineering Research News.

  6. Researchers take control of Siri, Alexa, and Google Home with lasers

    The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.

  7. Offensive vehicle security toolbox makes car hacking easier

    The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.

  8. New tool combats evolving internet censorship methods

    Technology pioneered by Michigan researchers can circumvent many effective website blocking tools

  9. Year of vulnerability hunting uncovers potential attacks on Intel Chips, RAM

    All three of these attacks put users’ privacy at risk, exploiting new routes to sensitive data.

  10. Remote attack on temperature sensors threatens safety in incubators and industry

    The researchers demonstrated that an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.