Category

cybersecurity

Profiles

Latest Articles

Researchers at DTU have set out to create novel tools to identify internet-of-things gadgets that leave the door open to hacker attacks. Knowing where these devices are and making them secure is a powerful weapon in the fight against attackers.

Setting out to sink the internet's digital ghost ships

Featured

Trustworthy and reliable applications are fueling the worldwide IoT success story. This article explains why protecting IoT edge devices is crucial in an environment with threats on the rise.

IoT needs trust: The current state of IoT security

We need better control over our personal data if we are to keep hackers and commercial interests from knowing our every move. DTU plays an important role in a large EU-funded research project developing a digital vault that lets you manage who has access to your personal data.

Taking back privacy control

You've probably heard about the amazing capabilities of some recent AI models, such as GPT, AI21, or BLOOM. Perhaps you use one of these models yourself. Either directly, or through another product like Wordtune, YouWrite, Jasper – or ChatGPT. It turns out that while these models are trained on language data, they can be used for other applications as well. In my latest article, you can read more about applications in materials discovery, cybersecurity, and even building management.

Applying large-scale language models outside language: Examples from materials discovery, cybersecurity, and building management

A new attack discovered by the University of Michigan and NASA exploits a trusted network technology to create unexpected and potentially catastrophic behavior

Cyber vulnerability in networks used by spacecraft, aircraft and energy generation systems

Cybersecurity Researchers Show How Attackers Can See Your Online Ads Knowing Only Your Email Address

New Research Gives Users Another Reason to Hate Unwanted Ads

MIT alumnus-founded Metrika has developed a suite of analytics tools giving blockchain communities visibility into their networks.

Helping blockchain communities fix bugs

IoT security can be addressed with embedded microcontroller units (MCUs).

Solving IoT Security Issues with Embedded Microcontrollers

Article #5 Electronics Innovation Series. IoT security is a shared responsibility between chip manufacturers, hardware designers, and the consumer.

Design With Security in Mind: Why Manufacturers Need to Plan for IoT Device Security from the Beginning

Researchers increase the accuracy and efficiency of a machine-learning method that safeguards user data.

Collaborative machine learning that preserves privacy

Researchers found that an understudied component of computer processors is susceptible to attacks from malicious agents. Then, they developed mitigation mechanisms.

Thinking like a cyber-attacker to protect user data

With the rise of the Internet of Things (IoT) and “Industry 4.0,” industrial sites and critical national infrastructure are becoming connected networks.

Protecting the Industrial Edge without Additional Hardware

ETH Zurich researchers have discovered a serious security vulnerability in computer hardware. The vulnerability, called "Retbleed," affects microprocessors from market leaders Intel and AMD. All commercially available operating systems worldwide that use these processors are affected.

Speculative calculations open a backdoor to information theft

Using a hypothetical fingerprint reader device as an example learn how to protect data and how to plan security implementation.

Securing Your IP and Protecting Sensitive Data

Wevolver 2023