-
Deep Learning AI Improves Facial Movement Tracking
A growing area of research in mobile data collection is the real-time tracking and communication of facial movements. While this presents another opportunity for human progress through data, it also…
-
Use Retraction Watch to Keep Tabs on Bogus “Hijacked” Journals
As a research institution, we know the value of credible, peer- reviewed journals. To cite and be cited is the lifeblood of modern academic discourse. But how do you know…
-
A New Approach to Defeating Audio Capture Transcription
In a previous message, we discussed the revelation that various videoconferencing apps were continuing to collect audio data even when microphones were muted, against the expectations of most users. Taking concerns…
-
Muting in Virtual Meetings May Not Guarantee Privacy
It is not unreasonable to assume that when you mute yourself in a virtual meeting, your microphone will no longer be accessed by the meeting application. However, a new study…
-
Apache HTTP Server Critical Vulnerability under Active Exploitation
There are reports of active attacks on Apache servers. Apache HTTP Server 2.4.48 and earlier are vulnerable to a server-side request forgery (SSRF) flaw, allowing attackers to send crafted requests…
-
Another high-profile cybersecurity breach
It is increasingly easy to generate large amounts of content online. With a click of a button, moments of our lives are created in photo and video and whisked immediately…
-
New Technique Promises to Improve Privacy and Security for Cloud-Hosted Photos
It is increasingly easy to generate large amounts of content online. With a click of a button, moments of our lives are created in photo and video and whisked immediately…
-
Clever persistent online tracking method via favicons
You are probably familiar with favicons, small (16×16 pixel) icons associated with websites. The icon is typically displayed on the browser tab of the website you are visiting. However, you are…