This computer scientist beats hackers at their own game

Fatemah Alharbi discovered a serious security flaw, earning thanks from Apple

By Holly Ober | | Students, Science / Technology

New attacks on graphics processors endanger user privacy

Hackers can use the graphics processing unit to spy on web activity, steal passwords, and break into cloud-based applications

By Holly Ober | | Science / Technology

New Spectre cyberthreat evades patches

New speculative execution attack launches from a computer’s return stack buffer, not the branch predictor

By Holly Ober | | Science / Technology

UC Riverside research compels response in cyber-security breach

Hackers look for vulnerabilities within computer systems, which are constructed for high performance to meet consumer demand. Tensions between systems administrators protecting the network, and those seeking to attack it, run high. If the issue is in the software layer, then fixes, patches, and repairs are installed and the public...

By Sophia Stuart | | Science / Technology

UCR research compels response in cyber-security breach

Hackers look for vulnerabilities within computer systems, which are constructed for high performance to meet consumer demand. Tensions between systems administrators protecting the network, and those seeking to attack it, run high. If the issue is in the software layer, then fixes, patches, and repairs are installed and the public...

By Sophia Stuart | | Science / Technology