WhatsApp sues spyware maker for allegedly hacking phones worldwide

Credit to Author: Lisa Vaas| Date: Thu, 31 Oct 2019 12:32:02 +0000

WhatsApp has publicly attributed the attack on its users in May 2019 to the Israeli spyware makers, NSO Group.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/rTg4uWB-Hmg” height=”1″ width=”1″ alt=””/>

Read more

Boosting the popularity of social media posts

Computer scientists created a new algorithm to recommend tags for social media posts which should boost the popularity of the post in question. This algorithm takes into account more kinds of information than previous algorithms with a similar goal. The result is a measurably improved view count for posts which use the tags recommended by this new algorithm. Such research could be useful commercially and for other researchers who study online behavior.

Read more

Extending Wi-Fi range for smart-home devices

A group of researchers has created a protocol that significantly extends the distance a Wi-Fi enabled device can send and receive signals. The engineering innovation requires no new hardware to enhance the signal range for 'Internet of things' devices, like a door sensor or motion detector, but can extend the distance these devices can be installed from a Wi-Fi access point by more than 60 meters, according to test results.

Read more

Study warns of security gaps in smart light bulbs

Smart bulbs are expected to be a popular purchase this holiday season. But could lighting your home open up your personal information to hackers? Now researchers have conducted a review of the security holes that exist in popular smart-light brands. According to the analysis, the next prime target could be that smart bulb that shoppers buy this coming holiday season.

Read more

Machine-learning analysis of X-ray data picks out key catalytic properties

Scientists seeking to design new catalysts to convert carbon dioxide (CO2) to methane have used a novel artificial intelligence (AI) approach to identify key catalytic properties. By using this method to track the size, structure, and chemistry of catalytic particles under real reaction conditions, the scientists can identify which properties correspond to the best catalytic performance, and then use that information to guide the design of more efficient catalysts.

Read more

Browser tool aims to help researchers ID malicious websites, code

Researchers have developed an open-source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs. The tool, called VisibleV8, runs in the Chrome browser and is designed to detect malicious programs that are capable of evading existing malware detection systems.

Read more