Live Breaking News & Updates on Usenix security

Stay informed with the latest breaking news from Usenix security on our comprehensive webpage. Get up-to-the-minute updates on local events, politics, business, entertainment, and more. Our dedicated team of journalists delivers timely and reliable news, ensuring you're always in the know. Discover firsthand accounts, expert analysis, and exclusive interviews, all in one convenient destination. Don't miss a beat — visit our webpage for real-time breaking news in Usenix security and stay connected to the pulse of your community

Attack of the week: Airdrop tracing

Attack of the week: Airdrop tracing
cryptographyengineering.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from cryptographyengineering.com Daily Mail and Mail on Sunday newspapers.

Hong-kong , Beijing , China , India , Chinese , China-beijing-wangshendongjian-judicial-appraisal-institute , Bloomberg , Apple-airdrop , Usenix-security , Private-set-intersection , Contacts-only

Development of Cache Random Function to Enable Fast and Secure Data Access Between CPU Memories

Development of Cache Random Function to Enable Fast and Secure Data Access Between CPU Memories
streetinsider.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from streetinsider.com Daily Mail and Mail on Sunday newspapers.

Federico-canale , Gregor-leander , Nick-gibiser , Jan-philipp-thoma , Scale-adversaries-at-ruhr-university-bochum , Planning-department , Background-of-research , Wireside-communications , Service-innovation-laboratory-group , Research-institute-of-electrical-communication , Tohoku-university , Cache-attacks

NTT advances CPU security with new cache random function

In this research, NTT first investigated what the attacker can actually do with a cache random function, and then worked on a design attack model for specified cache randomization...

Tohoku , Japan-general- , Japan , Tokyo , Gregor-leander , Federico-canale , Jan-philipp-thoma , Research-institute-of-electrical-communication , Scale-adversaries-at-ruhr-university-bochum , Tohoku-university , Background-of-research , Research-institute

TETRA comms used by emergency workers 'easily cracked'

TETRA comms used by emergency workers 'easily cracked'
theregister.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from theregister.com Daily Mail and Mail on Sunday newspapers.

Netherlands , United-states , United-kingdom , America , Las-vegas , European-telecommunications-standards-institute , European-commission , Midnight-blue , Terrestrial-trunked-radio , Air-interface-encryption , Derived-cypher-key , Black-hat

TETRA comms used by emergency workers 'easily cracked'

TETRA comms used by emergency workers 'easily cracked'
theregister.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from theregister.com Daily Mail and Mail on Sunday newspapers.

Netherlands , United-states , United-kingdom , America , Las-vegas , European-commission , European-telecommunications-standards-institute , Updated-midnight-blue , Terrestrial-trunked-radio , Air-interface-encryption , Midnight-blue , Derived-cypher-key

A fundamental mechanism that secures the internet has been broken

Resource Public Key Infrastructure -- or RPKI -as it's better known -- is a security framework that is designed to prevent cybercriminals or rogue states from diverting internet traffic.

Russia , Frankfurt , Brandenburg , Germany , Haya-shulman , Twitter , Darmstadt-university-of-technology , Goethe-university-frankfurt-am-main , Resource-public-key , Resource-public-key-infrastructure , Usenix-security , Blackhat-united-states

Mechanism for Internet security broken

The National research center for Cybersecurity ATHENE has found a way to break one of the basic mechanisms used to secure Internet traffic

Russia , Frankfurt , Brandenburg , Germany , Haya-shulman , Technology-news , Twitter , Darmstadt-university-of-technology , Goethe-university-frankfurt-am-main , Resource-public-key-infrastructure , Usenix-security , Blackhat-united-states

New Retbleed speculative execution CPU attack bypasses Retpoline fixes

Security researchers have discovered a new speculative execution attack called Retbleed that affects processors from both Intel and AMD and could be used to extract sensitive information.

Zurich , Züsz , Switzerland , Branch-prediction-unit , Indirect-branch-restricted-speculation , Intel , New-retbleed , Intel-core , Coffee-lake , Usenix-security , Computers

Thousands of Websites Are Collecting Everything You Type

And by everything, we mean even if you don't tap submit on a form or newsletter sign-up page.

Facebook , Radboud-university , University-of-lausanne , Ars-technica , Both-meta , Usenix-security ,