Quick Take

Cyberbullying among adults with intellectual disabilities: Some preliminary data

  How are those with intellectual disabilities affected by cyberbullying? The research team of Cristina Jenaro, Noelia Flores, Vanessa Vegab Maribel Cruz, Ma. Carmen Pérez, and Víctor A. Torres from the Universidad de Salamanca in Spain, the Pontificia Universidad Católica de Valparaíso in Chile, and the Universidad Autónoma de San Luis Potosí in Mexico provide …

Can’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory

A rowhammer attack exploits a vulnerability created by the physical characteristics of modern computer memory. Dynamic Random-Access Memory (DRAM) is a high-speed memory circuit that stores information by creating an electrical charge in tiny capacitor; which is something like a battery.  A charged capacitor represents a value (i.e.”1”) as opposed to an uncharged capacitor (“0”).  …

Why would a criminal videotape their crimes? Crime and Punishment in the Age of the Selfie

Criminals documenting themselves doing something illegal seems counterproductive. Creating a video that could prove their guilt seems bizarre.  Even though it is illogical, it still happens.  Sveinung Sandberg and Thomas Ugelvik looked into this phenomenon.  They analyzed 51 Norwegian higher court decisions involving the use of a camera as an integrated part of an offence.  …

“Thinking before posting?” Reducing cyber harassment on social networking sites through a reflective message

Harassment on online social media services or social networking sites is a growing issue and in particular, as there are a large number (1/5th) of Canadian adolescents that suffer victimization it is something that we should be looking at very seriously. Kathleen Van Royen, Karolien Poels and Heidi Vandebosch from Belgium and Philippe Adam from …

Impact of Cyber Attacks on Data Integrity in Transient Stability Control

The development of intelligent energy management or smart grid systems are quite weak advanced however the critical nature of this infrastructure means that the reliability and security of the connected components are concerning. Maintaining energy stability across variations in generation and demand depends on the ability of the synchronous generators in the power system to …

Image-Centric Social Discovery Using Neural Network under Anonymity Constraint

A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …