cybersecurity

Cybersecurity: new times, new challenges

,
Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical…
cyberdefense

Cyberdefense seeks to regain control

,
Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done,…
fraud

Fraud on the line

,
An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult…
ships

Protecting ships against modern-day pirates

,
Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher…
cyber-attacks

Using hardware to defend software against cyber-attacks

,
Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors…
hardware attacks

Hardware attacks, a lingering threat for connected objects

,
Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly…
consent, consentement

GDPR: managing consent with the blockchain?

, ,
Blockchain and GDPR: two of the most-discussed keywords in the digital sector in recent months and years. At Télécom SudParis, Maryline Laurent has decided to bring the two together. Her research focuses on using the blockchain to manage consent…
MRI

Mathematical tools for analyzing the development of brain pathologies in children

, ,
Magnetic resonance imaging (MRI) enables medical doctors to obtain precise images of a patient's structure and anatomy, and of the pathologies that may affect the patient's brain. However, to analyze and interpret these complex images, radiologists…
gender diversity, digital professions

Why women have become invisible in IT professions

, ,
Female students have deserted computer science schools and women seem mostly absent from companies in this sector. The culprit: the common preconception that female computer engineers are naturally less competent than their male counterparts. …
Aizimov BEYABLE startup artificial intelligence

Artificial Intelligence hiding behind your computer screen!

, ,
Far from the dazzle of intelligent humanoid robots and highly effective chatbots, artificial intelligence is now used in many ordinary products and services. In the software and websites consumers use on a daily basis, AI is being used to improve…