fraud

Fraud on the line

,
An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult…
ships

Protecting ships against modern-day pirates

,
Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher…
cyber-attacks

Using hardware to defend software against cyber-attacks

,
Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors…
hardware attacks

Hardware attacks, a lingering threat for connected objects

,
Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly…
consent, consentement

GDPR: managing consent with the blockchain?

, ,
Blockchain and GDPR: two of the most-discussed keywords in the digital sector in recent months and years. At Télécom SudParis, Maryline Laurent has decided to bring the two together. Her research focuses on using the blockchain to manage consent…
MRI

Mathematical tools for analyzing the development of brain pathologies in children

, ,
Magnetic resonance imaging (MRI) enables medical doctors to obtain precise images of a patient's structure and anatomy, and of the pathologies that may affect the patient's brain. However, to analyze and interpret these complex images, radiologists…
gender diversity, digital professions

Why women have become invisible in IT professions

, ,
Female students have deserted computer science schools and women seem mostly absent from companies in this sector. The culprit: the common preconception that female computer engineers are naturally less competent than their male counterparts. …
Aizimov BEYABLE startup artificial intelligence

Artificial Intelligence hiding behind your computer screen!

, ,
Far from the dazzle of intelligent humanoid robots and highly effective chatbots, artificial intelligence is now used in many ordinary products and services. In the software and websites consumers use on a daily basis, AI is being used to improve…
blockchains

Can we trust blockchains?

,
Maryline Laurent, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style="normal" top="20" bottom="20"] [dropcap]B[/dropcap]lockchains were initially presented as a very innovative technology with great…
campus mondial de la mer

Campus Mondial de la Mer: promoting Brittany’s marine science and technology research internationally

, , ,
If the ocean were a country, it would be the world's 7th-largest economic power, according to a report by the WWF, and the wealth it produces could double by 2030. The Brittany region, at the forefront of marine science and technology research,…