cybersecurity

Cybersecurity: new times, new challenges

,
Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical…
cyberdefense

Cyberdefense seeks to regain control

,
Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done,…
fraud

Fraud on the line

,
An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult…
ships

Protecting ships against modern-day pirates

,
Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher…
cyber-attacks

Using hardware to defend software against cyber-attacks

,
Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors…
hardware attacks

Hardware attacks, a lingering threat for connected objects

,
Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly…
consent, consentement

GDPR: managing consent with the blockchain?

, ,
Blockchain and GDPR: two of the most-discussed keywords in the digital sector in recent months and years. At Télécom SudParis, Maryline Laurent has decided to bring the two together. Her research focuses on using the blockchain to manage consent…
supercritical fluid

What is a supercritical fluid?

, ,
Water, like any chemical substance, can exist in a gaseous, liquid or solid state… but that’s not all! When sufficiently heated and pressurized, it becomes a supercritical fluid, halfway between a liquid and a gas. Jacques Fages, a researcher…
Earth

Will the earth stop rotating after August 1st?

, ,
By Natacha Gondran, researcher at Mines Saint-Étienne, and Aurélien Boutaud. The original version of this article (in French) was published in The Conversation. [divider style="normal" top="20" bottom="20"] [dropcap]I[/dropcap]t has…
aneurysm

A digital twin of the aorta to prevent aneurysm rupture

,
15,000 Europeans die each year from rupture of an aneurysm in the aorta. Stéphane Avril and his team at Mines Saint-Étienne are working to better prevent this. To do so, they develop a digital twin of the artery of a patient with an aneurysm.…