New Search

If you are not happy with the results below please do another search

60 search results for: cybersecurity

41

Cyberdefense seeks to regain control

Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done, things are not as imbalanced as they might seem, and research is providing valid cyberdefense solutions to help […]

42

Fraud on the line

An unsolicited call is not necessarily from an unwelcome salesman. It is sometimes a case of a fraud attempt. The telephone network is home to many attacks and most are aimed at making a profit. These little-known types of fraud are difficult to recognize and difficult to fight. [divider style=”normal” top=”20″ bottom=”20″] This article is […]

43

Protecting ships against modern-day pirates

Cybersecurity, long viewed as a secondary concern for naval systems, has become increasingly important in recent years. Ships can no longer be seen as isolated objects at sea, naturally protected from cyber-attacks. Yvon Kermarrec, a researcher in computer science at IMT Atlantique, leads a research chair on cybersecurity in partnership with the French Naval School, […]

44

Using hardware to defend software against cyber-attacks

Software applications are vulnerable to remote attacks via the internet or local networks and are cyber-attackers’ target of choice. While methods combining hardware and software have already been integrated into the most recent processors to prevent cyber-attacks, solutions based solely on hardware, which by definition cannot be remotely attacked, could soon help defend our computer […]

45

Hardware attacks, a lingering threat for connected objects

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against connected objects. Jean-Max Dutertre’s team […]

46

New interest-free loans for startups Cyrating, Galanck, myLabel and WaryMe

On February 8, 2018, the approval committee for the Digital Fund of the Graduate Schools and Universities Initiative chose four new startups to receive loans for amounts up to €40,000 with a 0% interest rate. Cyrating, which was founded through the ParisTech Entrepreneurs incubator, Galanck and myLabel, both of which were developed through the IMT Starter (Télécom Sud Paris and Télécom […]

47

23 startups from IMT incubators at VivaTechnology 2018

The VivaTechnology trade show offers three days to discover the most promising startups in the tech sector. For IMT, this is the perfect opportunity for highlighting its comprehensive support and entrepreneurship services and presenting 23 startups from its schools’ incubators. These startups come from sectors including mobility, smart cities, AI, fashion, media and cybersecurity. Mark […]

48

Introducing BART, the Blockchain’s French Scientific Alliance

Four research institutions, including Télécom ParisTech and Télécom SudParis, are embarking on a joint research initiative focused on the blockchain. Along with INRIA and the Institute for Technological Research (IRT) SystemX, this scientific task force will take on the challenge of integrating the blockchain into industrial processes. The six focus areas of this research initiative […]

49

TeraLab, a European data sanctuary

Over the course of three months, TeraLab was involved in two European H2020 projects on the industry of the future: MIDIH and BOOST 4.0. This confirms the role played by TeraLab—IMT’s big data and artificial intelligence platform—as a trusted third party and facilitator of experimentation. TeraLab created a safe place for these projects, far from […]

50

Passwords: security, vulnerability and constraints

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] What is a password? A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code). Passwords are very widely used, for computers, telephones, banking. […]