Hackers disrupt Tunisia voter registration
Hackers briefly disrupted the online voter registration process for Tunisia's parliamentary and presidential polls later this year, the electoral commission said on Thursday.
Industrial control a weak link in cybersecurity, study says
Cybersecurity threats are rising for industrial control systems around the world, a growing target for attackers seeking to wreak havoc, a study showed Thursday.
Ear to the ground on shark sense
Research into how sharks hear is set to become the latest tactic to better understand and help prevent fatal shark attacks in Australian waters.
N.Korea 'doubles cyber war personnel'
North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases for hacking attacks, a report said Sunday.
Filtering criminal dDOS attacks
A new hybrid filtering system to protect cloud computing services from distributed denial of service (dDOS) attacks has been developed by US and Indian researchers. They provide details in the latest issue of the International ...
Guarding against 'Carmageddon' cyberattacks
The potential value of turning the nation's freeways into "smart transportation systems" is enormous. Equipping the nation's concrete arteries with a nervous system of computers and sensors that directly control on-ramp signals ...
Australia shark cull could snare more than 900
Australia's controversial shark cull could snare more than 900 animals over the next three years, a government review found, angering critics who said Tuesday most were caught needlessly.
Materials scientists turn to collagen
(Phys.org) —Miniature scaffolds made from collagen – the 'glue' that holds our bodies together – are being used to heal damaged joints, and could be used to develop new cancer therapies or help repair ...
NIST seeks comments on major revision to industrial control systems security guide
The National Institute of Standards and Technology (NIST) has issued for public review and comment a proposed major update to its Guide to Industrial Control Systems (ICS) Security.*
Receptor tyrosine kinase c-Met controls the cytoskeleton from different endosomes via different pathways Ludovic Ménard
Brightly coloured lizard tails have evolved as a 'risky decoy' defence strategy against bird attacks, new research suggests.
Inspired by nature, researcher develops new cyber security techniques
(Phys.org) —Imagine a cyber world in which hackers, identity thieves, spammers, phishers, foreign spies and other miscreants have a much tougher time plying their trade. Thanks to UC Irvine computer science ...
Insect community driven by plant hormones
Plants are not solitary, defenceless organisms but rather the centre of a vibrant community consisting of tens or even hundreds of insect species. Plants possess a wide range of defence mechanisms that are ...
More than 170 sharks caught in Australia cull policy
More than 170 sharks were caught during a controversial cull policy in Western Australia following a spate of fatal attacks, figures showed Wednesday, with 50 of the biggest ones destroyed.
IBM deepens move into computer defense
IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.