Fighting the next generation of cyberattacks
The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation's computer systems.
Human and technical ingenuity will be required to defeat shape-shifting malware
The FBI and Europol recently brought down a criminal botnet – a network of remotely-controlled PCs – powered by Beebone, an advanced, polymorphic malware capable of shape-shifting up to 19 times a day to preven ...
Computer users face hard choice—pay ransom or lose files
It's a chilling moment: A message appears on a computer screen, saying the files are encrypted and the only way to access them is by paying a ransom.
Engineers build Raspberry Pi supercomputer
(Phys.org)—Computational Engineers at the University of Southampton have built a supercomputer from 64 Raspberry Pi computers and Lego.
How to program unreliable chips
As transistors get smaller, they also become less reliable. So far, computer-chip designers have been able to work around that problem, but in the future, it could mean that computers stop improving at the ...
Carnegie Mellon tracking algorithm inspired by Harry Potter's Marauder's map (w/ video)
Computer scientists develop 'mathematical jigsaw puzzles' to encrypt software
(Phys.org) —UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any ...
Adding a '3D print' button to animation software
(Phys.org) -- Watch out, Barbie: omnivorous beasts are assembling in a 3D printer near you.
Writing programs using ordinary language
In a pair of recent papers, researchers at MIT's Computer Science and Artificial Intelligence Laboratory have demonstrated that, for a few specific tasks, it's possible to write computer programs using ordinary ...
How computers can learn better
Reinforcement learning is a technique, common in computer science, in which a computer system learns how best to solve some problem through trial-and-error. Classic applications of reinforcement learning ...
Bell Labs improves lensless camera with additional pixel on sensor
OpenGlass apps show support for visually impaired (w/ Video)
Communication scheme makes popular applications 'gracefully mobile'
The Secure Shell, or SSH, is a popular program that lets computer users log onto remote machines. Software developers use it for large collaborative projects, students use it to work from university servers, ...
A Q&A about the malicious software known as ransomware
Ransomware is a growing threat to computer users, who can suddenly find they're unable to open or use their files when their machines are infected. The malicious software can attack any user—an individual, small business, ...