Researchers have discovered a new interference mechanism in ultracold chemical reactions, one which has important technological applications in precision measurements, sensing and quantum computing.
Hackers are not just after your computer: connected devices from cars to home security systems to sniper rifles are now targets for actors looking to steal or cause mischief.
China is tightening controls on exports of some drones and powerful computers and will require firms to register to ensure they do not "compromise national security", state media reported Sunday.
Computer simulations of ground shaking which replicates the historic, destructive 1811-1812 New Madrid seismic zone (NMSZ) earthquakes on the Tennessee-Missouri border suggest that future activity in the region could produce ...
The IBM Watson super-brainy computing technology, which has helped organize massive data as well as beaten champions on the Jeopardy TV show, is now learning Japanese.
Microsoft launched its Windows 10 operating system Wednesday, in its boldest effort yet to reshape the tech giant and move ahead in mobile computing and the "Internet of Things."
Chinese e-commerce giant Alibaba will invest $1.0 billion in its cloud computing arm to expand its international presence, the company said Wednesday, as it looks outside its core business and beyond traditional markets.
With 2.5 million daily users, the Tor network is the world's most popular system for protecting Internet users' anonymity. For more than a decade, people living under repressive regimes have used Tor to conceal their Web-browsing ...
Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...
It would be a shock, a terrible shock, to Elinor Dashwood and the other characters in "Sense and Sensibility," to see this happening.