Researchers have discovered a new interference mechanism in ultracold chemical reactions, one which has important technological applications in precision measurements, sensing and quantum computing.
With 2.5 million daily users, the Tor network is the world's most popular system for protecting Internet users' anonymity. For more than a decade, people living under repressive regimes have used Tor to conceal their Web-browsing ...
Researchers have developed an ultrafast light-emitting device that can flip on and off 90 billion times a second and could form the basis of optical computing.
Hackers are not just after your computer: connected devices from cars to home security systems to sniper rifles are now targets for actors looking to steal or cause mischief.
Using powerful computer simulations, researchers from Brown University have identified a material with a higher melting point than any known substance.
China is tightening controls on exports of some drones and powerful computers and will require firms to register to ensure they do not "compromise national security", state media reported Sunday.
The IBM Watson super-brainy computing technology, which has helped organize massive data as well as beaten champions on the Jeopardy TV show, is now learning Japanese.
Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...