Related topics: cyber attack · security · google · cyber attacks

Power-strip lookalike hacks office networks

(Phys.org) -- Pwnie Express, the company specializing in cyber security products, calls its new device “ingenious.” Bloggers hearing about it are paying attention to the fact that it is a power-strip lookalike ...

Nanoscale spectroscopy review showcases a bright future

Modern society is working closer to the nanoscale than it realises. Breakthroughs and advances in developing and manipulating nanostructures have led to technological progress that not only drives imaging and sensing devices ...

Networking goes quantum

A scientist involved in expanding quantum communication to a network of users, is continuing his work at the University of Bristol.

Manhunt for hackers behind global cyberattack (Update)

International investigators hunted Saturday for those behind an unprecedented cyber-attack that affected systems in dozens of countries, including at banks, hospitals and government agencies, as security experts sought to ...

Journalists' use of social media in decline according to study

The annual Social Journalism Study, conducted by Canterbury Christ Church University and Cision, has highlighted that while the majority of UK journalists now use social media for their work, they actually spend less time ...

IBM deepens move into computer defense

IBM on Monday moved deeper into defending business computers with a new service aimed at thwarting hackers before they do damage.

Ransoms paid by two of every five victims of CryptoLocker

New research from the University of Kent has revealed that around 40% of people who fall victim to an advanced form of malware, known as CryptoLocker, have agreed to pay a ransom of around £300 to recover their files.

page 1 from 34

Computer security

Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

This text uses material from Wikipedia, licensed under CC BY-SA