Spear phishing: Researchers work to counter email attacks that gain recipients' trust
(Phys.org)—The email resembled the organization's own employee e-newsletter and asked recipients to visit a website to confirm that they wanted to continue receiving the newsletter. Another email carried ...
New device could contribute to a major increase in the rate of future optical communications
(Phys.org)—At a time when communication networks are scrambling for ways to transmit more data over limited bandwidth, a type of twisted light wave is gaining new attention. Called an optical vortex or ...
Social networks boosts election turnout
About one third of a million more people showed up at the ballot box in the United States in 2010 because of a single Facebook message on Election Day, estimates a new study led by the University of California, ...
Google: Didn't delete Street View data after all
After being caught spying on people across Europe and Australia with its Wi-Fi-slurping Street View cars, Google had told angry regulators that it would delete the ill-gotten data.
Making it easier to build secure Web applications
Two years ago, a fledgling social-networking site called Blippy accidentally posted the credit card numbers of its users online. While that was a particularly egregious example, such inadvertent information ...
Efficient and tunable interface for quantum networks
(Phys.org) -- Quantum computers may someday revolutionize the information world. But in order for quantum computers at distant locations to communicate with one another, they have to be linked together in ...
Networks in motion
A new article by a Northwestern University complex networks expert discusses how networks governing processes in nature and society are becoming increasingly amenable to modeling, forecast and control.
Whether tweets live or die depends more on network, competition for attention than message or user influence
On the global social media stage, it's not so much the message but rather network structure and competition for attention that determine whether a meme becomes popular and shows staying power or whether it ...
Researchers discover cell phone hackers can track your location without your knowledge
Cellular networks leak the locations of cell phone users, allowing a third party to easily track the location of the cell phone user without the user's knowledge, according to new research by computer scientists in the University ...
Some HTC Android phones found vulnerable to WiFi password leak
Sandia cyber project looks to help IT professionals with complex DNS vulnerabilities
Sandia National Laboratories computer scientist Casey Deccio has developed a visualization tool known as DNSViz to help network administrators within the federal government and global IT community better understand ...
Facebook settles with FTC over deception charges
Facebook is settling with the Federal Trade Commission over charges it deceived consumers with its privacy settings to get people to share more personal information than they originally agreed to.
Virus hits US drone fleet: report
A computer virus has hit the US Predator and Reaper drone fleet that Washington deploys to hunt down militants, logging the keystrokes of pilots remotely flying missions, Wired magazine reported.
Tighter online privacy rules for preteens proposed
Many preteens have dived into the expanding worlds of social networks and smartphone apps, but federal rules designed to protect their privacy are still in the era of Web portals and flip phones.