Fraud-proof credit cards possible with quantum physics
Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial ...
World's first artificial enzymes created using synthetic biology
(Phys.org)—Medical Research Council (MRC) scientists have created the world's first enzymes made from artificial genetic material. Their synthetic enzymes, which are made from molecules that do not occur ...
Herd mentality: Are we programmed to make bad decisions?
A natural desire to be part of the 'in crowd' could damage our ability to make the right decisions, a new study has shown.
Egocentric videos: Finding clues to user identity
New theory could yield more-reliable communication protocols
Communication protocols for digital devices are very efficient but also very brittle: They require information to be specified in a precise order with a precise number of bits. If sender and receiver—say, ...
Security firm shows vulnerability of smartwatches to hacker attacks
Israeli researchers find flaw in Alibaba site
Israeli cybersecurity researchers say that personal information of millions of Alibaba users may have been exposed through flaws on the e-commerce giant's platform.
Sony's PlayStation store suffers suspected hack
Sony's online PlayStation store was inaccessible to users for part of Monday in the latest possible cyberattack on the electronics and entertainment company.
Hacker group targets company financial info (Update)
A hacker group has tapped into email accounts of executives in more than 100 companies that could give them lucrative access to market-moving information, a US security firm said Monday.
DNA survives critical entry into Earth's atmosphere
The genetic material DNA can survive a flight through space and re-entry into the earth's atmosphere—and still pass on genetic information. A team of scientists from UZH obtained these astonishing results ...
Dogs hear our words and how we say them
When people hear another person talking to them, they respond not only to what is being said—those consonants and vowels strung together into words and sentences—but also to other features of that speech—the ...
Global quantum communications—no longer the stuff of fiction?
Neither quantum computers nor quantum cryptography will become prevalent technologies without memory systems able to manipulate quantum information easily and effectively. The Faculty of Physics at the University ...
Sony faces 4th ex-employee lawsuit over hack
A former director of technology for Sony Pictures Entertainment has sued the company over the data breach that resulted in the online posting of his private financial and personal information.
Five ways to make your email safer in case of a hack attack
The Sony hack, the latest in a wave of company security breaches, exposed months of employee emails. Other hacks have given attackers access to sensitive information about a company and its customers, such as credit-card ...