China: 'leading bad actor in cyberspace,' experts say
China's full-throated denials of hacking and counter-accusations of its own do nothing to allay growing concern over large-scale cyberspying alleged in a bombshell report this week, Western analysts said.
A model for development: biologists create first predictive computational model of gene networks
(Phys.org)—As an animal develops from an embryo, its cells take diverse paths, eventually forming different body parts—muscles, bones, heart. In order for each cell to know what to do during development, ...
Senate may go on break without passing cyber bill
The U.S. Senate could leave town this week for a monthlong break without passing legislation to protect the country's electrical grid, water supplies and other critical industries from cyberattack and electronic espionage.
Anonymous says it hacked Chinese government sites
(AP) -- China was struggling Thursday to restore several government websites that international hacking group Anonymous says it attacked in an apparent protest against Chinese Internet restrictions.
Experts urge stronger online regulation bill
Cybersecurity experts urged senators Thursday to close loopholes in legislation to give the government more power to force critical industries to make their computer networks more secure.
'Evil' Australian hacker faces 49 charges
A man who used the online nickname "Evil" has been charged with hacking attacks that police Wednesday alleged could have caused considerable damage to Australias national infrastructure.
US military computer networks vulnerable: general
The US military has made huge strides in hardening its computer networks against cyberattack but more remains to be done, the Pentagon's top cyberwarrior said Wednesday.
Analysis of a relationship triangle
In a model network of friends and foes, relationships will evolve until everyone becomes friendly or the network splits into two hostile factions, researchers suggest in the current issue of the Proceedings of the National Ac ...
Not-so-confidential confidantes: Research shows that locations of online photos may reveal your friendships
Comparing the locations of photos posted on the Internet with social network contacts, Cornell University computer scientists have found that as few as three "co-locations" for images at different times and places could predict ...
Cyber Command chief warns of 'remote sabotage'
The top US cyberwarrior said Thursday that Pentagon networks are probed over six million times a day and expressed concern about a rise in "remote sabotage" attacks on computer systems.
IU informaticists show new levels of refinement in predicting human mobility, epidemic spread
(PhysOrg.com) -- The interplay of human mobility patterns like those between local metropolitan commuters and long-range airline travelers during a global epidemic can be modeled in such detail so as to offer ...
Facebook (and Systems Biologists) Take Note: Network Analysis Reveals True Connections
(PhysOrg.com) -- Facebook figures out that you know Holly, although you haven't seen her in 10 years, because you have four mutual friends -- a good predictor of direct friendship. But sometimes Facebook gets ...
Food banks go high-tech to feed the hungry
(AP) -- Food banks across the country are undergoing a high-tech revolution, adopting sophisticated databases, bar coding, GPS tracking, automated warehouses and other technologies used in the food industry ...
Cybersecurity starts at home and in the office
(AP) -- When swine flu broke out, the government revved up a massive information campaign centered on three words: Wash your hands. The Obama administration now wants to convey similarly clear and concise ...