Maths can make the internet 5-10 times faster
Mathematical equations can make Internet communication via computer, mobile phone or satellite many times faster and more secure than today. Results with software developed by researchers from Aalborg University ...
Two updated guides provide latest NIST recommendations for system patches, malware avoidance
The National Institute of Standards and Technology (NIST) has updated two of its series of computer security guides to help computer system managers protect their systems from hackers and malware. Vulnerabilities in software ...
Online sharing helps hackers sharpen 'spears'
Sharing on social media helps hackers sharpen "spear phishing" attacks they use to trick their way into computers, security experts said Monday.
Visio.M e-mobility project unveils remote control driving technology
Fully autonomous cars may still be the stuff of science fiction. Remote driving technology, however, may be much closer than we think. Scientists at the Technische Universität München believe that full-size ...
Team develops a simple defense for complex smartphone malware (w/ video)
(Phys.org)—University of Alabama at Birmingham (UAB) researchers have developed simple but effective techniques to prevent sophisticated malware from secretly attacking smartphones. The Tap-Wave-Rub (TWR) methods – tapping, ...
Hacker 'botnet' hijacked online searches
Software titan Microsoft and computer security giant Symantec said Thursday that they smashed a hacker-infected computer network that was hijacking Internet searches.
US software engineer outsources his job to China
"Bob" the software engineer was becoming a modern workplace legend on Thursday as word spread that he had secretly outsourced his own job to China and sat at his desk watching cat videos.
Euclid Zero debuts to capture in-store shopper behavior
Predicting the effects of changes on living systems
Can scientists predict what happens when they introduce a change into a living system—for example, if they change the structure of a gene or administer a drug? Just as changing one letter can completely ...
The elusive capacity of data networks
In its early years, information theory which grew out of a landmark 1948 paper by MIT alumnus and future professor Claude Shannon was dominated by research on error-correcting codes: How do yo ...
New IBM software accelerates decision making in the era of big data
IBM today announced new software to provide clients with a sophisticated way to tame the data deluge and speed up business processes, making it easier for decision makers to gain insights from data. Based ...
Hacker 'command' servers seized in US: Microsoft (Update)
Microsoft on Monday said that cyber crime "command" servers in two US states were seized in an ongoing campaign to sever online crooks from infected computers used as virtual henchmen.
Malaysia eye-poked over bad Google translations
Malaysia's defence ministry on Tuesday blamed the use of Google Translate for the mangled English that appeared on its website sparking online ridicule.
Staggering surge in Android gadget viruses: Juniper
The arsenal of malicious code aimed at Android-powered gadgets has grown exponentially, with criminals hiding viruses in applications people download to devices, according to Juniper Networks.