Related topics: security

Computer scientist looks for bad guys in cyberspace

(Phys.org)—The weakest link in many computer networks is a gullible human. With that in mind, Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to recognize potential targets ...

Claims of hacking New York Times 'groundless': China

China on Thursday dismissed accusations that it had hacked into the system of the New York Times, in a cyberattack the paper linked to its expose of the wealth amassed by the family of Premier Wen Jiabao.

NY Times says Chinese hacked paper's computers (Update)

Chinese hackers repeatedly penetrated The New York Times' computer systems over the past four months, stealing reporters' passwords and hunting for files on an investigation into the wealth amassed by the family of a top ...

Kosovo group claims hack of US weather service

The US National Weather Service computer network was hacked this week, with a group from Kosovo claiming credit and posting sensitive data, security experts said Friday.

Internet Explorer users are warned against Poison Ivy

(Phys.org)—More than a few Internet Explorer users stand vulnerable to fresh attacks of Poison Ivy. In the latest headline in the "Internet Explorer has a flaw" saga, a security hole in Internet Explorer 7,8, and 9 is ...

UK spy agency asks academics to tackle cyber risks

(AP)—Britain's government says a new research institute partly funded by the country's eavesdropping spy agency will ask mathematicians and computer scientists to join the fight against cyber threats.

Security experts warn of risky attacks on tech-loaded cars

(Phys.org) -- Now that tiny computers and electronic communications systems are being designed into cars, hackers can look toward the car, like the PC, as potential roadkill. If cars are to become computers on wheels, a number ...

page 10 from 14