The trustworthy cloud
Not a week goes by without reports on security gaps, data theft or hacker attacks. Both businesses and private users are becoming increasingly uneasy. However, when it comes to technologies like cloud computing, trust and ...
Not a week goes by without reports on security gaps, data theft or hacker attacks. Both businesses and private users are becoming increasingly uneasy. However, when it comes to technologies like cloud computing, trust and ...
Computer Sciences
Mar 7, 2012
0
0
Researchers have developed a new dynamic mapping tool that will help policymakers and other groups determine a country's vulnerabilities to climate change and conflicts and show how these two issues intersect in Africa.
Environment
Mar 2, 2012
0
0
Researchers from Ruhr-University Bochum have found a massive security gap at Amazon Cloud Services. Using different methods of attack (signature wrapping and cross site scripting) they tested the system which was deemed "safe". ...
Computer Sciences
Oct 24, 2011
0
0