(AP) -- Researchers have uncovered new ways that criminals can spy on Internet users even if they're using secure connections to banks, online retailers or other sensitive Web sites.
Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...
Mike Geske wants a drone.
It would be another powerful tool in the arsenal of US and British spy services: encryption keys for a large share of the SIM cards used for mobile phones.
Smart technology is in our homes, cars and phones. And soon, it will power our luggage, thanks in part to University at Buffalo engineering student Martin Diz.
BitTorrent Inc., the San Francisco company behind the most popular technology for sharing files online, is branching out into a new arena: snoop-proof calling and texting.
The US National Security Agency is scooping up large quantities of images of people for use in facial recognition programs, the New York Times reported Sunday, citing top secret documents.
A new push to encrypt email, keeping messages free from government snooping, is gaining momentum.
Luminescent nanocrystal tags and high-speed scanner enable rapid detection of multiple pathogens in a single test
(Phys.org) —A research team using tunable luminescent nanocrystals as tags to advance medical and security imaging have successfully applied them to high-speed scanning technology and detected multiple viruses within minutes.