How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone
Tomorrow at MALCON 2014, security researcher Mordechai Guri with guidance of Prof. Yuval Elovici from the cyber security labs at Ben Gurion University in Israel will present a breakthrough method ("AirHopper) ...
Serious security: Device-Independent Quantum Key Distribution guards against the most general attacks
Health and Retirement study indicates people wildly underestimate how long they will live
Cybersecurity experts discover lapses in Heartbleed bug fix
A detailed analysis by cybersecurity experts from the University of Maryland found that website administrators nationwide tasked with patching security holes exploited by the Heartbleed bug may not have done enough.
Want to feed the world? Tackle pollution from ozone and soot
Researchers have long known that man-made climate change will harm yields of important crops, possibly causing problems for the world's food security. But new research shows air pollution doesn't just harm ...
Calculating encryption schemes' theoretical security guarantees eases comparison, improvement
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.
Dizzying heights: Prehistoric farming on the 'roof of the world'
Animal teeth, bones and plant remains have helped researchers from Cambridge, China and America to pinpoint a date for what could be the earliest sustained human habitation at high altitude.
A medical lab for the home
Fraunhofer FIT demonstrates a mobile wireless system that monitors the health of elderly people in their own homes, using miniature sensors. Besides non-invasive sensors this platform integrates technology ...
Experts identify easy way to improve smartphone security
What information is beaming from your mobile phone over various computer networks this very second without you being aware of it?
Federal government struggles against cyberattacks
A $10 billion-a-year effort to protect sensitive government data, from military secrets to Social Security identification numbers, is struggling to keep pace with an increasing number of cyberattacks and ...
Senate blocks NSA phone records measure (Update)
The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency, dealing a blow to President Barack Obama's primary proposal to rein in domestic surveillance.
Don't get hacked! Research shows how much we ignore online warnings
Say you ignored one of those "this website is not trusted" warnings and it led to your computer being hacked. How would you react? Would you:
New smart key software enhances security for homes and businesses
Computer scientists and security specialists have created an innovative electronic smart key system that aims to provide a safer and more flexible security system for homes and businesses.
New research shows vulnerability in mobile phones' applications offering voice communication security
University of Alabama at Birmingham researchers are explaining why there are concerns with the end-to-end security of an increasingly popular means of communication, and what users can do to defend against ...