Related topics: cells

Israeli tunnel hit by cyber attack, experts say (Update)

When Israel's military chief delivered a high-profile speech this month outlining the greatest threats his country might face in the future, he listed computer sabotage as a top concern, warning a sophisticated cyberattack ...

Georgia Tech uncovers iOS security weaknesses

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, ...

New system to combat online banking fraud

A security solution which protects against the most serious threat to online banking customers, responsible for millions in annual losses, is being rolled out across Europe by a Cambridge University spin-out.

Deals and ordeals for Chinese tech giant Huawei

Chinese telecom giant Huawei is perplexed at its treatment in the West, with the United States fearful it is a Trojan horse for cyber warfare even as Europe eagerly courts its business.

Australian super-trawler ban in doubt

Australia's hopes of blocking a controversial super-trawler from fishing in its waters looked uncertain with the opposition speaking out against the move and a key independent lawmaker expressing reservations.

'Trojan horse' effect may explain jellyfish blooms

(Phys.org)—Man-made structures such as harbours, tourist facilities, oil rigs and aquaculture farms provide ideal sanctuaries for jellyfish polyps to flourish and may explain an apparent increase in jellyfish blooms in ...

Study finds how bacteria resist a 'Trojan horse' antibiotic

A new study describes how bacteria use a previously unknown means to defeat an antibiotic. The researchers found that the bacteria have modified a common "housekeeping" enzyme in a way that enables the enzyme to recognize ...

Cyber-security expert finds new flaw in smartphones

Just as U.S. companies are coming to grips with threats to their computer networks emanating from cyber-spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones.

page 4 from 6