WISE colors in unknowns on Jupiter asteroids
(Phys.org)—Scientists using data from NASA's Wide-field Infrared Survey Explorer, or WISE, have uncovered new clues in the ongoing mystery of the Jovian Trojans—asteroids that orbit the sun on the same ...
Kaspersky Lab nails 'Find and Call' trojan bearing phone-book service
Stealth game steals info from Android sensors
'Sabpab' Trojan seeks out Mac OS X
Rice lab mimics Jupiter's Trojan asteroids inside a single atom
Rice University physicists have gone to extremes to prove that Isaac Newton's classical laws of motion can apply in the atomic world: They've built an accurate model of part of the solar system inside a single ...
Android Trojan dubbed ‘Geinimi’ found in legitimate applications
Energizer Duo battery charger hides a Trojan
Hi-tech 'Trojan horse' can kill cancer cells: researchers
Australian researchers are set to begin human trials of a tiny nano-cell that acts as a "Trojan horse" against cancer cells, a breakthrough they say may curb the need for debilitating chemotherapy.
Researchers develop efficient, protein-based method for creating iPS cells
Coaxing a humble skin cell to become a jack-of-all-trades pluripotent stem cell is feat so remarkable it was honored earlier this month with the Nobel Prize in Physiology or Medicine. Stem cell pioneer Shinya Yamanaka, MD, ...
Cholera discovery could revolutionize antibiotic delivery
(Phys.org)—Three Simon Fraser University scientists are among six researchers who've made a discovery that could help revolutionize antibiotic treatment of deadly bacteria.
Study finds how bacteria resist a 'Trojan horse' antibiotic
A new study describes how bacteria use a previously unknown means to defeat an antibiotic. The researchers found that the bacteria have modified a common "housekeeping" enzyme in a way that enables the enzyme ...
Cyber-security expert finds new flaw in smartphones
Just as U.S. companies are coming to grips with threats to their computer networks emanating from cyber-spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones.
Punishment of egoistic behavior is not rewarded
The heated debate surrounding the German "state Trojan" software for the online monitoring of telecommunication between citizens shows that the concealed observation of our private decisions provokes public ...