Evaluating system security by analyzing spam volume
The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...
Android crypto key vulnerability affects only 10 percent handsets: report
Second Komodo dragon dies at Indonesian 'death zoo'
A Komodo dragon died Monday at an Indonesian zoo infamous for hundreds of animal deaths in recent years, an official said.
Math student detects OAuth, OpenID security vulnerability
Which phone is most vulnerable to malware?
As each new computer virus attack or vulnerability comes to light, millions instinctively check their computer to see if their anti-malware application is up to date. This is a good idea and they are wise ...
Microsoft issues advisory on Internet Explorer vulnerability
Canada police nab young man in Heartbleed data theft
Federal police said Wednesday they have arrested and charged a 19-year-old man in the theft of 900 Canadian taxpayers' data, which was made vulnerable by the "Heartbleed" bug.
Canadians' tax data stolen in Heartbleed breach
Personal data for as many as 900 Canadian taxpayers was stolen after being made vulnerable by the "Heartbleed" bug, officials in Ottawa said on Monday.
NSA denies exploiting 'Heartbleed' vulnerability
The US National Security Agency on Friday denied a report claiming it was aware of and even exploited the "Heartbleed" online security flaw to gather critical intelligence.
MUSE envisions mining "big code" to improve software reliability and construction
During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. ...
Heatwave map reveals Melbourne's most vulnerable postcodes
People living in Melbourne's western, inner-northern and south-eastern suburbs are most at risk from heatwaves, according to new research.
DARPA open catalog makes agency-sponsored software and publications available to all
DARPA has invested in many programs that sponsor fundamental and applied research in areas of computer science, which have led to new advances in theory as well as practical software. The R&D community has ...
Researchers help develop state-of-the-art cybersecurity resource
Researchers from Indiana University's Center for Applied Cybersecurity Research and University Information Technology Services' Research Technologies Division have contributed to the development of a new tool designed to ...