Biological sciences professor publishes pupfish research
Craig Stockwell, professor of biological sciences, has co-written a research article that evaluates the history of the Devil's Hole pupfish, which rapidly evolved following its isolation. The article published Sept. 17 in ...
'Bash' computer bug could hit millions (Update)
The US government and technology experts warned Thursday of a vulnerability in some computer-operating systems, including Apple's Mac OS, which could allow widespread and serious attacks by hackers.
Government hackers try to crack HealthCare.gov
The government's own watchdogs say they tried to hack into HealthCare.gov earlier this year and found what they termed a critical vulnerability.
Pakistan releases smuggled turtles into the wild
Pakistani officials and environmentalists on Monday released some 200 rare turtles into the River Indus after the reptiles were retrieved from a southwestern Chinese town where they were seized by customs ...
Software catches vulnerabilities on websites before they're exploited
Hacking is often done with malicious intent. But the two MIT alumni who co-founded fast-growing startup Tinfoil Security have shown that hacking can be put to good use: improving security.
Better non-functional security tests for software
The integration of digital expert knowledge and automation of risk analyses can greatly improve software test procedures and make cloud computing more secure. This is shown by the latest results of a project ...
Study focuses on communities near polluted waterways
There's no such thing as a good place to have a natural disaster, nor has there ever been an appropriate site to release toxic pollutants. But scientists have long recognized that some areas can handle such catastrophes better ...
Researchers find security flaws in backscatter X-ray scanners
A team of researchers from the University of California, San Diego, the University of Michigan, and Johns Hopkins University have discovered several security vulnerabilities in full-body backscatter X-ray ...
Security CTO to detail Android Fake ID flaw at Black Hat
Evaluating system security by analyzing spam volume
The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...
Android crypto key vulnerability affects only 10 percent handsets: report
Second Komodo dragon dies at Indonesian 'death zoo'
A Komodo dragon died Monday at an Indonesian zoo infamous for hundreds of animal deaths in recent years, an official said.
Math student detects OAuth, OpenID security vulnerability
Which phone is most vulnerable to malware?
As each new computer virus attack or vulnerability comes to light, millions instinctively check their computer to see if their anti-malware application is up to date. This is a good idea and they are wise ...