In the age of WikiLeaks, Russian hacks and increased government surveillance, many computer users are feeling increasingly worried about how best to protect their personal information—even if they aren't guarding state ...
As an increasing number of devices—from cars to light bulbs to kitchen appliances—connect with computer networks, experts are raising concerns about privacy and security. Just this fall, attackers used compromised home ...
With the Electoral College set on Dec. 19 to cement the results of Donald Trump's presidential win, UC Berkeley statistician Philip Stark is calling for an audit to double-check that hackers did not manipulate the results.
Interpol urged all countries on Tuesday to obtain biometric data from fighters for the Islamic State and other extremist groups to help law enforcement track them down, especially when they return home.
Researchers at Ben-Gurion University of the Negev (BGU) have demonstrated malware that can turn computers into perpetual eavesdropping devices, even without a microphone.
Oracle on Monday announced it is buying Dyn, a Web traffic management firm recently hit with a cyber attack that closed off the internet to millions of users.
Finnish officials say the European Union is planning to set up a hybrid threat center in Finland to combat a growing number of cyberattacks and hybrid warfare, including disinformation and false news sent over social media ...
One of these has now been closed by computer scientists at the Center for IT Security and Privacy (CISPA) and the German Research Center for Artificial Intelligence (DFKI)—with the help of software that manufacturers can ...
It sounds like a great idea: Forget passwords, and instead lock your phone or computer with your fingerprint. It's a convenient form of security—though it's also perhaps not as safe as you'd think.
The British parliament this week gave the green light to new bulk surveillance powers for police and intelligence services that critics have denounced as the most far-reaching of any western democracy.
The hacker who shut down large parts of the US internet last month was probably a disgruntled gamer, said an expert whose company closely monitored the attack Wednesday.
A US security company says a Chinese-made smartphone popular in the United States forwarded detailed user data and user texts back to a Chinese server without the phone owner's knowledge.
Billions of fitness trackers, medical implants, surveillance cameras, home appliances, thermostats, baby monitors and computers in automobiles now are connected as part of a rapidly expanding "internet of things."
The Obama administration urged companies on Tuesday to make millions of devices safe from hacking, underscoring the risks posed by an increasingly bewildering array of internet-connected products permeating daily life, covering ...
Britain's interior minister on Monday ordered the extradition to the United States of a man accused of hacking into thousands of US government computers.
The U.S. Coast Guard (USCG) oversees approximately 800 waterfront facilities that, among other activities, transfer hazardous liquids between marine vessels and land-based pipelines, tanks or vehicles. These "maritime bulk ...
Small-business owners may think that they are too small to be victims of cyber hackers, but Pat Toth knows otherwise. Toth leads outreach efforts to small businesses on cybersecurity at the National Institute of Standards ...
Sure, they might take your credit card information, stop you from watching Netflix and figure a way to use any key fob to access your car, but don't think too poorly of hackers.
The presidential campaign of 2016 thankfully – and we can only hope officially – ended this evening. As of when this article was posted, there are no reports of widespread cyberattacks or other digital interference against ...
Never in American political history have hacked and stolen emails played such a central role in a presidential campaign. But hackers are likely to target you as well – though perhaps with smaller repercussions for the world ...
Indian officials were trying Tuesday to restore the websites of seven Indian embassies in Europe and Africa that were hacked and had data dumped online.
When U.S. presidential hopeful Hillary Clinton was found to have used a private email server for government business as Secretary of State, there was a collective gasp of disbelief. That disbelief quickly turned into horror ...
WikiLeaks founder Julian Assange denied Thursday that the Russian government or any other "state parties" were his group's source for more than 50,000 hacked emails from the files of Hillary Clinton's campaign chairman, John ...
Major internet services including Twitter, Spotify and Amazon suffered service interruptions and outages on Friday as a US internet provider came under sustained cyber attack.
If you type on your desktop or laptop computer's keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at the University of California, Irvine and in Italy.
Yahoo said Thursday a massive attack on its network in 2014 allowed hackers to steal data from half a billion users and may have been "state sponsored."
Many of today's automobiles leave the factory with secret passengers: prototype software features that are disabled but that can be unlocked by clever drivers.
Apple iPhone owners on Friday were urged to install a quickly released security update after a sophisticated attack on an Emirati dissident exposed vulnerabilities targeted by cyber arms dealers.
Software developers listen up: if you want people to pay attention to your security warnings on their computers or mobile devices, you need to make them pop up at better times.
Researchers at the University of California, Riverside have identified a weakness in the Transmission Control Protocol (TCP) of all Linux operating systems since late 2012 that enables attackers to hijack users' internet ...
Three years ago, the Federal Trade Commission dimmed hopes for the Brightest Flashlight app for Android, slapping its developer with charges of consumer deception. Why? The app was transmitting users' locations and device ...
A series of spectacular cyber attacks against banks, resulting in the theft of tens of millions of dollars, has heightened fears for an industry becoming an increasingly attractive target for hackers.
Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks—Tor—has prompted computer scientists ...
Ransomware - what hackers use to encrypt your computer files and demand money in exchange for freeing those contents - is an exploding global problem with few solutions, but a team of University of Florida researchers says ...
Wearable devices—Fitbits, Jawbones, Nike+, Apple Watches and the like—are white-hot. The tech segment is already producing an estimated $14 billion in sales worldwide, and expected to more than double within four years, ...
Hackers invited by the US government as part of a pilot program to find flaws with five Pentagon websites discovered 138 security vulnerabilities, Defense Secretary Ash Carter said Friday.
When you've got to go, but you're out there in space, zipped up in a spacesuit, with no toilet in sight and a crew of other astronauts around, what do you do?
In science, sometimes the best discoveries come when you're exploring something else entirely. That's the case with recent findings from the National Institute of Standards and Technology (NIST), where a research team has ...
Graphene, a two-dimensional form of carbon in sheets just one atom in thick, has been the subject of widespread research, in large part because of its unique combination of strength, electrical conductivity, and chemical ...
Every year, trade winds over the Sahara Desert sweep up huge plumes of mineral dust, transporting hundreds of teragrams—enough to fill 10 million dump trucks—across North Africa and over the Atlantic Ocean. This dust ...
The claws of coconut crabs have the strongest pinching force of any crustacean, according to a study published November 23, 2016 in the open-access journal PLOS ONE by Shin-ichiro Oka from Okinawa Churashima Foundation, Japan, ...
People have a remarkable ability to remember and recall events from the past, even when those events didn't hold any particular importance at the time they occurred. Now, researchers reporting in the journal Current Biology ...
A groundbreaking study of the virosphere of the most populous animals - those without backbones such as insects, spiders and worms and that live around our houses - has uncovered 1445 viruses, revealing people have only scratched ...
Reporting this week (Wednesday Nov. 23) in the journal Nature an international team led by British Antarctic Survey (BAS) explains that present-day thinning and retreat of Pine Island Glacier, one of the largest and fastest ...
A naturally occurring predatory bacterium is able to work with the immune system to clear multi-drug resistant Shigella infections in zebrafish, according to a study published today in Current Biology.
Piezoelectric sensors measure changes in pressure, acceleration, temperature, strain or force and are used in a vast array of devices important to everyday life. However, these sensors often can be limited by the "white noise" ...
Scientists at The Scripps Research Institute (TSRI) have developed a vaccine that blocks the pain-numbing effects of the opioid drugs oxycodone (oxy) and hydrocodone (hydro) in animal models. The vaccine also appears to decrease ...
Researchers have revealed new atomic-scale details about pesky deposits that can stop or slow chemical reactions vital to fuel production and other processes. This disruption to reactions is known as deactivation or poisoning.
A study co-led by the University of East Anglia (UEA) has found that people with genes for high educational achievement tend to marry, and have children with, people with similar DNA.
The study, published as the cover article in BioMed Central's Avian Research, led by the Earlham Institute and the Museum of Vertebrate Zoology at the University of California, explores the phylogenetic relationship between ...
(Phys.org)—A team of researchers from France, the U.S. and Italy has found evidence from the Tohoku-Oki earthquake that sensors that measure changes in gravity might offer a way to warn people of impending disaster faster ...
Despite what you might think, evolution rarely happens because something is good for a species. Instead, natural selection favours genetic variants that are good for the individuals that possess them. This leads to a much ...
(Phys.org)—A team of researchers with the Universities of Roehampton and Birmingham in the U.K. has found a unique way to measure the energy spent by tree-dwelling apes when faced with gaps in a jungle canopy. In their ...
Although recent election coverage may suggest otherwise, research shows that people are more likely to use positive words than negative words on the whole in their communications. Behavioral scientists have extensively documented ...
How can quantum information be stored as long as possible? An important step forward in the development of quantum memories has been achieved by a research team of TU Wien.
An enterprising researcher from The University of Manchester has developed a prototype tool that could help transform the lives of the blind and visually impaired.
Men and women don't communicate much differently from each other, at least when they get the same training and are working on the same type of written assignment. The findings come amid frequent studies that have discovered ...
Black light does more than make posters glow. Cornell researchers have developed a chemical tool to control inflammation that is activated by ultraviolet (UV) light.
Scientists at Washington University in St. Louis isolated an enzyme that controls the levels of two plant hormones simultaneously, linking the molecular pathways for growth and defense.
The Northeastern coast of the USA could be struck by more frequent and more powerful hurricanes in the future due to shifting weather patterns, according to new research.