Mobile quarantine station for malicious Android apps

The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store – ones that would only become ...

Computer scientists simplify parallel programming

Modern software takes computational speed for granted. But modern microprocessors can only speed up by increasing the number of cores. To take full advantage of multiple cores, software developers have to arrange their code ...

Computer scientists present guarantees for online anonymity

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain ...

Cebit 2015: Find out what your apps are really doing

These tiny programs on Internet-connected mobile phones are increasingly becoming entryways for surveillance and fraud. Computer scientists from the center for IT-Security, Privacy and Privacy, CISPA, have developed a program ...

Cebit 2015: DIY printing custom touch-sensitive displays

Computer scientists from Saarbrücken have developed a technique that could enable virtually anyone to print out customized displays of their own in future—in all shapes and sizes and onto various materials. A regular home ...

page 9 from 13