Decoding how kids get into hacking

Is your kid obsessed with video games and hanging out with questionable friends? These are common traits for involvement in cybercrime, among other delinquencies. New research from Michigan State University identified characteristics ...

Secure data protection in the new internet of things

The core idea of the team headed by Magdeburg project leader, Professor Dr. Mesut Güne is to develop the self-organizing migration of services. This means that the services—such as home automation, data management, and ...

Roaming cats prey on their owners' minds

Many cat owners worry about their pets wandering the streets, but perceive cats hunting mice and birds to be unavoidable instinct, researchers at the University of Exeter have found.

More rules for the intelligent household

While a mobile phone or PC is traditionally controlled by only one user, many players come together in a networked household, some of whom even want to control devices simultaneously. Researchers from the Horst Görtz Institute ...

Researcher invents lip motion password technology

The use of biometric data such as fingerprints to unlock mobile devices and verify identity at immigration and customs counters are used around the world. Despite its wide application, once the scan is stolen or hacked, the ...

page 1 from 2