Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Hacker thieves targeted Anonymous allies: Symantec

Anonymous on Monday gave mixed reactions to a US computer security firm's report that backers of the notorious hacker group were suckered into downloading software that steals online banking information.

No more keys or cards? Technology goes under the skin

Researchers at the University of Melbourne are investigating the growth in a new type of technology, inserted under the skin, and set to revolutionise the way we gain access to our homes, our bank accounts and use public ...

Japan scientists launch freeze-dry animal sperm bank

Japanese scientists have launched a sperm bank for endangered animals that uses freeze-drying technology they hope could one day help humans recreate animal populations on other planets, the chief researcher said Wednesday.

page 1 from 4