Unveiling malaria's 'invisibility cloak'

The discovery by researchers from the Walter and Eliza Hall Institute of a molecule that is key to malaria's 'invisibility cloak' will help to better understand how the parasite causes disease and escapes from the defenses ...

Job-seeking Hungarian pleads guilty to hacking

A Hungarian man pleaded guilty Wednesday to hacking into the computer systems of the Marriott hotel chain and threatening to reveal confidential information unless he was given a job.

NIST improves tool for hardening software against cyber attack

(PhysOrg.com) -- Computer scientists at the National Institute of Standards and Technology (NIST) have dramatically enlarged a database designed to improve applications that help programmers find weaknesses in software. This ...

Staggering surge in Android gadget viruses: Juniper

The arsenal of malicious code aimed at Android-powered gadgets has grown exponentially, with criminals hiding viruses in applications people download to devices, according to Juniper Networks.

Galaxy DNA-analysis software is now available 'in the cloud'

Galaxy -- an open-source, web-based platform for data-intensive biomedical and genetic research -- is now available as a "cloud computing" resource. A team of researchers including Anton Nekrutenko, an associate professor ...

Security flaws found in the WebGL standard

(PhysOrg.com) -- Researchers at Context Information Security have issued a warning about the WebGL standard. The warning states that this standard has the potential to undermine the security concepts that are practiced by ...

Can an MP3 hack your car?

(PhysOrg.com) -- The idea that someone can get into your car without your permission isn't a new one. It's about as old as the coat hanger, but that was back in the days when you locks had a pull up button. We tend to think ...

page 5 from 7