Related topics: software

Microsoft leads attack on search traffic thieves

Microsoft announced it worked with police in Europe and the United States to disrupt a "dangerous" army of virus-infected computers used to hijack searches at Google, Bing and Yahoo.

Studies: Cyberspying targeted SKorea, US military

The hackers who knocked out tens of thousands of South Korean computers simultaneously this year are out to do far more than erase hard drives, cybersecurity firms say: They also are trying to steal South Korean and U.S. ...

From eardrums to electromagnetics, researcher hears the problems

A good tool is both robust and accurate; it doesn't break down easily, or give faulty readings or results. This standard applies to everything from a bathroom scale, or vending machine to a sniper rifle. It also rings true ...

Student and professor solve astronomical mystery

(Phys.org) —To ordinary folks, stars in the galaxy may seem like tiny specks of light. But to Penn State Brandywine Professor Timothy Lawlor and undergraduate researcher Nick Rufo, one of those bright balls of gas is actually ...

How proteins read meta DNA code

Three-quarters of the DNA in evolved organisms is wrapped around proteins, forming the basic unit of DNA packaging called nucleosomes, like a thread around a spool. The problem lies in understanding how DNA can then be read ...

page 13 from 18