Related topics: cyberattack · hackers

Quantum leaps

Data may be king, but new research by the Centre for Quantum Computation and Intelligent Systems means we may soon see a coup. UTS's team of computer scientists are leading the development of a new pattern of programming ...

How comets were assembled

Rosetta's target "Chury" and other comets observed by space missions show common evidence of layered structures and bi-lobed shapes. With 3D computer simulations Martin Jutzi of PlanetS at the University of Bern was able ...

Engineering students create real-time 3-D radar system

Spencer Kent stands nervously in front of Team D.R.A.D.I.S.' booth at Rice University's annual Engineering Design Showcase. Judging begins in about 10 minutes, and his teammate Galen Schmidt is frantically typing computer ...

Fighting the next generation of cyberattacks

The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation's computer systems.

Team tightens bounds on quantum information 'speed limit'

If you're designing a new computer, you want it to solve problems as fast as possible. Just how fast is possible is an open question when it comes to quantum computers, but physicists at the National Institute of Standards ...

Scientists succeed in linking two different quantum systems

Physicists at the Universities of Bonn and Cambridge have succeeded in linking two completely different quantum systems to one another. In doing so, they have taken an important step forward on the way to a quantum computer. ...

Artificial intelligence systems more apt to fail than to destroy

The most realistic risks about the dangers of artificial intelligence are basic mistakes, breakdowns and cyber attacks, an expert in the field says – more so than machines that become super powerful, run amok and try to ...

Images that fool computer vision raise security concerns

Computers are learning to recognize objects with near-human ability. But Cornell researchers have found that computers, like humans, can be fooled by optical illusions, which raises security concerns and opens new avenues ...

Mobile quarantine station for malicious Android apps

The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store – ones that would only become ...

page 33 from 40