Related topics: hacker

Fuzzy logic helps detect redirection spam

Web browsers might soon use fuzzy logic to spot redirection spam and save users from being scammed, phished or opening malicious sites unwittingly, according to researchers in India writing in the International Journal of ...

The power of entanglement: A conversation with Fernando Brandao

Computers are a ubiquitous part of modern technology, utilized in smartphones, cars, kitchen appliances, and more. But there are limits to their power. New faculty member Fernando Brandão, the Bren Professor of Theoretical ...

Phoney protection for passwords

Corporate data breaches seem to be on the rise, rarely a week passes without a company revealing that its database has been hacked and regrettably usernames, passwords, credit card details and its customers' personal information ...

Creator of malware used to drain bank accounts gets 9 years

The Russian creator of a computer program that enabled cybercriminals to infect millions of computers and drain bank accounts in multiple countries was sentenced Wednesday to serve 9 ½ years in federal prison.

Location data on two apps enough to identify someone, says study

Stripping a big data set of names and personal details is no guarantee of privacy. Previous research has shown that individual shoppers, Netflix subscribers and even taxicab riders are identifiable in heaps of supposedly ...

Encyption debate isn't going away

The fight over encryption isn't going away just because the FBI has figured out a way to glean the data off the iPhone used by a San Bernardino attacker.

page 19 from 40