Researchers show how to use mobiles to spy on people

(PhysOrg.com) -- Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even ...

Phone call emotion analyzer is a winner (w/ Video)

(PhysOrg.com) -- An Israeli company, eXaudios Technologies, has developed a software application that automatically analyzes the intonation and volume of a person’s speech in real time and translates it into statements ...

Security chip that does encryption in PCs hacked

(AP) -- Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer-security ...

'Game changer' perovskite can detect gamma rays

Perovskites are materials made up of organic compounds bound to a metal. Propelled into the forefront of materials' research because of their structure and properties, perovskites are earmarked for a wide range of applications, ...

New laser technique may help detect chemical warfare in atmosphere

The Department of Homeland Security could benefit from a reliable, real-time instrument that could scan the atmosphere for toxic agents in order to alert communities to a biological or chemical attack. UCF optics and photonics ...

Security contractor breach not detected for months

A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar ...

'Bash' computer bug could hit millions (Update)

The US government and technology experts warned Thursday of a vulnerability in some computer-operating systems, including Apple's Mac OS, which could allow widespread and serious attacks by hackers.

page 1 from 28