Tax season bringing out the fraud artists

(AP) -- How do you know that the sender of an e-mail that has landed in your inbox is trying to steal your money or your identity? The message comes right out and asks for it.

In networks we trust

(PhysOrg.com) -- European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the drawbacks that exist in the current state of the art.

Malware continues to be a challenge to computer security

(PhysOrg.com) -- Identity theft continues to be a serious problem nationwide, and according to the nonprofit Identity Theft Resource Center, (ITRC) the economic recession may be a cause in the rise in scams, thievery and ...

Code defends against 'stealthy' computer worms

Self-propagating worms are malicious computer programs, which, after being released, can spread throughout networks without human control, stealing or erasing hard drive data, interfering with pre-installed programs and slowing, ...

Dartmouth researchers help secure the power grid

Dartmouth researchers are part of the national Trustworthy Cyber Infrastructure for the Power Grid team that has been awarded a five-year $18.8 million grant from the US Department of Energy with contributions from the US ...

Microsoft fixes browser flaw used in Google breach

(AP) -- Microsoft Corp. took the unsual step of issuing an unscheduled fix Thursday for security holes in its Internet Explorer browser that played a role in the recent computer attacks that led Google to threaten to leave ...

page 12 from 15