Ransomware no cause for New Year celebration: Sophos

(Phys.org) —From operating systems on desktops to software and peripherals on smartphones, information thieves have been clever, inventive and successfully stealthy in finding pathways for stealing personal information. ...

Detecting program-tampering in the cloud

For small and midsize organizations, the outsourcing of demanding computational tasks to the cloud—huge banks of computers accessible over the Internet—can be much more cost-effective than buying their own hardware. But ...

Google maps malicious websites

Google expanded its Transparency Report on Tuesday to include maps of spots around the world where hackers are laying traps or baiting Internet users.

The dangers of too much Java

Justin Cappos, an assistant professor of computer science and engineering at the Polytechnic Institute of NYU-Poly, has long been wary of the security risks inherent in Java, the programming language developed by Sun Microsystems ...

page 2 from 5