More rules for the intelligent household

While a mobile phone or PC is traditionally controlled by only one user, many players come together in a networked household, some of whom even want to control devices simultaneously. Researchers from the Horst Görtz Institute ...

Safety assistance system warns of dirty bombs

The threat of terrorism in Europe has been on the rise in recent years, with experts and politicians particularly worried that terrorists might make use of dirty bombs. Fraunhofer researchers have developed a new system that ...

North Korea gets second web connection via Russian firm

A state-owned Russian company has opened up a second internet connection for North Korea which could strengthen Pyongyang's cyber capabilities and undermine US efforts to isolate the regime, security experts said.

How old does your computer think you are?

Computerised face recognition is an important part of initiatives to develop security systems, in building social networks, in curating photographs, and many other applications. Systems that allow a computer to estimate with ...

UK government complains after Twitter cuts data access

The British government has complained to Twitter over a block on access to data from the social network, which it was reportedly using to track potential terror attacks, officials said Wednesday.

page 13 from 33