Researchers show how to use mobiles to spy on people

(PhysOrg.com) -- Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even ...

Low-cost strategy developed for curbing computer worms

Thanks to an ingenious new strategy devised by researchers at University of California, Davis and Intel Corporation, computer network administrators might soon be able to mount effective, low-cost defenses against self-propagating ...

'Teleporting' images across a network securely using only light

Nature Communications published research by an international team from Wits and ICFO- The Institute of Photonic Sciences, which demonstrates the teleportation-like transport of "patterns" of light—this is the first approach ...

Scientists recognize intruders in noise

A team of scientists from MIPT and Kazan National Research Technical University is developing a mathematical apparatus that could lead to a breakthrough in network security. The results of the work have been published in ...

Fostering a sustainable use of phosphorus

Phosphorus is critical to food security, ecosystem functioning, and human activities. Urbanization and dietary changes, and in particular industrial use of P for chemical fertilizer production, have led to a declining trend, ...

page 2 from 33