Mining ' and Minding ' Her Ps and Qs

(Phys.org) -- Each time you connect to a secure website (say a bank’s website), you begin by downloading a certificate published by the site, which asserts that its Web address is legitimate. It also contains a public ...

Security experts warn of risky attacks on tech-loaded cars

(Phys.org) -- Now that tiny computers and electronic communications systems are being designed into cars, hackers can look toward the car, like the PC, as potential roadkill. If cars are to become computers on wheels, a number ...

US software engineer outsources his job to China

"Bob" the software engineer was becoming a modern workplace legend on Thursday as word spread that he had secretly outsourced his own job to China and sat at his desk watching cat videos.

Thousands in German anti-NSA protest

Thousands took to the streets in Berlin Saturday in protests against Internet surveillance activities by the US National Security Agency and other intelligence agencies, and the German government's perceived lax reaction ...

A medical lab for the home

Fraunhofer FIT demonstrates a mobile wireless system that monitors the health of elderly people in their own homes, using miniature sensors. Besides non-invasive sensors this platform integrates technology to take a blood ...

Connected devices have huge security holes

The surge of Web-connected devices—TVs, refrigerators, thermostats, door locks and more—has opened up huge opportunities for cyberattacks because of weak security, researchers said Tuesday.

Explainer: What is a virtual private network (VPN)?

Have you ever wanted to exist in more than one place at the same time? The laws of physics suggest wormholes through space and time are hypothetical; but wormholes do exist in cyberspace and wonders can be found on the other ...

page 1 from 3