Related topics: security firm ยท security

Short-duration clock approach thwarts RFID attacks

(Phys.org) -- Security researchers and practitioners at the 21st USENIX Security Symposium in Bellevue, Washington, which starts on Wednesday, will learn how researchers have devised an hourglass technology that can thwart ...

Flame spy virus gets order to vanish: experts

US computer security researchers said Sunday that the Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities has gotten orders to vanish, leaving no trace.

New NIST SRM supports the fight against terrorist bombings

The National Institute of Standards and Technology (NIST) has released a new standard reference material (SRM) to aid in the detection of two explosive compounds that are known to be used by terrorists. Researchers designed ...

BlackBerry maker out to capitalize on rivals

Research In Motion launched a new software platform Tuesday that lets businesses manage smartphones made by rivals that have been devouring the BlackBerry maker's market share.

The trustworthy cloud

Not a week goes by without reports on security gaps, data theft or hacker attacks. Both businesses and private users are becoming increasingly uneasy. However, when it comes to technologies like cloud computing, trust and ...

page 15 from 18