Related topics: security

Researcher develops intelligent encryption libraries

Sometimes, when two people or software applications are communicating via the Internet, a third party is listening. Cryptographic protocols could prevent this situation, but software developers often find it difficult to ...

Fewer low clouds in the tropics

With the help of satellite data, ETH scientists have shown that low-level cloud cover in the tropics thins out as the earth warms. Since this cloud cover has a cooling effect on the climate, the two-degree warming target ...

WikiLeaks, NSA leaker Edward Snowden clash on Twitter

National Security Agency leaker Edward Snowden and transparency website WikiLeaks are clashing over how best to handle the publication of sensitive data, a spat played out over Twitter.

Turkey passes long-awaited data protection law

A long-awaited new data protection law came into force in Turkey on Thursday, just days after it emerged that private details about some 50 million citizens had been leaked.

Making mobile health effective and secure

With Internet-connected medical technology and digitized health records on the rise, cybersecurity is a growing concern for patients and hospitals alike. One research team is taking a holistic approach to strengthening the ...

People are info-egoists when it comes to their privacy

People are much more concerned about sharing their own private information with third-party app developers than they are about revealing their friends' data, according to Penn State researchers.

CIA chief 'outraged' by personal email hack

CIA chief John Brennan said Tuesday he was "outraged" that hackers broke into his personal email account, and faulted the media for its coverage of the incident.

page 5 from 12