Related topics: google · network

Network traffic provides early indication of malware infection

By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. ...

Army researchers identify new way to improve cybersecurity

With cybersecurity one of the nation's top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it. Researchers at the U.S. ...

Kim Dotcom apologises for Mega bugs

Megaupload founder and alleged online piracy kingpin Kim Dotcom apologised for teething problems with his new file-sharing service Tuesday, saying massive global interest had swamped the website.

Team develops software to predict and prevent drone collisions

When Jeff Bezos unveiled his vision of drones delivering packages to Amazon customers during a 60 Minutes segment in late 2013, it caught many people as science fiction. Scarcely two years later, drones are poised to become ...

Next question: can the NSA crack Tor keys?

(Phys.org) —"After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH [DH refers to Diffie-Hellman] ...

page 6 from 40