Tackling Zika—using bacteria as a Trojan horse

Bacteria in the gut of disease-bearing insects - including the mosquito which carries the Zika virus - can be used as a Trojan horse to help control the insects' population, new research at Swansea University has shown.

Tit-for-tat hack as Israeli posts Saudi credit cards

An Israeli hacker published details of what he claimed were more than 200 Saudi-owned credit cards online overnight in a revenge attack after a similar move by "Saudi" hackers earlier this month.

Norway hit by major data-theft attack

(AP) -- Data from Norway's oil and defense industries may have been stolen in what is feared to be one of the most extensive data espionage cases in the country's history, security officials said Thursday.

Scavenger cells accomplices to viruses

Mucosal epithelia do not have any receptors on the outer membrane for the absorption of viruses like hepatitis C, herpes, the adenovirus or polio, and are thus well-protected against pathogenic germs. However, certain viruses, ...

Wiretapping Skype calls: virus eavesdrops on VoIP

(AP) -- Some computer viruses have a crude but scary ability to spy on people by logging every keystroke they type. Now hackers and potentially law enforcement have another weapon: a virus that can eavesdrop on voice conversations ...