Last update:

Researchers design new techniques to bolster memory safety

Because corporations and governments rely on computers and the internet to run everything from the electric grid, healthcare, and water systems, computer security is extremely important to all of us. It is increasingly being ...

What users think about logging in without a password

Many users consider passwords extremely burdening. An authentication protocol for websites, called WebAuthn, could render them obsolete. Users can use it to log on to a service such as a social network or an online shopping ...

Advertising and Android apps: A detailed study of data privacy

The concept of privacy in the age of the web and social media remains high on the agenda for many people—those on the business and marketing side who would like to advertise with greater precision and those on the consumer ...

Hit by a ransomware attack? Your payment may be deductible

As ransomware attacks surge, the FBI is doubling down on its guidance to affected businesses: Don't pay the cybercriminals. But the U.S. government also offers a little-noticed incentive for those who do pay: The ransoms ...

Ukraine police seize cash in raids on major ransomware gang

Ukrainian police have carried out nearly two dozen raids targeting alleged associates of a Russian-speaking ransomware gang it blamed for a half billion dollars in cyberattacks and extortion that hit the United States and ...

Expert discusses ransomware attacks and how to prevent them

The recent ransomware attack on a major oil refinery in the United States, followed weeks later by another hack that affected a large meat supplier, have again brought the issue of cyberattacks to the forefront of people's ...

Critical entities targeted in suspected Chinese cyber spying

A cyberespionage campaign blamed on China was more sweeping than previously known, with suspected state-backed hackers exploiting a device meant to boost internet security to penetrate the computers of critical U.S. entities.

Scrambling against smudge attacks

The security-conscious among us use a PIN, a personal identification number, to "lock" our smartphones so that if the device is lost or stolen, a third party should not be able to access our contacts, messages, and other ...

Video game maker EA says hackers stole source code

Electronic Arts said Thursday hackers managed to steal source code and other software tools from the video game giant, but that the attack was unlikely to have an impact on gamers or business operations.

Other news

Plants & Animals
How does the one-humped Arabian camel survive without drinking?
Plants & Animals
Mongooses solve inequality problem
Environment
Rising greenhouse gases pose continued threat to Arctic ozone layer
Plants & Animals
Colombia has the world's largest variety of butterfly species: study
Environment
Crushing climate impacts to hit sooner than feared: draft UN report
Plants & Animals
Geckos might lose their tails, but not their dinner
Astronomy
Nightside radio could help reveal exoplanet details
Earth Sciences
Natural hazards threaten 57% of US structures
Social Sciences
Cities 'must become car-free to survive'
Environment
Asymmetry in carbon dioxide emissions and removals could skew climate targets: research
Plants & Animals
Songbirds and humans share some common speech patterns
General Physics
Sound-induced electric fields control the tiniest particles
Optics & Photonics
Researchers propose the use of quantum cascade lasers to achieve private free-space communications
Astronomy
Is dark matter real, or have we misunderstood gravity?
Astronomy
Study sheds more light on the properties of open cluster IC 1434
Environment
Unchecked climate change will cause severe drying of the Amazon forest
General Physics
What the Muon g-2 results mean for how we understand the universe
Biotechnology
Growing food with air and solar power: More efficient than planting crops
Superconductivity
Exotic superconductors: The secret that wasn't there
Earth Sciences
More intense and frequent thunderstorms linked to global climate variability