rss Last update Combining three treatment strategies may significantly improve melanoma treatment, 1 hour ago

Security news

Location data as an 'identifier' of personal data

A recent doctoral dissertation in legal studies reveals alarming news regarding the vulnerability of location and location data on mobile devices, and while using the internet and location-based services (LBSs) in those devices.

dateDec 06, 2018 in Security
shares5 comments 0

Google accused of manipulation to track users

Seven European consumer groups filed complaints against Google with national regulators Tuesday, accusing the internet giant of covertly tracking users' movements in violation of an EU regulation on data protection.

dateNov 27, 2018 in Security
shares1132 comments 3

Cathay apologises over data breach but denies cover-up

The top two executives at Hong Kong carrier Cathay Pacific on Wednesday apologised for the firm's handling of the world's biggest airline hack that saw millions of customers' data breached but denied trying to cover it up.

Photo recognition that keeps personal interests private

From just a quick snapshot on a smartphone, image recognition technology can provide a wealth of information to help shoppers find in-store bargains and inform tourists of the name of a landmark. But these photos may be giving ...

Eight steps to a stronger cybersecurity strategy

If there's an attack on the country, the military mobilizes. When a natural disaster strikes, recovery plans go into effect. Should an infectious disease start to spread, health officials launch a containment strategy.

Keeping health data under lock and key

Researchers from the Collaborative Research Center CROSSING at Technische Universität Darmstadt (Germany) have developed a solution that will ensure decades of safe storage for sensitive health data in a joint project with ...

New attacks on graphics processors endanger user privacy

Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer's graphics processing unit, or GPU, to spy on web activity, steal passwords, and break ...

Tiny tech tracks hummingbirds at urban feeders
Rice plants that grow as clones from seed
Seeing small-molecule interactions inside cells
Research unlocks secrets of iron storage in algae
Coral larvae found to prefer a noisy environment
Juno mission halfway to Jupiter science
How bacterial communities transport nutrients
New method gives microscope a boost in resolution
The real history of quantum biology
Hot possums risk losing their homes
The stiffest porous lightweight materials ever

Find more news articles via sort by date page