rss Last update 'Can't be called water': Brazil marks two months since dam disaster, 1 hour ago

Security news

How suspicious parties can work together safely

Cryptographer Max Fillinger developed new methods to analyse a group of algorithms called commitments schemes. These schemes are building blocks for cryptographic protocols, which enable multiple parties that do not trust ...

dateMar 19, 2019 in Security
shares5 comments 0

Roadmap for cyber security research

In their secUnity roadmap, 30 renowned European IT security experts of the BMBF-funded secUnity collaboration outlined how digital threats on the European level can be responded to more efficiently in the future. Among these ...

dateMar 12, 2019 in Computer Sciences Security
shares22 comments 0

Testers look into security of car alarms

A: "You mean your keyless-entry car was stolen in spite of your alarm?" B: "No, my car was stolen because of my alarm." Does this make any sense? It would if you read about a UK security firm's findings when they went looking ...

dateMar 09, 2019 in Security weblog
shares47 comments 2

Data transfer by controlled noise

In information technology, multiplexing schemes are used to transmit more signals than the number of available transmission channels. Researchers at ETH in Zurich have invented a novel method whereby information is encoded ...

Researchers safeguard hardware from cyberattack

Researchers have developed an algorithm that safeguards hardware from attacks to steal data. In the attacks, hackers detect variations of power and electromagnetic radiation in electronic devices' hardware and use that variation ...

Experts: US anti-Huawei campaign likely exaggerated

Since last year, the U.S. has waged a vigorous diplomatic offensive against the Chinese telecommunications giant Huawei, claiming that any nation deploying its gear in next-generation wireless networks is giving Beijing a ...

Supercomputers can spot cyber threats

Identifying cybersecurity threats from raw internet data can be like locating a needle in a haystack. The amount of internet traffic data generated in a 48-hour period, for example, is too massive for one or even 100 laptops ...

Security team discussed weakness in bare-metal services

Back door open. Never a good sign in a computer security environment. Researchers poking around are sure to call out their discoveries in an instance such as the recent one, where cloud servers looked as if they could be ...

UN aviation agency concealed serious hack: media

The Montreal-based United Nations aviation agency concealed for months a hack of its computers and allowed malware to spread throughout the airline industry, Canada's public broadcaster reported Wednesday.

Coffee-based colloids for direct solar absorption
Paleontologists report world's biggest Tyrannosaurus rex
EPA adviser is promoting harmful ideas, scientists say
Not all stem cells are created equal, study reveals
NASA instruments image fireball over Bering Sea
The taming of the light screw
What can machine learning reveal about the solid Earth?
A social bacterium with versatile habits
Ancient birds out of the egg running

Find more news articles via sort by date page