rss Last update DRCongo prepares for first Ebola vaccinations, 1 hour ago

Security news

Email encryption standards hacked

A research team from the University of Applied Sciences (FH) in Münster, Horst Görtz Institute for IT Security at Ruhr-Universität Bochum (RUB), and Katholieke Universiteit Leuven has demonstrated that the two most common ...

dateMay 14, 2018 in Security
shares18 comments 0

Alexa, check my security settings

Do you trust the Internet of Things? More to the point, do you trust "Alexa" the voice-activated software in the Amazon Echo and related IoT devices? There is not necessarily any particular reason not to trust Alexa and Amazon, ...

dateMay 10, 2018 in Security
shares11 comments 0

NYPD tests new tool that detects credit card skimmers

Patrick Traynor, a cybersecurity expert, was in New York in February working with police to help identify a way to detect credit card skimmers on ATMs when he got a financial fraud alert: his own information had been stolen ...

dateMay 09, 2018 in Security
shares15 comments 0

Cryptojacking spreads across the web

Right now, your computer might be using its memory and processor power – and your electricity – to generate money for someone else, without you ever knowing. It's called "cryptojacking," and it is an offshoot of the rising ...

dateMay 08, 2018 in Security
shares5 comments 0

Romanian who attacked Warcraft gets year in prison

A Romanian man who launched a cyber attack on the California-based servers of the hugely popular online fantasy game World of Warcraft over a squabble with other players was sentenced on Monday to one year in prison.

dateMay 07, 2018 in Security
shares23 comments 0

Claiming credit for cyberattacks

The decision to claim credit for a cyberattack on a government or institution depends on both the goals of the attack and the characteristics of the attacker, according to a study co-authored by a UConn political scientist ...

Cybersecurity teams that don't interact much perform best

Army scientists recently found that the best, high-performing cybersecurity teams have relatively few interactions with their team-members and team captain. While this result may seem counterintuitive, it is actually consistent ...

The hidden data in your fingerprints

Fingerprints have provided key evidence in countless cases of serious crime. But there are still some situations in which it can be difficult or impossible to recover fingerprints and this can cause a headache for forensic ...

A soft solution to the hard problem of energy storage
Research offers new insights into malaria parasite
A new way to make biaxial nematic phase liquid crystals
Self-assembling 3-D battery would charge in seconds

Find more news articles via sort by date page