
Computer Scientists Develop 'Mathematical Jigsaw Puzzles' to Encrypt Software
Computer science experts
have designed a system to
encrypt software so that it
only allows someone to use a
program as intended while
... > full story

How to Keep Kids Engaged With Educational Games
If you want teams of
students to stay engaged
while playing educational
games, you might want them
to switch seats pretty
often. That's one finding
... > full story

Solar Tsunami Used to Measure Sun's Magnetic Field
A solar tsunami observed by
NASA's Solar Dynamics
Observatory and the Japanese
Hinode spacecraft has been
used to provide the first
accurate estimates of the
... > full story

New Hardware Design Protects Data in the Cloud
A new hardware design makes
data encryption more secure
by disguising cloud servers'
memory-access patterns. ... > full story
Browse News Stories
1 to 10 of 437 stories
view headlines only
-
Profile of Likely E-Mail Phishing Victims Emerges in Human Factors/ergonomics Research
July 25, 2013 A new paper describes behavioral, cognitive, and perceptual attributes of e-mail users who are vulnerable to phishing attacks. Phishing is the use of fraudulent e-mail correspondence to obtain ... > full story -
Technology Could Be 'Aggravating' Factor in Sentencing
July 23, 2013 Existing criminal offenses which feature the use of computers could be treated in the same way as offenses involving driving, researchers ... > full story -
The Inverse CSI Effect in the Age of Digital Crime
July 9, 2013 The "CSI Effect" has been described as being an increased expectation from jurors that forensic evidence will be presented in court that is instantaneous and unequivocal because that is how it is ... > full story -
App to Protect Private Data on iOS Devices Finds Almost Half of Other Apps Access Private Data
June 20, 2013 Almost half of the mobile apps running on Apple's iOS operating system access the unique identifier of the devices where they're downloaded, computer scientists have found. In addition, more than 13 ... > full story -
Protection for Whistleblowers: New System Would Allow for Secret Data Transfer
June 19, 2013 Scientists are developing a system that would make it possible for an individual to submit data over the Internet while remaining ... > full story -
Making Memories: Practical Quantum Computing Moves Closer to Reality
June 19, 2013 Researchers have developed a new way to design quantum memory, bringing quantum computers a step closer to ... > full story -
Spintronics Approach Enables New Quantum Technologies
June 4, 2013 Researchers highlight the power of emerging quantum technologies in two recent articles. New technologies exploit quantum mechanics, the physics that dominates the atomic world, to perform disparate ... > full story -
Hacking
Encryption
Information Technology
Artificial Intelligence
Computers and Internet
Computer Programming
Android Antiviral Products Easily Evaded
May 30, 2013 Think your antivirus product is keeping your Android safe? Think again. Ten of the top Android antiviral products are rendered useless by the simplest ... > full story -
Just How Secure Is Quantum Cryptography?
May 28, 2013 Unlike classical encryption, quantum communication systems are known to offer the promise of virtually unbreakable encryption. Now, new research on this topic is shaking up the long-held notion that ... > full story -
Data Storage: Synchronized at the 'Write Time'
May 13, 2013 Numerical simulations show how to avoid imperfections in the next generation of high-density data ... > full story
Search ScienceDaily
Number of stories in archives: 140,675

