Browse News Stories
41 to 50 of 627 stories
view headlines only
-
Turning Smartphones Into Secure and Versatile Keys
January 3, 2013 It's already possible to open doors using an app -- but we are a long way from seeing widespread acceptance of this in the market. Now, researchers have developed a piece of software that will make ... > full story -
Secure Communication Technology Can Conquer Lack of Trust
January 2, 2013 Many scenarios in business and communication require that two parties share information without either being sure if they can trust the other. Examples include secure auctions and identification at ... > full story -
Students' Online and Offline Social Networks Can Predict Course Grades
December 27, 2012 The information can be used to determine which students need the most help, as well as which ones excel and might be guided to further study or careers in that subject ... > full story -
Trapping Malware With Honeypots
December 10, 2012 Hackers systematically scan the Internet for vulnerable systems with the help of self-spreading malware. On average, accessible systems are the target of an attack every three minutes whereby ... > full story -
Data Storage: Electrically Enhanced Recall
December 10, 2012 Operating tiny magnetic memories under electrical fields reduces power demand and could enable storage and retrieval of data at much higher speeds than conventional ... > full story -
Mobile Browsers Fail Internet Safety Test
December 5, 2012 How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent ... > full story -
Preventing 'Cyber Pearl Harbor': Improving Cyber Attack Detection Through Computer Modeling
November 30, 2012 A new study shows computer network security analysts are not prepared for drawn out cyber ... > full story -
Mimicking Public Health Strategies Could Improve Cyber Security
November 29, 2012 Mimicking public health strategies, such as maintaining good “cyber hygiene,” could improve cyber security, according to a new ... > full story -
Information Technology
Computers and Internet
Computer Science
Distributed Computing
Hacking
Computer Programming
Researchers Identify Ways to Exploit 'Cloud Browsers' for Large-Scale, Anonymous Computing
November 28, 2012 Researchers have found a way to exploit cloud-based Web browsers, using them to perform large-scale computing tasks anonymously. The finding has potential ramifications for the security of 'cloud ... > full story -
Beating the Dark Side of Quantum Computing
November 16, 2012 A future quantum computer will be able to carry out calculations billions of times faster than even today's most powerful machines by exploit the fact that the tiniest particles, molecules, atoms and ... > full story
Search ScienceDaily
Number of stories in archives: 140,690

