NEW: Find great deals on the latest gadgets and more in the ScienceDaily Store!
Hacking News
February 20, 2017

Latest Headlines
updated 1:49pm EST

More Hacking News
February 20, 2017

Making Distributed Storage Highly Consistent

Jan. 24, 2017 — One of the fundamental open challenges in computer science is effective data storage. The socio-economic value and scale of information increases day by day and researchers have been working to ... read more

Training Computers to Differentiate Between People With the Same Name

Jan. 12, 2017 — How do you tell which Anna Hernandez authored a specific study or which Robert Jones is attempting to board an airplane flight? New researchers have developed a novel-machine learning method to ... read more

Genomic Data Sharing Is Critical to Improving Genetic Health Care

Jan. 5, 2017 — A new position statement tackles the question of how to make sense of the massive amount of genetic information being generated for better patient ... read more

Hack-Proofing Our Devices

Dec. 24, 2016 — A researcher is building better safeguards into the everyday technologies of radio-frequency identification (RFID) and mobile ... read more

Dec. 6, 2016 — We can create software with 100 times fewer vulnerabilities than we do today, according to computer scientists. To get there, they recommend that coders adopt the approaches they have compiled in a ... read more

Computer Scientists Work to Prevent Hackers from Remotely Controlling Cars

Nov. 21, 2016 — A luxury vehicle today contains multiple computers. During an hour's drive, it thus produces multiple gigabytes of data. Even less expensive vehicles are now brimming with information ... read more

Into the Gray Zone: New Report Analyzes Potential of Active Defense as a Response to Sophisticated Cyber Threats in the Private Sector

Oct. 31, 2016 — A new report offers the most comprehensive assessment to date of the legal, policy and technological contexts that surround private sector cybersecurity and active defense measures to improve U.S. ... read more

New Tool Detects Malicious Websites Before They Cause Harm

Oct. 27, 2016 — Malicious websites promoting scams, distributing malware and collecting phished credentials pervade the web. As quickly as we block or blacklist them, criminals set up new domain names to support ... read more

Massive Cyberattack Poses Policy Dilemma

Oct. 25, 2016 — The coordinated cyber attack that crippled parts of the internet on Friday highlighted key policy problems, a cybersecurity scholar ... read more

Weakness Found in Common Computer Chip

Oct. 25, 2016 — A weakness has been found in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks. Computer hackers could take control of ... read more

People Can Tell If They Are Voting on a Secure System

Oct. 24, 2016 — “Rigged” election rhetoric in the headlines aims to cast doubt about the security of the American voting system; however, people have a sense of whether a voting system is secure, according to ... read more

Oct. 24, 2016 — Most white-hat hackers believe hackers will exploit cyber vulnerabilities to remotely access connected vehicles. One objective by security experts is to identify key vehicle cybersecurity challenges ... read more

Weakness of 2G Mobile Phone Networks Revealed

Oct. 21, 2016 — A fast and relatively simple attack on second generation digital mobile phone communications highlights the need to update security on older mobile ... read more

First Complete Sabotage Attack Demonstrated on a 3-D Printed Drone Propeller

Oct. 20, 2016 — Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a cyber attack and ... read more

Oct. 18, 2016 — A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised -- with several hundred of the "buckets" actively ... read more

Oct. 18, 2016 — If you type on your desktop or laptop computer's keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to ... read more

Encrypting Medical Photos With Chaos

Oct. 11, 2016 — Chaos and confusion could be used to encrypt color photos and protect them from prying eyes, according to computer scientists in Algeria. Writing in a new article, the team describes a new algorithm ... read more

Solution for Secure Processing of Patient Data Revealed

Sep. 30, 2016 — Large-scale research involving patient data can be done without threat to either the security of the information or the privacy of the patients, thanks to a newly revealed technique. This technique ... read more

Encryption Method Takes Authentication to a New Level, Improves Privacy Protection

Sep. 29, 2016 — New kinds of encryption methods have been developed for improving the privacy protection of consumers to enable safer, more reliable and easier-to-use user authentication than current systems allow. ... read more

Sep. 27, 2016 — Whether for use in safe data encryption, ultrafast calculation of huge data volumes or so-called quantum simulation of highly complex systems: Optical quantum computers are a source of hope for ... read more

Tuesday, January 24, 2017
Thursday, January 12, 2017
Thursday, January 5, 2017
Saturday, December 24, 2016
Tuesday, December 6, 2016
Monday, November 21, 2016
Monday, October 31, 2016
Thursday, October 27, 2016
Tuesday, October 25, 2016
Monday, October 24, 2016
Friday, October 21, 2016
Thursday, October 20, 2016
Tuesday, October 18, 2016
Tuesday, October 11, 2016
Friday, September 30, 2016
Thursday, September 29, 2016
Tuesday, September 27, 2016
Wednesday, September 21, 2016
Friday, September 16, 2016
Friday, September 9, 2016
Thursday, September 8, 2016
Wednesday, September 7, 2016
Thursday, September 1, 2016
Monday, August 29, 2016
Thursday, August 25, 2016
Friday, August 19, 2016
Wednesday, August 17, 2016
Thursday, August 11, 2016
Friday, August 5, 2016
Wednesday, July 27, 2016
Tuesday, July 19, 2016
Wednesday, July 13, 2016
Monday, July 11, 2016
Thursday, June 30, 2016
Tuesday, June 28, 2016
Thursday, June 23, 2016
Monday, June 20, 2016
Friday, June 17, 2016
Thursday, June 16, 2016
Thursday, June 9, 2016
Wednesday, June 8, 2016
Wednesday, June 1, 2016
Monday, May 23, 2016
Monday, May 16, 2016
Thursday, May 12, 2016
Tuesday, May 10, 2016
Monday, May 9, 2016
Wednesday, May 4, 2016
Wednesday, April 27, 2016
Friday, April 15, 2016
Thursday, April 14, 2016
Wednesday, April 13, 2016
Tuesday, April 12, 2016
Thursday, April 7, 2016
Tuesday, April 5, 2016
Friday, April 1, 2016
Thursday, March 24, 2016
Monday, March 21, 2016
Friday, March 18, 2016
Thursday, March 17, 2016
Friday, March 11, 2016
Thursday, March 10, 2016
Wednesday, March 9, 2016
Tuesday, March 8, 2016
Thursday, March 3, 2016
Wednesday, March 2, 2016
Tuesday, March 1, 2016
Monday, February 29, 2016
Wednesday, February 24, 2016
Tuesday, February 23, 2016
Monday, February 22, 2016
Friday, February 19, 2016
Tuesday, February 16, 2016
Wednesday, February 10, 2016
Wednesday, February 3, 2016
Monday, February 1, 2016
Wednesday, December 23, 2015
Friday, December 18, 2015
Tuesday, December 15, 2015
Thursday, December 10, 2015