Dec. 10, 2015 A study about user attitudes to different personal identification methods has been conducted. It concludes that the most popular identification methods were internet banking access codes and ...
read more
Dec. 7, 2015 An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. The research raises the ...
read more
Nov. 10, 2015 Think your web browsing is private? A new study of one million top websites finds that 88 percent reveal user data to third parties, often without the user's ...
read more
Oct. 29, 2015 Sharing genomic information among researchers is critical to the advance of biomedical research. Yet genomic data contains identifiable information and, in the wrong hands, poses a risk to individual ...
read more
Oct. 28, 2015 A new study offers the first end-to-end evaluation of the Web's certificate revocation ecosystem, which includes website administrators that obtain and revoke certificates, certificate ...
read more
Oct. 23, 2015 Researchers tested users’ abilities to detect malware and phishing attacks while measuring the neurophysiological behavior underlying these ...
read more
Oct. 20, 2015 How Australia acts today will determine the security and safety of driverless cars, autonomous vehicles and intelligent transport systems in the future, with academics warning there is a risk of ...
read more
Oct. 17, 2015 Multitasking when using mobile devices creates stress and increases the potential for choosing unsafe apps, new research shows. A new study examined the conditions under which mobile device users are ...
read more
Oct. 13, 2015 In recent years the practice of Android rooting, that is the process of allowing an Android phone or tablet to bypass restrictions set by carriers, operating systems or hardware manufacturers, has ...
read more
Oct. 13, 2015 Researchers say that cybersecurity breeches are not happening more frequently than they did a decade ago. And these data breaches in general are not growing in ...
read more
Oct. 13, 2015 Computer scientists are unveiling a novel approach to discovering stealth attacks on computers. The scientists' secret formula in finding a stealth attack is in their algorithms. With specific ...
read more
Oct. 9, 2015 Researchers have developed a second-generation tool called 'Sunlight' that matches user-tailored ads and recommendations to tidbits of information supplied by users at a greater scale and ...
read more
Oct. 7, 2015 The promise of big data lies in researchers' ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the world.These data may be ...
read more
Sep. 29, 2015 A team of researchers in two experiments was able to decrypt more than 23,000 RRNs using both computation and logical reasoning. The findings suggest that, while such identifiers are encrypted to ...
read more
Sep. 25, 2015 Cyber-criminals are taking advantage of real-world events with high volumes of traffic on Twitter in order to post links to websites which contain ...
read more
Sep. 24, 2015 Some health apps that have been clinically accredited may not have been complying with principles of data protection, according to research. In some instances health apps were found to be sending ...
read more
Sep. 23, 2015 A computer scientist will use three grants to develop approaches to safeguarding sensitive genetic information. Along with co-researchers, he will systematically evaluate potential privacy breaches ...
read more
Sep. 22, 2015 Researchers have 'teleported' or transferred quantum information carried in light particles over 100 kilometers (km) of optical fiber, four times farther than the previous ...
read more
Sep. 21, 2015 For the first time, researchers have developed an inexpensive, secure method to prevent mass credit card fraud using existing magnetic card readers. The novel technique -- called SafePay -- works by ...
read more
Sep. 10, 2015 Using a homegrown app on a Samsung Gear Live smart watch, researchers were able to guess what a user was typing through data 'leaks' produced by the motion sensors on smart watches. The ...
read more
Thursday, December 10, 2015
Monday, December 7, 2015
Tuesday, November 10, 2015
Thursday, October 29, 2015
Wednesday, October 28, 2015
Friday, October 23, 2015
Tuesday, October 20, 2015
Saturday, October 17, 2015
Tuesday, October 13, 2015
Friday, October 9, 2015
Wednesday, October 7, 2015
Tuesday, September 29, 2015
Friday, September 25, 2015
Thursday, September 24, 2015
Wednesday, September 23, 2015
Tuesday, September 22, 2015
Monday, September 21, 2015
Thursday, September 10, 2015
Monday, August 24, 2015
Thursday, August 20, 2015
Tuesday, August 18, 2015
Thursday, August 13, 2015
Wednesday, August 12, 2015
Tuesday, August 11, 2015
Tuesday, August 4, 2015
Monday, August 3, 2015
Thursday, July 30, 2015
Wednesday, July 29, 2015
Tuesday, July 28, 2015
Wednesday, July 22, 2015
Thursday, July 9, 2015
Thursday, July 2, 2015
Monday, June 29, 2015
Wednesday, June 24, 2015
Tuesday, June 2, 2015
Tuesday, May 26, 2015
Thursday, May 21, 2015
Wednesday, May 20, 2015
Monday, May 11, 2015
Thursday, May 7, 2015
Thursday, April 30, 2015
Tuesday, April 28, 2015
Wednesday, April 22, 2015
Thursday, April 16, 2015
Wednesday, April 15, 2015
Tuesday, April 14, 2015
Wednesday, April 8, 2015
Thursday, April 2, 2015
Wednesday, April 1, 2015
Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Wednesday, March 11, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Wednesday, March 4, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Monday, February 16, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Tuesday, February 10, 2015
Wednesday, February 4, 2015
Monday, February 2, 2015
Thursday, January 8, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Tuesday, December 16, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Tuesday, November 25, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Thursday, November 13, 2014
Tuesday, November 11, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014
Tuesday, October 21, 2014
Thursday, October 16, 2014
Wednesday, October 15, 2014