Computer Sciences

The creative data interpreters

The ETH spin-off SpinningBytes programs software that uses machine learning not only to analyse but also to understand huge amounts of data. It enables customised solutions to be developed for numerous IT problems, and allows ...

Security

Inside the fight against malware attacks

When malicious software attacks, computer scientists and security researchers want to know how the attackers got into what was supposed to be a secure system, and what they're actually doing that's causing problems for users. ...

Security

The Internet of Things could spark a new wave of cyber attacks

The past few weeks have seen a remarkable and somewhat alarming development in cyber security. It comes in the wake of a distributed denial of service (DDoS) attack that has forced a rethink of how we can deal with attacks ...

Security

Cybersecurity's weakest link is humans

There is a common thread that connects the hack into the sluicegate controllers of the Bowman Avenue dam in Rye, New York; the breach that compromised 20 million federal employee records at the Office of Personnel Management; ...

page 28 from 40

Attacker

In some sports, an attacker is a specific type of player, usually one whose role involves aggressive play. Heavy attackers are usually placed up front so they can score some points for the team.

In football, attackers are also referred to as strikers.

This text uses material from Wikipedia, licensed under CC BY-SA