Computer Sciences

Predicting when online conversations turn toxic

The internet offers the potential for constructive dialogue and cooperation, but online conversations too often degenerate into personal attacks. In hopes that those attacks can be averted, Cornell researchers have created ...

Security

Firmware, blind spots flagged by Spectre attack research

Software vulnerability discoveries by security researchers come and go and are more often than not promptly followed by vendor fixes. After each headline scare, you read the labs' reports, you hear about the fixes, and well, ...

Security

ATM makers alert to cash-spitting attacks

Too much trouble. Holding up a bank means you need to buy a ski mask, map out bank exits, zap the surveillance cameras, threaten panic-stricken customers of bad consequences if anyone dares move. And then there is someone ...

Telecom

Mesh networking announcement, new spec from Bluetooth

(Tech Xplore)—Mesh-networking capabilities now in Bluetooth are making news. The Bluetooth Special Interest Group announced that Bluetooth technology has been updated with support for mesh networking, and Bluetooth published ...

page 9 from 40