Hardware

Radio waves for the detection of hardware tampering

As far as data security is concerned, there is an even greater danger than remote cyberattacks: namely tampering with hardware that can be used to read out information—such as credit card data from a card reader. Researchers ...

Security

Helping companies prioritize their cybersecurity investments

One reason that cyberattacks have continued to grow in recent years is that we never actually learn all that much about how they happen. Companies fear that reporting attacks will tarnish their public image, and even those ...

Automotive

How drivers and cars understand each other

Optimizing communication between vehicle and driver as a function of the degree of automation is the objective of a research project conducted by Fraunhofer in collaboration with other companies. The researchers are combining ...

Business

US to ban TikTok downloads, block WeChat use

The United States on Friday ordered a ban on downloads of popular video app TikTok and effectively blocked the use of the Chinese super-app WeChat on national security grounds, escalating a fight with Beijing over technology.

Software

Creating software that will unlock the power of exascale

Leading research organizations and computer manufacturers in the U.S. are collaborating on the construction of some of the world's fastest supercomputers—exascale systems capable of performing more than a billion billion ...

page 4 from 26