Computer Sciences

Three questions about quantum computing and secure communications

A radically different type of computing technology under development, known as quantum computing, could in theory decode secure communications and jeopardize military communications, critical infrastructure, and financial ...

Security

Using blockchain contracts to build botnets

Blockchain is a decentralized ledger technology that secures the integrity of transactions through digital signatures and will be familiar to anyone who has investigated digital or "crypto" currencies. The technology has ...

Internet

Managing data practices on the web

Surfing the web today exposes users to a shocking array of data collection practices. Websites are building digital profiles about you, targeting ads towards you, and sometimes they're even using your computer to mine cryptocurrency, ...

Telecom

Boom in demand for friendly hackers as 5G approaches

As the number of online devices surges and superfast 5G connections roll out, record numbers of companies are offering handsome rewards to ethical hackers who successfully attack their cybersecurity systems.

Security

A fingerprint for the Internet of Things

The Internet of Things (IoT) consists of billions of sensors and other devices connected to each other via internet, all of which need to be protected against hackers with malicious purposes. A low-cost and energy efficient ...

Security

Consumers don't fully trust smart home technologies

Smart home technologies are marketed to enhance your home and make life easier. However, UK consumers are not convinced that they can trust the privacy and security of these technologies, a study by WMG, University of Warwick ...

Business

US wants undersea data cable to skip Hong Kong

US Justice Department officials on Wednesday recommended that a high-capacity undersea data cable system proposed by Google and Facebook bypass Hong Kong, citing potential national security concerns following China's moves ...

page 3 from 5