Security

NIST retires SHA-1 cryptographic algorithm due to vulnerabilities

The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST). ...

Internet

With Twitter in chaos, some ways to protect your account

Twitter is in chaos. Elon Musk, its new owner, has decimated its staff and this week gave those remaining an ultimatum—work grueling hours and be "extremely hardcore " or leave. Hundreds chose the latter and headed for ...

Energy & Green Tech

Robot issue delays fuel removal from Fukushima nuclear plant

The operator of the wrecked Fukushima nuclear power plant said Thursday it is further postponing the start of the removal of highly radioactive melted fuel from its damaged reactors because of delays in the development of ...

Computer Sciences

Sensor imperfections are perfect for forensic camera analysis

In a project aimed at developing intelligent tools to fight child exploitation, University of Groningen computer scientists have developed a system to analyze the noise produced by individual cameras. This information can ...

Energy & Green Tech

How electric vehicles could fix the grid

Transportation is the single biggest source of greenhouse gas emissions in the United States, accounting for about a third of all emissions. We could quickly lower those emissions by electrifying vehicles, but there's just ...

page 7 from 15