Software

Identifying software vulnerabilities quickly and efficiently

Almost every new program code has bugs that, in the worst case, can potentially compromise security. In order to detect them quickly and efficiently, researchers from the Horst Görtz Institute for IT Security at Ruhr University ...

Computer Sciences

New computing architecture protects sensitive private data

As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for computing architectures. Applications that process ...

Security

Microsoft and partners toughen firmware defense

For many people who are not tech professionals, the word "firmware" first appears to them in the negative. News items over the past years have used the word over and over again to report attacks. What is firmware? If software ...

page 1 from 2