Computer Sciences

Making Bitcoin more secure

A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: don't. Or at least, be careful. Researchers from MSU ...

Computer Sciences

Outsmarting the PIN code

A PIN code is usually required at the checkout when paying large sums by credit card. ETH researchers have now discovered a flaw in the security system of some credit cards.

Telecom

Security gap allows eavesdropping on mobile phone calls

Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum have shown that this ...

Security

Real-time Captcha technique improves biometric authentication

A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users' faces. Known as Real-Time Captcha, the technique uses a unique "challenge" that's easy ...

Consumer & Gadgets

Balancing security and usability in mobile applications

Mobile applications have become a ubiquitous part of daily life for millions of people. They have transformed the way in which we communicate, share information, do business, entertain ourselves, and manage many aspects of ...

page 2 from 7