Security

A security technique to fool would-be cyber attackers

Multiple programs running on the same computer may not be able to directly access each other's hidden information, but because they share the same memory hardware, their secrets could be stolen by a malicious program through ...

Consumer & Gadgets

How Android unlocking patterns could be made more secure

Users of Android devices can unlock the display by entering a pattern. This function is convenient and thus popular—however, less secure than locking with a PIN. An international research team thus recommends implementing ...

Telecom

Satellite security lags decades behind the state of the art

Thousands of satellites are currently orbiting the Earth, and there will be many more in the future. Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed ...

Security

Virtual city prepares students for future of cybersecurity

The University of Arizona is training the next generation of cybersecurity professionals using CyberApolis, a virtual city built for online education and hosting cyber intelligence operations and training.

Computer Sciences

Three questions about quantum computing and secure communications

A radically different type of computing technology under development, known as quantum computing, could in theory decode secure communications and jeopardize military communications, critical infrastructure, and financial ...

Business

Dutch government to restrict sales of processor chip tech

The Dutch government announced Wednesday that it is planning on imposing additional restrictions on the export of machines that make advanced processor chips, joining a U.S. push that aims at limiting China's access to materials ...

Security

Log4j software flaw 'endemic,' new cyber safety panel says

A computer vulnerability discovered last year in a ubiquitous piece of software is an "endemic" problem that will pose security risks for potentially a decade or more, according to a new cybersecurity panel created by President ...

Security

EXPLAINER: The security flaw that's freaked out the internet

Security pros say it's one of the worst computer vulnerabilities they've ever seen. Firms including Microsoft say state-backed Chinese and Iranian hackers and rogue cryptocurrency miners have already seized on it.

page 2 from 3