Internet

Safer web surfing with a new method for detecting malicious modes

With the ever-increasing importance of the Internet in our lives, there are growing attempts to exploit software vulnerabilities in our PCs for personal benefit. One way to do so is by infecting the victim's PC with a malicious ...

Hi Tech & Innovation

Sniffing out your identity with breath biometrics

Biometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as ...

Consumer & Gadgets

An edible QR code takes a shot at fake whiskey

In the future, when you order a shot of whiskey, you might ask the bartender to hold an edible fluorescent silk tag that could be found floating inside—even though it is safe to consume.

Security

Detecting distributed denial of service attacks

The distributed denial-of-service (DDOS) attack may well be familiar to anyone who has spent time running online services, such as websites. It is a malicious attack on the servers running the system that simply bombards ...

Business

SolarWinds says its new security measures are reassuring clients

SolarWinds says it has beefed up security and tightened its software screening process 15 months after one of the most sophisticated cyberattacks exposed thousands of its customers to Russian spies and left U.S. government ...

Business

China tightens control over company data with transfer rules

Companies in China would need government approval to transfer important data abroad under proposed rules announced Friday that would tighten Beijing's control over information and might disrupt operations for international ...

Software

Apps for popular smart home devices contain security flaws

New cybersecurity research from Florida Tech has found that the smartphone companion applications of 16 popular smart home devices contain "critical cryptographic flaws" that could allow attackers to intercept and modify ...

Consumer & Gadgets

Encrypting photos on the cloud to keep them private

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A new study from computer scientists at Columbia Engineering reveals what may be the first way to encrypt personal ...

page 2 from 5