Security

New software continuously scrambles code to foil cyber attacks

As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief.

Security

Malware seen turning systems into proxies without consent

A cybersecurity company has spotted malware which sets up anonymous proxies on infected personal computers. Lee Mathews in Geek.com said the strain turns infected machines into anonymous proxy hosts.

Consumer & Gadgets

Microsoft reports new Windows vulnerability

Microsoft reported a "critical" security vulnerability Monday that could affect millions of Windows users. The critical label is the highest severity rating issued to potential threats.

Telecom

Deep neural networks are coming to your phone

How does a self-driving car tell a person apart from a traffic cone? How does Spotify choose songs for my "Discover Weekly" playlist? Why is Gmail's spam filter so effective?

Security

How your little email server puts you in charge

Helm is a startup that wants to satisfy people who dream of having ownership of their email content. Companies hold your data on their servers; this Helm concept is the price you would pay for turning that around, where you ...

Security

Apache vulnerability is reported

(Tech Xplore)—The Fuzzing Project blog this week carried a report we really do not like to hear but must know about regardless. Another "bleed" has been discovered. A bug in the Apache Web Server may result in contents ...

page 1 from 4