Security

Study finds 'lurking malice' in cloud hosting services

A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised - with several hundred of the "buckets" actively providing malware. Such bad content ...

Internet

Simulating quantum many-body systems on Amazon Web Services

Quantum many-body systems (QMBs), which are physical systems made up of multiple interacting particles, are among the most challenging structures to reproduce in numerical simulations. In the past, researchers have attempted ...

Computer Sciences

Using deep learning to localize human eyes in images

A team of researchers at China University of Geosciences and Wuhan WXYZ Technologies in China has recently proposed a new machine learning-based technique to locate people's eyes in images of their faces. This technique, ...

Computer Sciences

A model to determine the impact of DDoS attacks using Twitter data

Distributed denial of service (DDoS) attacks, which are designed to prevent legitimate users from accessing specific network systems, have become increasingly common over the past decade or so. These attacks make services ...

Security

Shortened URLs may open a window on your life

It may be convenient to shrink a long, convoluted web address into just a few characters that will fit into a tweet, but the trend of using shortened URLs offers a new opportunity for hackers to invade your privacy, Cornell ...

Computer Sciences

Exploring open-ended evolution in web services

Just like living ecosystems, web services form a complex artificial system consisting of tags and the user-generated media associated with them, such as photographs, movies and web pages. When drawing an analogy between biological ...

Security

Maestro: a new attack that orchestrates malicious flows with BGP

Researchers at the University of Tennessee have recently identified the Maestro attack, a new link flooding attack (LFA) that leverages plane traffic control engineering techniques to concentrate botnet-sourced distributed ...

Consumer & Gadgets

A web application to extract key information from journal articles

Academic papers often contain accounts of new breakthroughs and interesting theories related to a variety of fields. However, most of these articles are written using jargon and technical language that can only be understood ...

Business

Apple is jumping belatedly into the streaming TV business

Jumping belatedly into a business dominated by Netflix and Amazon, Apple announced its own TV and movie streaming service Monday, enlisting such superstars as Oprah Winfrey, Jennifer Aniston and Steven Spielberg to try to ...

Security

ATM makers alert to cash-spitting attacks

Too much trouble. Holding up a bank means you need to buy a ski mask, map out bank exits, zap the surveillance cameras, threaten panic-stricken customers of bad consequences if anyone dares move. And then there is someone ...

Security

Akamai speaks out on uptick of DDoS attacks

Internet security's big bully: Distributed Denial of Service (DDoS) which messes up normal traffic of a targeted server or network with a flood of HTTP requests, malformed packets. Crash, bam boom. Missions accomplished. ...

page 1 from 19