Hardware

LVI: Intel processors still vulnerable to attack, study finds

Computer scientists at KU Leuven have once again exposed a security flaw in Intel processors. Jo Van Bulck, Frank Piessens, and their colleagues in Austria, the United States, and Australia gave the manufacturer one year's ...

Security

How vulnerable is your car to cyberattacks?

The emergence of smart cars has opened the door to limitless possibilities for technology and innovation—but also to threats beyond the car itself. New research from Michigan State University is the first to apply criminal ...

Software

Tapis computing platform weaves together science computing tools

Scientists looking to reduce their complexity to research and add a new computational tool to their tool belt can explore the Tapis Project. The Tapis software platform aims to help researchers more easily leverage powerful ...

Robotics

Deep-learning method to design fly-like robots

"Just think about what a fly can do," says Professor Pavan Ramdya, whose lab at EPFL's Brain Mind Institute, with the lab of Professor Pascal Fua in EPFL's Institute for Computer Science, led the study. "A fly can climb across ...

Security

Hackers get stuck in an evolving honeypot

Malware, malicious software, is on the rise, whether in the form of Trojans, worms, and viruses, bot-net systems, denial of service tools, and hacking programs. Antivirus, firewall, and intrusion detection systems are all ...

Engineering

Smart glasses follow our eyes, focus automatically

Though it may not have the sting of death and taxes, presbyopia is another of life's guarantees. This vision defect plagues most of us starting about age 45, as the lenses in our eyes lose the elasticity needed to focus on ...

page 8 from 10