Security

Encrypting images chaotically

An artificial neural network approach to image encryption offers many advantages over conventional encryption methods suggests a review published in the International Journal of Services Operations and Informatics. Shaimaa ...

Hardware

Plug-and-play bug exposes millions of network devices

A bug in a protocol used by virtually all Internet of Things devices exposes millions of users to potential attack, a researcher reported Monday. The fault centers on the Universal Plug and Play protocol, a 12-year-old implementation ...

Consumer & Gadgets

Apple unveils first new iPod model in four years

Apple on Tuesday introduced its first new iPod model in four years, highlighting music and games as it continued to make a priority of serving up digital content.

Engineering

Converting Wi-Fi signals to electricity with new 2-D materials

Imagine a world where smartphones, laptops, wearables, and other electronics are powered without batteries. Researchers from MIT and elsewhere have taken a step in that direction, with the first fully flexible device that ...

Security

Goodbye, login. Hello, heart scan.

Forget fingerprint computer identification or retinal scanning. A University at Buffalo-led team has developed a computer security system using the dimensions of your heart as your identifier.

Telecom

Wi-Fi Alliance continues tech advance with WiFi 802.11ac Wave 2

(Tech Xplore)—A new Wi-Fi standard carries a promising impact on products meeting the new standard. Tech watchers are saying that 802.11ac Wave 2 certification means one can expect better performance and capacity in Wi-Fi.

page 2 from 3