In the year 2026, at rush hour, your self-driving car abruptly shuts down right where it blocks traffic. You climb out to see gridlock down every street in view, then a news alert on your wa... Read more
U.S. Army-funded researchers at the University of California in Los Angles have found a proverbial smoking gun signature of the long sought-after Majorana particle, and the find, they say, c... Read more
Like bullets fired from a gun, photos can be traced to individual smartphones, opening up new ways to prevent identity theft Not comfortable with Face ID and other biometrics? This cybersecu... Read more
By turning computer circuits into unsolvable puzzles, a University of Michigan team aims to create an unhackable computer with a new $3.6 million grant from the Defense Advanced Research Pro... Read more
NYU Tandon Researchers Discover Big Cryptographic Potential in Nanomaterial The next generation of electronic hardware security may be at hand as researchers at New York University Tandon Sc... Read more
Until now, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process. A new software system being developed by cybersecurity rese... Read more
There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness. On April 29, someone hit his employer, IDT Corporation, with two cyberweapons that... Read more
Study describes how app, soon to be available, will help thwart growing cybersecurity threat While convenient, Siri, WeChat and other voice-based smartphone apps can expose you to a growing... Read more
A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from Ben-Gurion University of the Negev... Read more
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. After gainin... Read more