In the year 2026, at rush hour, your self-driving car abruptly shuts down right where it blocks traffic. You climb out to see gridlock down every street in view, then a news alert... Read more
U.S. Army-funded researchers at the University of California in Los Angles have found a proverbial smoking gun signature of the long sought-after Majorana particle, and the find, t... Read more
Like bullets fired from a gun, photos can be traced to individual smartphones, opening up new ways to prevent identity theft Not comfortable with Face ID and other biometrics? This... Read more
By turning computer circuits into unsolvable puzzles, a University of Michigan team aims to create an unhackable computer with a new $3.6 million grant from the Defense Advanced Re... Read more
NYU Tandon Researchers Discover Big Cryptographic Potential in Nanomaterial The next generation of electronic hardware security may be at hand as researchers at New York University... Read more
Until now, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process. A new software system being developed by cybersec... Read more
There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness. On April 29, someone hit his employer, IDT Corporation, with two cyberwea... Read more
Study describes how app, soon to be available, will help thwart growing cybersecurity threat While convenient, Siri, WeChat and other voice-based smartphone apps can expose you to... Read more
A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from Ben-Gurion University of... Read more
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. Af... Read more
TO A layman, the phrase “Internet of Things” (IoT) probably conjures up a half-fantastic future in which refrigerators monitor their own contents and send orders direct to the groc... Read more
Computer networks may never float like a butterfly, but Penn State information scientists suggest that creating nimble networks that can sense jabs from hackers could help deflect... Read more
Researchers develop a way to stop ransomware Ransomware – what hackers use to encrypt your computer files and demand money in exchange for freeing those contents – is a... Read more