An apparent cyberattack Sunday temporarily disrupted the main website of Thirty Meter Telescope, the organization trying to construct one of the world's largest telescopes near the summit of Mauna Kea on Hawaii's Big Island.
Power outages and communications problems have made life agonizing for the nearly 6 million...
Timothy Summers is providing a better understanding about how hackers think through his research...
The decades worth of data that has been collected about the billions of neurons in the brain is astounding. To help scientists make sense of this “brain big data,” researchers at Carnegie Mellon Univ. have used data mining to create www.neuroelectro.org, a publicly available Website that acts like Wikipedia, indexing physiological information about neurons.
Users of an email service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers.
An increase in Twitter sentiment (the positivity or negativity of tweets) is associated with an increase in state-level enrollment in the Affordable Care Act’s (ACA) health insurance marketplaces — a phenomenon that points to use of the social media platform as a real-time gauge of public opinion and provides a way for marketplaces to quickly identify enrollment changes and emerging issues
Hypertext Transfer Protocol, HTTP, is a key component of the World Wide Web. It is the communications layer through which web browsers request web pages from web servers and with which web servers respond with the contents of the page. Like much of the internet it’s been around for decades, but a recent announcement reveals that HTTP/2, the first major update in 15 years, is about to arrive.
Phishing emails are more and more common as entry points for hackers— unwittingly clicking on a link in a scam email could unleash malware into a network or provide other access to cyberthieves. A growing number of companies, including Twitter Inc., are giving their workers' a pop quiz, testing security savvy by sending spoof phishing emails to see who bites.
A new version of an online tool created by Argonne National Laboratory will help biofuels developers gain a detailed understanding of water consumption of various types of feedstocks, aiding development of sustainable fuels that will reduce impact on limited water resources.
If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s Wi-Fi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits even when it’s not connected to the Internet. And smartphones may be even more vulnerable to such spying.
Research conducted at Griffith Univ. may lead to greatly improved security of information transfer over the Internet. In a paper published in Nature Communications, physicists from Griffith's Centre for Quantum Dynamics demonstrate the potential for "quantum steering" to be used to enhance data security over long distances, discourage hackers and eavesdroppers and resolve issues of trust with communication devices.
Sony appears to have a win-win with "The Interview." Not only did the studio score a moral victory by releasing the film in the face of hacker threats, the movie made at least $15 million from more than 2 million digital rentals and purchases in its first four days.
Sony's "The Interview" has been a hacking target, a punchline and a political lightning rod. Now, with its release online at the same time it debuts in theaters, it has a new role: a test for a new kind of movie release.
An hours-long Internet outage Tuesday in one of the world's least-wired countries was probably more inconvenient to foreigners than to North Korean residents, most of whom have never gone online. Even for wired Koreans south of the heavily armed border separating the rivals, the temporary outage made little difference - southerners are banned by law from accessing North Korean websites.
Stanford computer scientists have extended two popular web browsers to make surfing safer while also empowering web developers to deliver creative new services.
The Internet is a massive place, linking billions of devices which share data that should exceed the zettabyte mark by 2016. Even as data transfer grows, the number of devices connected to the Internet will soon experience a geometric rise as well.
In the same way as we now connect computers in networks through optical signals, it could also be possible to connect future quantum computers in a quantum Internet. The optical signals would then consist of individual light particles or photons. One prerequisite for a working quantum Internet is control of the shape of these photons.
Cyber-security researchers say they've identified a highly sophisticated computer hacking program that appears to have been used by an as-yet unidentified government to spy on banks, telecommunications companies, official agencies and other organizations around the world. The malicious software known as "Regin" is designed to collect data from its targets for periods of months or years.
Today, petabytes of digital information are generated daily by such sources as social media, Internet activity, surveillance sensors and advanced research instruments. The results are often referred to as “big data”—accumulations so huge that highly sophisticated computer techniques are required to identify useful information hidden within. Graph analysis is a prime tool for finding the needle in the data haystack.
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of security—information-theoretic security—which means that even an adversary with unbounded computational power could extract no useful information from an encrypted message.
For many high school seniors, fall means deciding where to apply for college and maybe visiting a guidance counselor. Data crunchers hope to help. The popularity of social media sites and advancements in the ability to analyze the vast amounts of data we put online give members of the class of 2015 more tools than ever to help chart their next step, even if finding the right college is an inexact science.
Over the telephone, in jail and online, a new digital bounty is being harvested: the human voice. Businesses and governments around the world increasingly are turning to voice biometrics, or voiceprints, to pay pensions, collect taxes, track criminals and replace passwords. Those companies have helped enter more than 65 million voiceprints into corporate and government databases.
It's a tough challenge for the National Football League to entice fans off their comfy couches and into stadiums when ticket prices are almost as high as the sport's TV ratings. Equipped with lots of technology, fans at home can watch multiple games on Sunday from the couch. So when the owners of the San Francisco 49ers drew up plans for the team's new $1.3 billion stadium, they tapped the ingenuity surrounding their Silicon Valley home.
A renowned technology hub that is home to some of the country's top universities, Boston is emerging as an unlikely battleground for web-based businesses like Airbnb and Uber, with some saying more regulations are needed to prevent the upstarts from disrupting more established industries. Cities like Boston have been wrestling with the same questions and developing solutions ranging from outright bans to minimum safety requirements.
In support of the National Cybersecurity Center of Excellence, NIST has awarded a contract its first Federally Funded Research and Development Center (FFRDC). The contract, which includes three initial tasks totaling about $29 million, was awarded to The MITRE Corporation, a not-for-profit organization that operates six other FFRDCs.
Microsoft is giving its MSN news service a crisper look, new lifestyle tools and seamless syncing across devices. The company says the revamped site fits in with Microsoft's overall strategy of making mobile phones and Internet-based services priorities as its traditional businesses—Windows and Office software installed on desktops—slow down or decline.
Today, big data is a hot topic within almost every industry. May saw the biggest ever European technologists conference on big data, Berlin Buzzwords, while the likes of O'Reilly's Strata conference pull in huge numbers of attendees keen to learn how to adapt to this new world. Despite all the interest, a great deal of confusion remains around big data.
A group of computer scientists from Brown Univ. were at the Johnson Space Center in Houston for a marathon of intensive coding to build new software for the Robonaut 2. Chad Jenkins’ laboratory builds user interfaces that can control robots of all kinds with an off-the-shelf Web browser. The system can be adapted for even the most complex robots, and NASA wants the team to adapt the interface for the humanoid robot, Robonaut 2—“R2.”
- Page 1