Tighter School Security Reduces Academic Performance
Recently, schools have been increasing security measures. However, could this increased security be impacting children’s test scores? According to recent research from the Brown School…
Recently, schools have been increasing security measures. However, could this increased security be impacting children’s test scores? According to recent research from the Brown School…
Researchers from the University of Tsukuba create millimeter-size chips with unique color patterns that cannot be forged. Try whispering at one end of the Echo…
Smart bulbs are expected to be a popular purchase this holiday season. But could lighting your home open up your personal information to hackers? Earlier…
Researchers in China have developed a rewriteable paper coating that can encrypt secret information with relatively low-tech invisible ink—water. A message printed out by a…
Data travels through thousands of miles of fiber optic cables underneath the world’s oceans–via pulses of light. And according to experts, the data in these…
A new debugging system found 23 previously undiagnosed security flaws in 50 popular Web applications, and it took no more than 64 seconds to analyze…
DARPA’s Active Authentication program is working to develop behavioral biometrics focused on the user’s cognitive processes to enhance cyber security. In the world of network…
Targets for hackers are becoming more widespread. The chips running car engines, routers that form the Internet’s backbone, power plants, and rail lines are all…
If there’s one thing that should be learned by everyone with the most recent hacking fiasco of Wired’s Mat Honan, passwords aren’t secure. A team…
Consumer-grade EEG headsets might be great for gaming, but a new study has found that sensitive personal information, like PIN numbers and credit card data,…
Developed by computer scientists, Aeolus is a new programming system that could help prevent inadvertent information leaks by automatically keeping track of users’ data-access privileges….
In an effort to remove human error and fatigue from security surveillance, researchers at MIT have created a new approach using mathematics. The system can…
Personal computers and corporate computers have long been susceptible to hackers, but now savvy hackers are using cloud technology to their advantage to steal a…
DARPA’s High-Assurance Cyber Military Systems program seeks to improve the security of embedded computer systems. To do this, researchers are looking to create new technology…
As a general rule of thumb, it isn’t a good thing to be sleeping on the job; especially if you are Russian rocket security. It’s…
AT&T recently reported that an organized attempt was made to hack information from as many as 1 million wireless customer accounts, but they want customers…