rss Last update Traffic noise stresses out frogs, but some have adapted, 1 hour ago

Security news

Eight steps to a stronger cybersecurity strategy

If there's an attack on the country, the military mobilizes. When a natural disaster strikes, recovery plans go into effect. Should an infectious disease start to spread, health officials launch a containment strategy.

dateNov 09, 2018 in Security
shares21 comments 0

Keeping health data under lock and key

Researchers from the Collaborative Research Center CROSSING at Technische Universität Darmstadt (Germany) have developed a solution that will ensure decades of safe storage for sensitive health data in a joint project with ...

dateNov 07, 2018 in Security
shares7 comments 0

PhasorSec tool protects power grids from cyberattack

Researchers at Dartmouth College have developed a technique to protect power grids from attacks against utility control systems. The tool, PhasorSec, eliminates vulnerabilities that can shut down facility operations, trigger ...

dateOct 29, 2018 in Security
shares8 comments 0

At least 57 negative impacts from cyber-attacks

Cyber-security researchers have identified a total of at least 57 different ways in which cyber-attacks can have a negative impact on individuals, businesses and even nations, ranging from threats to life, causing depression, ...

More rules for the intelligent household

While a mobile phone or PC is traditionally controlled by only one user, many players come together in a networked household, some of whom even want to control devices simultaneously. Researchers from the Horst Görtz Institute ...

How your little email server puts you in charge

Helm is a startup that wants to satisfy people who dream of having ownership of their email content. Companies hold your data on their servers; this Helm concept is the price you would pay for turning that around, where you ...

Tech Q&A: How an online bank knows who you are

Q: Besides entering my user ID and password, my financial institution makes me verify my identity by entering a personal identification number (PIN) that is sent via text, email or phone call. Even after that, I'm always ...

Exoplanet stepping stones
Scientists study puncture performance of cactus spines
Traffic noise stresses out frogs, but some have adapted
Discovery could neutralize West Nile virus
The taming of the dog, cow, horse, pig and rabbit
A Mexican cavefish with a scarred heart
Reducing the impact forces of water entry
From receptor structure to new osteoporosis drugs

Find more news articles via sort by date page