Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.
The results of a large-scale, analysis of BitTorrent file-sharing of computer games, focusing on using open methodologies are to be published in the International Journal of Advanced Media and Communication and bust some of the common myths about digital piracy.
Troops operating in forward locations without telecommunication infrastructure often rely on a mobile ad hoc network (MANET) to communicate and share data.
Online exchanges that trade hard currency for Bitcoin reportedly have a 45 percent chance of failing - often taking their customers’ money with them. The above-mentioned claim is based on a new computer science study that applied survival analysis to examine the factors that prompt Bitcoin currency exchanges to close.
Apple has confirmed that it keeps Siri-related data for up to two years after the information is anonymized.
Michigan State researchers have concluded that Twitter can easily teach people about social movements such as Occupy Wall Street - and even encourage them to participate.
Researchers at the University of California, Davis have determined that popular texting, messaging and microblog apps developed for the Android smartphone are hobbled by security flaws that could expose private information or allow forged fraudulent messages to be posted.
The US Navy has confirmed that it will be deploying a prototype laser weapon in the Persian Gulf.
Security researchers say they have positively identified a spam message campaign on Skype designed to spread malware with Bitcoin mining capabilities.
Cupertino has taken steps to bolster its security system for Apple ID accounts linked to popular services like iCloud and iTunes.
US intelligence officials have ranked the specter of cyber-attacks as a major threat on par with concerns over terrorism and North Korea.
Google's rapidly evolving web-centric Chrome OS managed to stave off hordes of hackers this past weekend at Mountain View's Pwnium (3) hack event.
Pfc. Bradley Manning has pleaded guilty to leaking thousands of pages of classified documents and videos to the whistle-blowing WikiLeaks website.
A blogger has managed to obtain and publish once-classified FBI files that describe how the federal agency tracked and collected information about Internet activist Aaron Swartz.
Apple has positively identified a strain of malware which infected a limited number of Mac systems via a vulnerability in the Java plug-in for browsers.
No, Burger King hasn't been sold to McDonald's, although Burger King's Twitter profile was hijacked earlier by hackers who spoofed a McDonald's logo and photo.
The Facebook security teams has confirmed that the social networking site was targeted in a "sophisticated attack" last month.
US law enforcement officials have long warned against the possibility of foreign terrorists or hostile hackers attacking the national electrical infrastructure.
Twitter has positively identified "unauthorized" attempts to access user data, discovering at least one live attack and shutting down the process moments later.
The US Department of Defense (DoD) says it may begin ground-based tests of laser weapons mounted on fighter jets and even drones by 2014.