Scientists recently launched unmanned aerial vehicles (UAVs) from a research vessel in a significant experiment that could help boost the Navy’s radar and communications performance at sea.
UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it. This is known in computer science as "software obfuscation," and it is reportedly the first time it has been accomplished.
It’s a wonder we still put up with passwords. We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever jumbles of letters and words, only to mess up the order. We sit there on the login screen, desperately punching in a code we should know by heart.
Cloud computing - outsourcing computational tasks over the Internet - could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.
Imagine downloading a NetFlix app to your phone so that you can watch movies on the go. You would expect the app to request your account's username and password the first time it runs, like most apps do.
Employing a mesh network configuration allows users to form their own networks without a centralized infrastructure - making them inherently resistant to censorship, surveillance and disruption.
The Electronic Frontier Foundation (EFF) has published the FBI’s drone licenses and supporting records for the last several years.
Almost half of the mobile apps running on Apple's iOS operating system access the unique identifier of the devices where they're downloaded, at least according to computer scientists at the University of California, San Diego.
We all know that Prism is most likely just the tip of the snooping iceberg. While some of us may run Tor on our PC or Mac, there may be times when when we are working on a device that is not our own, or perhaps even a Chromebook, tablet or phone.
Think your antivirus product is keeping your Android smartphone or tablet safe? Think again.
Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.
The results of a large-scale, analysis of BitTorrent file-sharing of computer games, focusing on using open methodologies are to be published in the International Journal of Advanced Media and Communication and bust some of the common myths about digital piracy.
Troops operating in forward locations without telecommunication infrastructure often rely on a mobile ad hoc network (MANET) to communicate and share data.
Viber can best be described as an Android messaging app designed to compete with Skype.
Online exchanges that trade hard currency for Bitcoin reportedly have a 45 percent chance of failing - often taking their customers’ money with them. The above-mentioned claim is based on a new computer science study that applied survival analysis to examine the factors that prompt Bitcoin currency exchanges to close.
Apple has confirmed that it keeps Siri-related data for up to two years after the information is anonymized.
Michigan State researchers have concluded that Twitter can easily teach people about social movements such as Occupy Wall Street - and even encourage them to participate.
Researchers at the University of California, Davis have determined that popular texting, messaging and microblog apps developed for the Android smartphone are hobbled by security flaws that could expose private information or allow forged fraudulent messages to be posted.
The US Navy has confirmed that it will be deploying a prototype laser weapon in the Persian Gulf.
Security researchers say they have positively identified a spam message campaign on Skype designed to spread malware with Bitcoin mining capabilities.