Plasmonic nanoantennas are 60 percent faster than previous plamsonic waveguides
United Airlines has rolled out a series of updates to its Web site that the company claims will help beef up the security of customer accounts. But at first glance, the core changes -- moving from a 4-digit PINs to password and requiring customers to pick five different security questions and answers -- may seem like a security playbook copied from Yahoo.com, circa 2009. Here's a closer look at what's changed in how United authenticates customers, and hopefully a bit of insight into what the nation's fourth-largest airline is trying to accomplish with its new system.
System collects real-time crowd data to help authorities predict and head off tragic stampedes that have left hundreds dead
First-generation augmented reality games are harbingers of better mind-expanding tools
Researchers say they have developed a virtual reality-based cyberattack that can reproduce the human face well enough to trick face-authentication systems.
Identity thieves have perfected a scam in which they impersonate existing customers at retail mobile phone stores, pay a small cash deposit on pricey new phones, and then charge the rest to the victim's account. In most cases, switching on the new phones causes the victim account owner's phone(s) to go dead. This is the story of a Pennsylvania man who allegedly died of a heart attack because his wife's phone was switched off by ID thieves and she was temporarily unable to call for help.
Microsoft churned out a bunch of software updates today fix some serious security problems with Windows and other Microsoft products like Internet Explorer (IE), Edge and Office. If you use Microsoft, here are some details about what needs fixing.
Kevin Clemens built this electric sidecar motorcycle to set a world record on the salt flats of Bonneville
Your weekly selection of awesome robot videos
IBM is expanding its machine learning technology to predicting air quality from China to South Africa
Scientists are learning more about what makes robots and chatbots engaging.
This year, at Harvey Mudd College in Claremont, CA, for the first time, more women than men graduated with a degree in computer science.
The U.S. Social Security Administration says it is reversing a newly enacted policy that required a cell phone number from all Americans who wished to manage their retirement benefits at ssa.gov. The move comes after a policy rollout marred by technical difficulties and criticism that the new requirement did little to prevent identity thieves from siphoning benefits from Americans who hadn't yet created accounts at ssa.gov for themselves.
A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached more than 700 computer systems at software giant Oracle Corp., KrebsOnSecurity has learned. More alarmingly, the attackers appear to have compromised a customer support portal for companies using Oracle's MICROS point-of-sale credit card payment systems.
Some inexpensive components can replace pricey commercial services
Carbon nanotubes wrapped in a polymer offer a powerful sensing platform for many chemicals
Parrot's Disco drone is incredibly easy to fly and comes with an impressive autopilot and FPV included
Graphical processing units have emerged as a major powerhouse in the computing world, unleashing huge advancements in deep learning and AI.
Researchers have trained a machine-learning algorithm to spot warning signs for depression on Instagram by analyzing the composition of posted images.
Credit card industry giant Visa on Friday issued a security alert warning companies using point-of-sale devices made by Oracle's MICROS retail unit to double-check the machines for malicious software or unusual network activity, and to change passwords on the devices. Visa also published a list of Internet addresses that may have been involved in the Oracle breach and are thought to be closely tied to an Eastern European organized cybercrime gang.
In April 2016, security firm Trend Micro published a damning report about a Web hosting provider referred to only as a "cyber-attack facilitator in the Netherlands." If the Trend analysis lacked any real punch that might have been because -- shortly after the report was published -- names were redacted so that it was no longer immediately clear exactly who the bad hosting provider was. This post aims to shine a bit more light on the individuals apparently behind this mysterious rogue hosting firm -- a company called HostSailor[dot]com.
In March 2013, a coalition of spammers and spam-friendly hosting firms pooled their resources to launch what would become the largest distributed denial-of-service (DDoS) attack the Internet had ever seen. The assault briefly knocked offline the world's largest anti-spam organization, and caused a great deal of collateral damage to innocent bystanders in the process. Here's a never-before-seen look at how that attack unfolded, and a rare glimpse into the shadowy cybercrime forces that orchestrated it.
Because engineers look good in evening wear (and so does the profession)
Chinese Supercomputer tests software of the world's biggest telescope
In case you haven’t noticed, entrepreneurship is on the rise. In the US, 2015 had the most startup growth seen annually in over 20 years. Some attribute this growth to the recovery of the US economy. Others claim it’s being fueled by sheer necessity. Take, for example, statistics on the increase in entrepreneurship among college students and young professionals. One of the most exciting startup movements is the rise of social entrepreneurship—those founding companies to... read more
A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now this week, several informed sources suggest an inside source may have been involved.
A little-known feature of many modern smartphones is their ability to duplicate video on the device's screen so that it also shows up on a much larger display -- like a TV. However, new research shows that this feature may quietly expose users to a simple and cheap new form of digital eavesdropping.Dubbed "video jacking" by its masterminds, the attack uses custom electronics hidden inside what appears to be a USB charging station. As soon as you connect a vulnerable phone to the appropriate USB charging cord, the spy machine hijacks the phone's video display and records a video of everything you tap, type or view on it as long as it's plugged in -- including PINs, passwords, account numbers, emails, texts, pictures and videos.
The U.S. Social Security Administration announced Friday that it will now require a cell phone number from all Americans who wish to manage their retirement benefits at ssa.gov. Unfortunately, the new security measure does little to prevent identity thieves from fraudulently creating online accounts to siphon benefits from Americans who haven't yet created accounts for themselves.