RSA Security, a division of EMC, has contracts throughout the federal government for its SecurID system, which uses a token to generate a random six-digit number every 60 seconds. That number, when used with a user’s password, provides access to uncl
A computer scientist discovers a scam that skims such a tiny amount from so many sources that no one has much incentive to shut it down.
Welcome to Cabela’s Recon Hunt, the first mobile navigation app built solely for hunters.
Researchers who have spent the last two years studying the security of car computer systems have revealed that they can take control of vehicles wirelessly.
You put your username and passwords on a postcard and mail let the world see, so why are you doing it online? Every time you log in to Twitter, Facebook or any other service that uses a plain HTTP connection, that’s essentially what you're doing.
The intrusion by hackers of security giant RSA, a unit of EMC, has left customers and analysts wondering if it is still safe to use millions of the one-time passcode tokens used to log into enterprise IT systems.
A former Goldman Sachs programmer convicted of stealing the bank’s high-speed trading software was sentenced Friday to eight years in prison.
Top security firm RSA Security revealed on Thursday that it’s been the victim of an “extremely sophisticated” hack.
A "reimagined" Internet Explorer 9 is being released by Microsoft with capabilities from Windows 7. IE9 does not run on Windows XP. Microsoft pointed to "Pinned Sites" that can be accessed from the taskbar and JumpList, both of which can function wit
Microsoft software recognizes organs and other structures in medical images.
Using tape, rubber and a tiny glass ball, researchers transformed an iPhone into a cheap, yet powerful microscope able to image tiny blood cells. They’ve also added a clinical-grade cellphone spectroscope that might be able to measure some vital sign
About 300 years ago, the English playwright William Congreve wrote, "music has charms to soothe a savage breast, to soften rocks, or bend a knotted oak." This week we learned that it can also help hackers break into your car. Researchers at the
Cracking combination locks has never been so easy. A group of engineering students at Olin College of Engineering have built a robot that will solve any MasterLock combination in a under two hours by running through all the possible combinations. Jus
Researchers at SUNY Buffalo and Amrita University in India have managed to create a tracking network that works well even with the cheapest of cameras.
A device that plugs into a smart phone lets clinicians diagnose cancer from the bedside.
This week at the International Solid-State Circuits Conference a team of European researchers will unveil a 4,000-transistor, 8-bit logic microprocessor with processing power equivalent to a simple silicon chip circa 1977.
Have you ever thought about spamming back to spammers when you received their emails? Congratulations, you found the right place! This anti spam page is created to fight against the deluge of spam email that is clogging the Internet and our email
Watson finished the first game of a two-game match with $35,734 in winnings, far ahead of runner-up Brad Rutter, who earned $10,000. Ken Jennings trailed with $4,800.
Microsoft and Apple have nothing on MIT's amazing sixth sense gizmo…except perhaps a lot of catching up to do.The short age of multitouch devices may already be over once MIT's new slam bang tech comes to the market. Techno geeks that caught a glim
Lexar, a division of Micron technology, is a leading global provider of memory products for digital media. Check out this behind the scenes look at the extensive work and care put into each Lexar product.
Smaller, more efficient antenna tech could cut the cost of a network in half.
Last week, the annual "festival of hype" kicked off. Also known as the Consumer Electronics Show (CES)
In a new blog post written for the for the Chicago Sun-Times, film critic Roger Ebert, who has railed against 3D movies and television, offers up what he says is proof that the technology "doesn't work with our brains and it never will."
Embedding minuscule glass tubes inside a mouse brain allows neuroscientists to monitor brain activity over long periods of time, watching neurons and tissue change with illness or aging.
Learning a new language is hard. All those new grammatical rules, the new spellings, new tenses, irregular verbs--it's a serious pain. Luckily, Google Translate just issued an update to enable what Google's calling "Conversation Mode."
In Johannesburg, South Africa, some thieves have found that there's an even cheaper and more anonymous way to make phone calls than buying disposable "burners" (like those featuring so prominently in The Wire): Traffic lights.
U.S. prosecutors have charged two people with stealing email addresses and other data of about 120,000 users of Apple Inc's iPad after finding a security weakness in AT&T Inc servers.
Technology is evolving us, says Amber Case, as we become a screen-staring, button-clicking new version of homo sapiens. We now rely on "external brains" (cell phones and computers) to communicate, remember, even live out secondary lives.
As the sun ramps up towards solar maximum the years 2011 through 2013 could be dangerous ones—not necessarily for carbon-based life, but for all the silicon "life" humanity has created over the past four decades.In-the-know government agencies like
Even as we imagine the day when robots finally turn against us, scientists are at work on how best to control them