(Translated by https://www.hiragana.jp/)
ScienceDaily: Hacking News
The Wayback Machine - https://web.archive.org/web/20070430221353/http://www.sciencedaily.com:80/news/computers_math/hacking/

Computers & Math:
Hacking News

 RSS  newsfeed for this page:


Latest News

Health & Medicine

Mind & Brain

Plants & Animals

Earth & Climate

Space & Time

Matter & Energy

Computers & Math

Computer Science
Mathematics

Fossils & Ruins

From the news wires ...


Science news stories ...

Summaries | Headlines

Security That Nets Malicious Web Sites (March 26, 2007) -- Have you ever wondered how fraudulent or malicious Web sites can rank highly on search engines like Google or Yahoo? Queensland University of Technology IT researcher Professor Audun Josang said a ... > full story

Hackers Get Bum Rap For Corporate America's Digital Delinquency (March 13, 2007) -- Three out of five data breaches involving sensitive personal information are attributable to organizational malfeasance, according to a review of compromised records over the past 26 years. A better ... > full story

The First Molecular Keypad Lock (January 11, 2007) -- How can defense or intelligence agencies safeguard the security of top-secret data protected by a computation device the size of a single molecule? With cryptography approaching that sobering new ... > full story

Finding Patterns Of Importance In A Deluge Of Data (January 10, 2007) -- Two Dartmouth engineers think that PQS, or process query systems, are the way to go to make sense of the huge volume of data we collect each day from computer network monitors, video surveillance ... > full story

New Computer Program Prevents Crashes And Hacker Attacks (January 3, 2007) -- Today's computers have more than 2,000 times as much memory as the machines of yesteryear, yet programmers are still writing code as if memory is in short supply. Not only does this make programs ... > full story

Quantum Computing Gets Boost From 'Entanglement' Of Atom Pairs (October 18, 2006) -- Physicists at NIST have taken a significant step toward transforming entanglement -- an atomic-scale phenomenon described by Albert Einstein as "spooky action at a distance" -- into a practical tool. ... > full story

Sending Secret Messages Over Public Internet Lines Can Take Place With New Technique (October 13, 2006) -- A new technique sends secret messages under other people's noses so cleverly that it would impress James Bond -- yet the procedure is so firmly rooted in the real world that it can be instantly used ... > full story

Giant Fiber Lasers For Secure Communication (October 1, 2006) -- Very long lasers made of optical fibers offer a promising route to highly secure communications. Nothing beats quantum communication for absolute security, but the new method, which relies on ... > full story

Team Sends Quantum Encryption 'Keys' Over Record Distances (September 28, 2006) -- Using an innovative sensor for detecting single photons, the smallest particles of light, scientists from Los Alamos National Laboratory, the National Institute of Standards and Technology, and ... > full story

Personal Data Protection Vital To Future Civil Liberties (September 25, 2006) -- When micro-sized sensors can enquire our business in a particular neighbourhood, and equally micro-sized agents embedded within our clothing answer on our behalf, what are the risks to our personal ... > full story

Computer Engineers Create New System To Curb Phishing Fraud (September 3, 2006) -- Carnegie Mellon University Cylab researchers have developed a new anti-phishing tool to protect users from online transactions at fraudulent Web ... > full story

Stealth Attack Drains Cell Phone Batteries (August 30, 2006) -- Cell phones that can send or receive multimedia files could be targeted by an attack that stealthily drains their batteries, leaving cellular communications networks useless, according to computer ... > full story

< more recent summaries | earlier summaries >

 
 

New! Search Science Daily or the entire web with Google:

Google
 
Web ScienceDaily.com


 
 
 
 

Computer insecurity -- Many current computer systems have only limited security precautions in place. Serious financial damage has been caused by computer security breaches, but reliably estimating costs is quite ... > full article

Cryptography -- Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications. The study of how to circumvent the use of cryptography is ... > full article

Security engineering -- Security engineering is the field of engineering dealing with the security and integrity of real-world systems. It is similar to systems engineering in that its motivation is to make a system meet ... > full article

Computer security -- Computer security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a ... > full article

Cyber security standards -- Cyber security standards are security standards which enable organizations to practice safe security techniques in order to minimize the number of successful cyber security ... > full article

Computing -- Originally, the word computing was synonymous with counting and calculating, and a science that deals with the original sense of computing mathematical ... > full article

Identity theft -- Identity theft (or identity fraud) is the deliberate assumption of another person's identity, usually to gain access to their finances or frame them for a ... > full article

Computer virus -- A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a ... > full article

Malware -- Malware ("malicious software") is software designed to infiltrate or damage a computer system, without the owner's consent. The term describes the intent of the creator, rather than any particular ... > full article

Computer software -- Software is a program that enables a computer to perform a specific task, as opposed to the physical components of the system (hardware). This includes application software such as a word processor, ... > full article

MySQL (3rd Edition) (Developer's Library)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a ... > read more

The Little SAS Book: A Primer, Third Edition
Getting started with SAS is easy with The Little SAS Book. This friendly, easy-to-read guide gently introduces you to the most commonly used features of SAS software plus a whole lot more! The book ... > read more

Getting to Know ArcGIS Desktop: The Basics of ArcView, ArcEditor, and ArcInfo Updated for ArcGIS 9 (Getting to Know series)
With revised material and new exercises based on ArcGIS version 9, this updated work acquaints geographers and GIS professionals with the principles of GIS as it teaches the mechanics of using ArcGIS ... > read more

Technology In Action- Introductory (2nd Edition)
This book was designed to spark reader interest by covering practical concepts that they want to learn (such as setting up a wireless network in their home) while giving background information (such ... > read more

Multivariate Data Analysis (6th Edition)
Well-suited for the non-statistician, this applications-oriented introduction to multivariate analysis focuses on the fundamental concepts that affect the use of specific techniques rather than the ... > read more

Bayesian Data Analysis, Second Edition
Incorporating new and updated information, this second edition of THE bestselling text in Bayesian data analysis continues to emphasize practice over theory, describing how to conceptualize, ... > read more

Fear Less: Real Truth About Risk, Safety, and Security in a Time of Terrorism
In this age of uncertainty we are all looking for answers. Every day we cope with another report. Anthrax in New York, Florida and Washington, D.C. Arrests nationwide. Threats from Afghanistan. While ... > read more

CISSP All-in-One Exam Guide, Third Edition (All-in-One)
The Third Edition of this proven All-in-One exam guide provides total coverage of the CISSP certification exam, which has again been voted one of the Top 10 IT certifications in 2005 by CertCities. ... > read more

Statistics for Business and Economics and Student CD-ROM, Fifth Edition
The strength of this book has been its unerring accuracy and statistical precision. The role of computers and statistical software has been thoroughly integrated throughout. This edition focuses on ... > read more

Programming the Universe : A Quantum Computer Scientist Takes On the Cosmos
Is the universe actually a giant quantum computer? According to Seth Lloyd—Professor of Quantum-Mechanical Engineering at MIT and originator of the first technologically feasible design for a ... > read more

 
Text: small | med | large
 

In Other News ...

... more breaking news at NewsDaily -- updated every 15 minutes

Health & Medicine Mind & Brain Plants & Animals Space & Time Earth & Climate Matter & Energy Computers & Math Fossils & Ruins