Probe Sees Unused Internet
A survey shows that addresses are not running out as quickly as we’d thought.In a little more than two years, the last Internet addresses will be assigned by the international group tasked with...
View ArticleSick Searchers Help Track Flu
Google releases a tool to track the intensity and spread of the flu.On Tuesday, search giant Google released an experimental tool that tracks the intensity and movement of the influenza virus across...
View ArticleObama's NASA Dilemma
The fate of the U.S. space program hangs in the balance.When president-elect Barack Obama takes office in January, he will be faced with a rare situation. Within his first 100 days, he will have to...
View ArticleGiant Camera Tracks Asteroids
The camera will offer sharper, broader views of the sky.The first of four new asteroid-tracking telescopes will come online next month in Hawaii, promising to quickly scan large swaths of the...
View ArticleMicrosoft Searches for Group Advantage
A new search algorithm looks for connections between people.As part of its efforts to better compete with Google, Microsoft is plumbing the connections between searchers and their contacts to produce...
View ArticleBIOS Maker Aims to Retake the PC
Phoenix Technologies is pushing its pint-size OS as a complement to Windows.Typically, PC users do not give the low-level software on their computers a second thought. Known as the basic input-output...
View ArticleA Gallery of HyperSpace Screenshots
Phoenix Technologies is pushing its pint-size OS as a complement to Windows.
View ArticleAre Your "Secret Questions" Too Easily Answered?
Research finds that the answers to secret questions used to retrieve forgotten passwords are easily guessed.Brian Green’s experience with not-so-secret questions began when he logged on to his World of...
View ArticleiPhone Hackers Get a Break
The difficulty of running nonapproved code on the iPhone has turned off security researchers–until now.In March, the organizers of a computer-security conference called CanSecWest challenged attendees...
View ArticleFirefox Aims to Unplug Scripting Attacks
How websites can block code from unknown sources.Sites that rely on user-created content can unwittingly be employed to attack their own users via JavaScript and other common forms of Web code. This...
View ArticleFlaw Opens ATMs to Hackers
A conference presentation would have exposed flaws in some cash machines.Barnaby Jack, a security researcher at the computer networking giant Juniper, had planned to hack into an automatic teller...
View ArticleCatching Spammers in the Act
Researchers show how spammers harvest e-mail addresses and send out bulk messages.Researchers have shed new light on the methods by which spammer harvest e-mail addresses from the Web and relay bulk...
View ArticleReporting for Duty
Tracking computer-security research and the ongoing evolution of cybercriminal techniques.Welcome to UnsafeBits, a blog discussing the latest in security research and documenting the ongoing...
View ArticleCan Twitter and Facebook Be Both Social and Secure?
Nearly half of all companies block social networks, although only some recognize the security risks.
View ArticleVirus Counting Is a Numbers Game
The malware seen by antivirus companies will jump by at least half this year. But what does that mean?Duck and cover.
View ArticleA Contest to Train Cyber Combatants
Cyber-defense and capture-the-flag contests will help train future defenders of cyberspace.In the 1950s, shocked by the Russians’ launch of Sputnik, the United States embarked on an initiative to boost...
View ArticleResearcher: Update and You're Owned
Hundreds of applications that use software updates are making computers more vulnerable to attack.
View ArticleFirms Patch Some Bugs Quicker Than Others
Vulnerabilities in core software are dealt with quickly, while other applications have to wait.
View ArticleHunting Down Botnets
Data mining helps security researchers spot Internet addresses linked to compromised computers.
View ArticleGoing All In on MobileMe
An attack on the service shows how convoluted some hacks can become.A group of researchers from security firm SensePost just revealed a hack of Apple’s MobileMe service. Rather than demonstrating a...
View Article
More Pages to Explore .....