Researchers Seek to Apply Cognitive Sensors to Supply and Production Chains
Permalink

Researchers Seek to Apply Cognitive Sensors to Supply and Production Chains

In the test and application center L.I.N.K. at Fraunhofer IIS in Nuremberg, researchers are testing…

Continue Reading →

Your Wi-Fi Can Be Hacked Due to WPA2 Protocol Vulnerability Called KRACK
Permalink

Your Wi-Fi Can Be Hacked Due to WPA2 Protocol Vulnerability Called KRACK

The group of cybersecurity experts has recently found the greatest and unprecedented vulnerability in the…

Continue Reading →

Humans Help Solve Problems Computers Can’t
Permalink

Humans Help Solve Problems Computers Can’t

It’s a familiar online experience: You’re about to make a purchase or submit a form,…

Continue Reading →

Training brains—young and old, sick and healthy—with virtual reality
Permalink

Training brains—young and old, sick and healthy—with virtual reality

An accidental discovery by Rochester researchers in 2003 touched off a wave of research into…

Continue Reading →

Cloud Security Trends
Permalink

Cloud Security Trends

Cloud data security becomes increasingly more important. Image credit: Blue Coat Photos via Flickr, CC…

Continue Reading →

Lancaster Data Science experts to tackle environment and health challenges
Permalink

Lancaster Data Science experts to tackle environment and health challenges

The programmes, funded by the Engineering and Physical Sciences Research Council (EPSRC), promise to offer…

Continue Reading →

Your Facebook or phone can stop a disease outbreak
Permalink

Your Facebook or phone can stop a disease outbreak

Social media is often criticized for having a negative impact on our mental health or…

Continue Reading →

Internet-scanning startup offers new approach to cybersecurity
Permalink

Internet-scanning startup offers new approach to cybersecurity

Rolling out what it’s calling a “street view for cyberspace,” Censys—a tech startup based on…

Continue Reading →

Eye movements can open doors
Permalink

Eye movements can open doors

Combating data breach fatigue
Permalink

Combating data breach fatigue