TechAndComputer (Apr. 13, 2011) Researchers at North Carolina State University have developed software that helps Android smartphone users prevent their personal information from being stolen by hackers.
"There are a lot of concerns about potential leaks of personal information from smartphones," says Dr. Xuxian Jiang, an assistant professor of computer science at NC State and co-author of a paper describing the research. "We have developed...
TechAndComputer (Apr. 13, 2011) Researchers at North Carolina State University have developed software that helps Android smartphone users prevent their personal information from being stolen by hackers.
"There are a lot of concerns about potential leaks of personal information from...
Hacking
Privacy mode helps secure Android smartphones
- 13 April 2011
- Editor
- Hits: 141
Simple arithmetic for faster, more secure websites
- 07 April 2011
- Editor
- Hits: 109
TechAndComputer (Apr. 7, 2011) Faster, more secure logins for multimedia sites might be possible thanks to a new approach to website and database security. Boolean logins would allow thousands if not millions of users to more quickly access the content to which they are entitled, such as music, video and images. The same approach might also reduce the risk of hackers accessing the materials illicitly.
Classic user identification requires the...
TechAndComputer (Apr. 7, 2011) Faster...
Classic user identification requires the...
TechAndComputer (Apr. 7, 2011) Faster...
Off the hook: Who gets phished and why
- 06 April 2011
- Editor
- Hits: 100
TechAndComputer (Apr. 7, 2011) Communication researchers at four major universities have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing expeditions than those who limit their online activity.
The study, "Why Do People Get Phished?" forthcoming in the journal, Decision Support...
TechAndComputer (Apr. 7, 2011) ...
The study, "Why Do People Get Phished?" forthcoming in the journal, Decision Support...
TechAndComputer (Apr. 7, 2011) ...
Looking to blue skies for cloud security
- 06 April 2011
- Editor
- Hits: 105
TechAndComputer (Apr. 6, 2011) Cloud computing represents a significant shift in how we use information technology. Storage space for digital files, processing power and services and software are abstracted away from the user's own computing device to servers accessed through the Internet. Google's online office software, the new Amazon cloud player, and photo gallery tools such as Flickr are examples of cloud services. Users can work with and...
TechAndComputer (Apr. 6, 2011) Cloud...
TechAndComputer (Apr. 6, 2011) Cloud...
Smartphones: Delivering seamless, secure exchange of data across multiple platforms
- 04 April 2011
- Editor
- Hits: 97
TechAndComputer (Apr. 4, 2011) Applications dominate today's smartphone market. In the future, internet-capable televisions, tablet and desktop PCs, and cars will all run apps, which can, for example, help plan and book a ski trip.
To allow web applications run on four screens, the webinos project consortium creates a full open source code base. The tagerted technology will allow different devices and applications to work together, securely,...
TechAndComputer (Apr. 4, 2011) ...
To allow web applications run on four screens, the webinos project consortium creates a full open source code base. The tagerted technology will allow different devices and applications to work together, securely,...
TechAndComputer (Apr. 4, 2011) ...