data color

The arrival of algorithmic business

What happens when 30 billion things connect with business and 3 billion people with smartphones? All these things and people...

October 8th, 2015 Gartner

Still trying to crack wartime German Enigma messages

Still trying to crack wartime German Enigma messages

Seventy years after the beginning of the Second World War, a German security expert is trying to decode wartime messages....

September 2nd, 2009 Bob Brown

DECT cordless phones no longer secure

DECT cordless phones no longer secure

After researchers demonstrated at a German trade show they could listen in on some calls made over Digital Enhanced Cordless...

January 6th, 2009 Peter Judge and Greg Meckbach

Srizbi botnet active again

Srizbi botnet active again

The zombie computers used to send spam are coming back to life. Security vendors say spammers are reconnecting with hacked...

November 26th, 2008 Jeremy Kirk

Spam-free blog search goes public

Spam-free blog search goes public

STOCKHOLM - Swedish startup Twingly is going public with its blog search engine, which is being built to deliver spam-free...

June 11th, 2008 Mikael Ricknas

Swedish firm hope to keep spam out of blog search results

Swedish firm hope to keep spam out of blog search results

STOCKHOLM - Swedish startup Twingly is testing a blog search engine to deliver search results free of spam, which the...

April 2nd, 2008 Mikael Ricknas

Firms not getting enough bang for R and D buck

Firms not getting enough bang for R and D buck

Large enterprises here spend around $224 billion a year on R&D. But according to a recent Forrester report, the returns...

October 9th, 2006 David L Margulius

Sony creates

Sony creates

Sony Corp. has succeeded in giving selected Aibo pet robots curiosity, researchers at Sony Computer Science Laboratory (SCSL) in Paris...

July 7th, 2005 Paul Kallender

Encryption must move beyond secure hash algorithm

Encryption must move beyond secure hash algorithm

At the Crypto 2004 conference in Santa Barbara, Calif. last month, researchers announced several weaknesses in common hash functions. These...

September 16th, 2004 Bruce Schneier