Computer Science

Open ports leave a hole in smartphone security

Open ports leave a hole in smartphone security

Smartphone apps that use “open ports” to share and receive data are more vulnerable to security breaches than previously thought, mainly due to the...
Physicists create new form of light

Physicists create new form of light

Newly observed optical state could enable quantum computing with photons Try a quick experiment: Take two flashlights into a dark room and shine them so...
New machine learning algorithm uncovers time-delayed interactions in cells

New machine learning algorithm uncovers time-delayed interactions in cells

Biologists have long understood the various parts within the cell. But how these parts interact with and respond to each other is largely unknown. "We...
Energy-efficient encryption for the internet of things

Energy-efficient encryption for the internet of things

Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold Most sensitive web transactions are protected by public-key cryptography, a type...
Virtual reality sheds light on memory recall

Virtual reality sheds light on memory recall

Virtual reality is helping neuroscientists get new insight into how different brain areas assemble memories in context Different areas of the hippocampus are activated when...
How secure is your data when it’s stored in the cloud

How secure is your data when it’s stored in the cloud

As cloud storage becomes more common, data security is an increasing concern. Companies and schools have been increasing their use of services like Google Drive...
Drones learn to navigate autonomously by imitating cars and bicycles

Drones learn to navigate autonomously by imitating cars and bicycles

All today's commercial drones use GPS, which works fine above building roofs and in high altitudes. But what, when the drones have to navigate autonomously...
Will self-driving cars threaten your security

Will self-driving cars threaten your security

While every new generation of automobile technology brings new security risks, the vulnerabilities that come along with self-driving cars are unprecedented and understudied, a...
Inventing the “Google” for predictive analytics

Inventing the “Google” for predictive analytics

Companies often employ number-crunching data scientists to gather insights such as which customers want certain services or where to open new stores and stock...
Google searches reveal cause of post-holiday ‘baby boom’

Google searches reveal cause of post-holiday ‘baby boom’

Many studies cite seasonal changes to explain why birth rates peak in September—a “baby boom” nine months after the holidays. But new research finds that...