October 9, 2012 |
If someone on Skype asks you "lol is this your new profile pic?" don't click the link. A type of malware known as Dorkbot is going around the video-calling service tricking people into being scammed by asking that question, in both English and German. Once users click on it, they are redirected to download a file from hotfile.com that holds the malware. The worm was discovered by Trend Micro, a security firm that wrote about the malware Monday. Trend Micro says that once infected, computers become part of a botnet, or a network of computers controlled by hackers to execute denial of service attacks, in which attackers try to jam a website by getting large numbers of computers to contact it at the same time.
January 23, 2013 |
NEW YORK - Federal prosecutors said they had foiled an international cyber-crime ring that targeted bank accounts in the U.S. and around the globe. The criminal charges, disclosed Wednesday, highlight the vulnerabilities of online consumer banking, which has become more popular in the digital age. It also comes just months after most every major U.S. bank suffered a relentless round of online attacks by Middle Eastern hackers. In the case unveiled Wednesday, three men - a Russian, a Latvian and a Romanian - allegedly created and spread a virus they called "Gozi" that infected more than 1 million computers around the globe, including at least 40,000 in the United States.
October 9, 2013 |
A University of Southern California professor and colleagues from Stanford and Harvard universities were awarded the Nobel Prize in Chemistry on Wednesday for their pioneering use of computer modeling programs to help predict complex chemical reactions. Their work, which began in the 1970s, has revolutionized chemistry research, where scientists now work with computers as much as they do with test tubes. “Chemical reactions occur at lightening speed,” read an announcement from the Royal Swedish Academy of Sciences in Stockholm.
April 5, 2013 |
Dreams defy even the dreamer, slipping away as stealthily as they arrive in a mind made credulous by sleep. But what if scientists could read our dreams by using the most advanced medical imaging machines and employing the sophisticated algorithms that flag fraudulent transactions among millions of credit card purchases? Researchers in Japan have taken an early step toward this chimerical goal by training computers to recognize the images flitting through the minds of sleepers in the earliest stages of dreaming.
June 3, 2011 |
Caltech researchers have produced the most sophisticated DNA-based computer yet, a wet chemistry system that can calculate the square roots of numbers as high as 15. The system is composed of 74 strands of DNA that make up 12 logic gates comparable to those in a silicon-based computer, the researchers reported Thursday in the journal Science. But the system operates a little more slowly than a conventional computer: It takes as much as 10 hours to obtain each result. The new findings mark a major change in the direction of DNA-based computing, which researchers have been working on for two decades.
CALIFORNIA | LOCAL
January 28, 2011 |
Steven Hackel has spent most of the last two decades bringing old California into the modern age. He's an expert in the baptism, marriage and burial records from the days of Spanish and Mexican rule. With a team of colleagues at the Huntington Library, Art Collections and Botanical Gardens, he's taken the information written down in the looping, 200-year-old handwriting of church scribes and created a computer database. So when Hackel heard this month about the discovery of dozens of bodies during a construction project on the site of Los Angeles' original cemetery, he started tapping on his keyboard.
CALIFORNIA | LOCAL
December 19, 2013 |
Students at Corona del Mar High School and a private tutor are under investigation for allegedly hacking into the computer system to change grades and access tests, officials said. The students could face criminal charges on top of disciplinary action from the school, according to the Newport-Mesa Unified School District, the Daily Pilot reported . "We are shocked and disappointed by the unethical and irresponsible behavior exhibited by the involved students," district spokeswoman Laura Boss said in a statement Wednesday.
May 30, 2012 |
PHILADELPHIA — In ancient Greece, priests gathered at the Temple of Apollo on Mount Parnassus, the better to interpret the deity-inspired prophecies of Pythia, the Oracle of Delphi. Google Inc., for all its omnipresence, is no deity, yet legions practice search-engine optimization in an effort to divine the secret algorithms that move certain websites to the top of an online search. Now comes candidate optimization, essentially the same idea applied to job seekers, with services that help them tweak their resumes so they end up at the top of a list generated by a company's computerized talent-management system.
April 25, 1989 |
A seal of approval for computers that interconnect easily with other makes--the COS Mark--was announced Tuesday by an influential group of computer makers and users. Big computer buyers led by General Motors Corp. and the federal government demanded such a program because of dissatisfaction with the existing cacophony in communications between computers.
September 14, 2007 |
Drug distributor McKesson Corp. said that two computers containing confidential patient data were stolen from the company July 18. The computers contained data on thousands of participants in a program that McKesson administers to help supply drugs to low-income patients, spokesman James Larkin said. He declined to say which health-care firm had hired McKesson to run the program or whether the data were encrypted.