Latest News
5G Connectivity: Powering Extreme Sports Through Unmatched Wireless WAN Reliability
NSW RegStar program resets as DCS exits key workstream
Beyond Bank levels up frontline ops with refined data strategy
University of New England finds permanent CIDO
Security firm strikes telemetry jackpot as cybercrim self-monitors
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
researchers
researchers
Domain-hoarding may have hamstrung Conficker
Prior to the April-1st update for the Conficker worm, security researchers scrambled to snatch up domains which the botnet's controllers were thought to be targeting.
Shaun Nichols
Apr 4 2009 9:35AM
Security
Massive Chinese cyber hack revealed
Canadian researchers have revealed an alleged extensive Chinese spying operation, which involved the hacking of over 1000 computers in 103 countries, according to reports.
Phil Muncaster
Mar 30 2009 6:37AM
Security
Researchers make programming breakthrough
Researchers have developed a software tool which makes the translation of code for global markets faster.
Nick Farrell
Feb 27 2009 6:22AM
Software
Researchers hack facial biometrics
Researchers in Vietnam will be demonstrating how to hack facial recognition biometrics at the Black Hat security convention currently underway in Washington DC.
Iain Thomson
Feb 19 2009 3:34PM
Security
Researchers develop microrefrigerator on a chip
Researchers from Arizona State University have demonstrated a microrefrigerator which effectively cools a PC system by targeting specific chip hot spots.
Sylvie Barak
Jan 27 2009 6:50AM
Hardware
Spam levels to rise as Srizbi botnet returns
The fall in global spam levels after the shutting of web hosting company McColo looks to be short-lived after researchers reported that the Srizbi botnet has been reactivated.
Iain Thomson
Nov 28 2008 2:36PM
Security
Researchers hack spam network for study
Researchers from University of California, Berkeley and UC, San Diego (UCSD) have published a report detailing how they hacked a spamming network to collect data on the economics of the problem.
Iain Thomson
Nov 11 2008 10:17AM
Security
Researchers crack WPA encryption
Pair break code used on half of all wireless traffic.
Staff Writers
Nov 8 2008 7:15AM
Security
Self-assembling organic wires present sci-fi possibilities
U.S. scientists have developed water-soluble electronic materials that spontaneously assemble themselves into ‘wires’ much narrower than a human hair.
Staff Writers
Oct 29 2008 12:00AM
Hardware
International science community to build a 'World Data System'
Scientific organisations representing 134 countries have agreed to overhaul existing data centres and services to establish a global virtual library for scientific data.
Staff Writers
Oct 28 2008 2:51PM
Software
Hybrid atomic memory stores quantum data
A newly developed quantum computing technique has been used to store quantum information in silicon for a record-breaking length of time.
Staff Writers
Oct 24 2008 11:46AM
Hardware
Swiss researchers can read wired keyboards
Swiss researchers at the Security and Cryptography Laboratory have managed to eavesdrop on 11 wired keyboards.
Nick Farrell
Oct 24 2008 6:58AM
Security
Information processing RNA could control biological function
U.S. researchers are developing synthetic RNA devices that can execute information processing operations, potentially bringing biocomputing one step closer to reality.
Liz Tay
Oct 17 2008 11:27AM
Hardware
Researchers use Open Source virtual world for language teaching
An international team of researchers is using a wireless Open Source virtual world to help promote language learning and let students practice.
Staff Writers
Oct 14 2008 12:50PM
Software
CSIRO launches Mandarin podcasts
The CSIRO has launched a series of podcasts in Mandarin language to promote Australian science and industry to a potential audience of 1.2 billion people worldwide.
Staff Writers
Oct 14 2008 12:04PM
Strategy
Middle East gets into supercomputing
The King Abdullah University of Science and Technology (KAUST) has announced a partnership with IBM to build the fastest supercomputer in the Middle East.
Iain Thomson
Oct 4 2008 12:51PM
Hardware
Newly discovered TCP flaw brings devices to their knees
A Swedish security company announced Wednesday that two of its researchers have discovered a 'generic' flaw in the TCP stack that could result in denial-of-service attacks.
Dan Kaplan
Oct 3 2008 10:35AM
Security
Non-equilibrium chips could avoid overheating laptops
Researchers are re-examining the Second Law of Thermodynamics in a bid to manage heat from laptops and other miniaturised electronics.
Liz Tay
Oct 2 2008 1:52PM
Hardware
GPS spoofing device developed to thwart spoofing
Researchers have developed a portable Global Positioning System (GPS) spoofing device in a bid to explore aspects of civilian spoofing and how such attacks may be thwarted.
Liz Tay
Oct 1 2008 2:23PM
Security
HP collaborates to identify Wi-Fi dead zones cheaply
A collaborative effort by HP Labs and Rice University has produced a technique that could lower the cost of identifying ‘dead zones’ in large wireless networks.
Liz Tay
Sep 30 2008 2:26PM
Networking
Previous
Next
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
State of MarTech
NSW Education turns to Deloitte for HCM program delivery
Queensland Rail uses SuccessFactors to "put learning back on the map"
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Govt launches consumer tech label program for smart devices
Australian firm wins global Cisco AI award for rail safety solution
How Meshed used IoT to help NSW Parks & Wildlife Service improve bushfire risk mitigation
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?