Skip to main content
Updating results

Computer Science

  • Updated

BEIJING (AP) — China on Tuesday rejected an accusation by Washington and its Western allies that Beijing is to blame for a hack of the Microsoft Exchange email system and complained Chinese entities are victims of damaging U.S. cyberattacks.

  • Updated

Black church music has been around for centuries, but gospel only became codified as a genre about a century ago, as this jubilant film reveals. There’s plenty of archival footage that traces the history of the form through the lens of “father of gospel music” Thomas Dorsey, who wrote “Take My Hand, Precious Lord,” the Martin Luther King Jr. favorite that figures prominently in “Summer of Soul.”

  • Updated

Consider the calorie content of treats for your dog.

Rob Delaney has shared the happiness he feels when photos of his late son Henry - who died aged two in 2018 from cancer - appear on his Apple iPhone photo memories.

  • Updated

Ransomware scrambles the target organization's data with encryption. The criminals leave instructions on infected computers for negotiating ra…

  • Updated

With cyberattacks like those impacting the customers of Home Depot, Staples, Target and Equifax in recent years, or larger attacks threatening national security, our digital lives depend on cybersecurity now more than ever. Writing for a rapidly growing workforce of specialists tasked with protecting network security, former National Security Agency developer Ben McCarty (who was the U.S. Army’s first cyberwarfare specialist) draws inspiration from the training methods of feudal Japan’s legendary ninjas to offer a fresh perspective on the topic of cybersecurity in “Cyberjutsu.” Don’t let its whimsical title fool you; this book is a practical and prescient compendium of cybersecurity concepts that lends itself to anyone considering a career in this expanding field along with organizational leaders seeking to level up their plan of attack with ninja-fueled tactics, techniques and procedures.

  • Updated

Widespread automation means our computers aren’t the only vulnerable technology we use. More of our physical landscape has become part of the World Wide Web, like cars and medical equipment, and this presents new avenues through which cybercriminals can wreak havoc on our lives. In this book, Bruce Schneier explores the risks and security implications that this new, hyper-connected era has wrought. He explains how we’ve ended up in this position, outlines consequences and offers potential solutions. Schneier’s book is an excellent guide to understanding the importance of cybersecurity in contemporary society and a manual for constructing a more secure future.

  • Updated

Any tool can be used for good or bad; even a broom can sweep the floor or hit someone over the head, but in the digital age, our tools can pack a far more dangerous punch. In “Tools and Weapons,” Microsoft’s president Brad Smith and chief of staff and executive communications Carol Ann Browne explore the dual nature of technology.

  • Updated

A wealth of delectable treats, ranging from fancy cakes to frosted donuts, come with this cute set. Many of the pieces stack, slice or coordinate to give kids practice with sorting, classification and recognition. $28.99 at Amazon

Get up-to-the-minute news sent straight to your device.

Topics

News Alerts

Breaking News