Little did Rich Skrenta realise in 1982 that his teenage prank, the Elk Cloner virus, would spawn a multi-billion- pound industry built on the back of security loopholes in Microsoft's operating systems....
The map was created using data collected through the Low Frequency Array telescope
New technique enables nanoscale patterns to be cut in graphene without compromising its electrical properties
Graphene moves a step closer to commercialisation with new method encapsulating graphene inside another two-dimensional material
Google says that it was 'an error' not to tell Nest Secure users about hidden microphone
Passwords in password managers can be compromised using malware and memory forensics tools