Tag: computers

Researchers Design Interactive Software to Target Teen Alcohol Use

Monday, November 18th, 2013 | Tags: , , , ,

If you want teens to avoid risky behavior, you can’t just give teenagers the facts – you have to get them to engage with the information, feel motivated to change, and have the confidence and skills to keep themselves safe. That’s the idea behind a project under way at NC State and the University of

Read more


Many Android Vulnerabilities Can Be Traced To Manufacturer Modifications

Monday, November 4th, 2013 | Tags: ,

Computer security researchers have found that Android smartphone manufacturers are inadvertently incorporating new vulnerabilities into their products when they customize the phones before sale, according to a recent study. On average, the researchers found that 60 percent of the vulnerabilities found in the smartphone models they evaluated were due to such “vendor customizations.” A paper

Read more


How Computer Models Help Keep the Lights On In Kenya

Thursday, September 12th, 2013 | Tags: , , , ,

In Kenya, water is power. Literally. And to keep the lights on, Kenyan authorities want to know how much water they can expect in upcoming rainy seasons. That’s where computer models come in. Fifty-eight percent of Kenya’s power supply stems from the country’s hydropower system in the Tana River basin. That system will shut down

Read more


Writing the Book on How to Use ‘Big Data’

Thursday, August 8th, 2013 | Tags: , ,

NC State students wrote the book on analyzing “big data” – sifting useful information out of the sea of business, personal and other data available online and elsewhere. Or at least they’ve written a book about mining that big data. Nagiza Samatova, a professor of computer science at NC State, and four Ph.D. students are

Read more


Researchers ID ‘Smishing’ Vulnerability in Android

Friday, November 2nd, 2012 | Tags: ,

Mobile security researchers have identified a new vulnerability in popular Android platforms, including Gingerbread, Ice Cream Sandwich and Jelly Bean. The vulnerability has been confirmed by Google, and will be addressed in a future Android release. Specifically, Xuxian Jiang’s research team at NC State has identified an SMS-phishing (“smishing”) vulnerability. If an Android user downloads

Read more



Page 1 of 1112345...10...Last »