Science + Technology – Articles, Analysis, Comment

Displaying 1 - 25 of 3812 articles

Academic journals rely on peer review to support editors in making decisions about what to publish. from www.shutterstock.com

When to trust (and not to trust) peer reviewed science

There's peer review – and then there's peer review. With more knowledge you can dive in a little deeper and make a call about how reliable a science paper really is.
The Australian National University has been working with intelligence agencies to minimise the impact of a cyber attack on its systems. Mark爱生活/Flickr

How Australian universities can get better at cyber security

Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Nobody knows for sure where black holes lead to. Shutterstock

Curious Kids: Where do black holes lead to?

The pull created by a black hole is so strong that if you get too close to one – even if you are travelling away from it at the fastest speed it is possible to go – you will never be able escape.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys. Shutterstock

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
The existence of wormholes is not forbidden by our current theories of the universe. So we can say that they do exist in theory. Marcella Cheng/The Conversation NY-BD-CC

Curious Kids: How do wormholes work?

A wormhole is like a tunnel connecting two places in space. They would be incredibly useful and are great for science-fiction stories. The problem is we haven't found any evidence of them existing.