Technology Malicious hardware may be next hacker tool As if computer viruses and worms aren't enough of a nuisance, malicious hardware, which will be much more difficult to detect, could soon become a threat too. Today, computer viruses, which are programs downloaded either as an email attachment or when someone visits a website, are responsible for most computer attacks. Hackers use them to … 51¶¯Âþ
Comment: What lies beneath the makeup? TRYING to hold back the ravages of time is an expensive business. People around the world spend a staggering $290 billion a year on over-the-counter beauty products. Cosmetics companies invest a fortune – around 2 per cent of their sales – on researching and developing new products. These ample budgets mean cosmetic houses are able … Opinion
Space Four radical routes to a theory of everything THESE days it seems like every physicist is an Indiana Jones on the hunt for the Holy Grail, a theory that can unite the fractured worlds of quantum mechanics and general relativity – Einstein's theory of gravity – and bring order to the universe. Some call it a "theory of everything", some call it "quantum … Features
Insider: Biotechnology under the spotlight Genetic modification CHRIS LEAVER has spent years talking about his work. He speaks to MPs and the media, visits schools, and attends debates, putting into practice his avowed belief that scientists who work in controversial areas must engage with other sections of society. "You need to bring the public along with you," he says. "The … Careers
Feedback How to walk through walls THANKS to Ian Chapple of the European Patent Office for alerting us to the "Walking through walls training system". That is the title of US Patent Application 20060014125 , filed by John St Clair of San Juan, Puerto Rico, back in 2006. A session with a famous web search engine … Regulars