Thinking like a cyber-attacker to protect user data
Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key. more…
A key role for quantum entanglement
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement — offering much broader security guarantees than previous schemes. more…
Quantum cryptography: Hacking is futile
An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts. more…
Quantum digits unlock more computational power with fewer quantum particles
For decades computers have been synonymous with binary information — zeros and ones. Now a team has realized a quantum computer that breaks out of this paradigm and unlocks additional computational resources, hidden in almost all of today’s quantum devices. more…
‘Pulling back the curtain’ to reveal a molecular key to The Wizard of Oz
Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed […] more…
New technique offers faster security for non-volatile memory tech
Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security technologies. more…
Single-photon source paves the way for practical quantum encryption
Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly secure communication based on quantum key distribution (QKD). more…
Tiny, cheap solution for quantum-secure encryption
Engineers propose a new kind of encryption to protect data in the age of quantum computers. more…
Tiny magnets could hold the secret to new quantum computers
Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices. more…
The power of chaos: A robust and low-cost cryptosystem for the post-quantum era
Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers. more…
How big does your quantum computer need to be?
Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take. more…
New cloud-based platform opens genomics data to all
Harnessing the power of genomics to find risk factors for major diseases or search for relatives relies on the costly and time-consuming ability to analyze huge numbers of genomes. Computer scientists have now leveled the playing field by creating a cloud-based platform that grants genomics researchers easy access to one of the world’s largest genomics […] more…
IT security: Computer attacks with laser light
Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. […] more…
Real-world study shows the potential of gait authentication to enhance smartphone security
A study showed that — within an appropriate framework — gait recognition could be a viable technique for protecting individuals and their data from potential crime. more…
New chip hides wireless messages in plain sight
Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks. more…
A nanoantenna for long-distance, ultra-secure communication
Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances. more…
2017 Antivirus News | Powered by WordPress |
Fluxipress Theme
| Show My IP Address, check blacklists
| Free Favicon, Android and Apple Icon Generator
| Bitcoin and Crypto Currency News
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More Privacy & Cookies Policy