Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for cryptography. This article has been indexed from Hacking News — ScienceDaily Read the original article: Toward a code-breaking quantum computer
Category: Hacking News — ScienceDaily
Physicists develop new method to combine conventional internet with the quantum internet
Researchers send entangled photons and laser pulses of the same color over a single optical fiber for the first time. This article has been indexed from Hacking News — ScienceDaily Read the original article: Physicists develop new method to combine…
Optical fibers fit for the age of quantum computing
A new generation of specialty optical fibers has been developed by physicists to cope with the challenges of data transfer expected to arise in the future age of quantum computing. This article has been indexed from Hacking News — ScienceDaily…
Mass layoffs and data breaches could be connected
A research team has been exploring how mass layoffs and data breaches could be connected. Their theory: since layoffs create conditions where disgruntled employees face added stress or job insecurity, they are more likely to engage in risky behaviors that…
Mechanical computer relies on kirigami cubes, not electronics
Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of rigid, interconnected polymer cubes to store, retrieve and erase data without relying on electronic components. The system also includes a reversible feature that allows users to control…
Breakthrough may clear major hurdle for quantum computers
The potential of quantum computers is currently thwarted by a trade-off problem. Quantum systems that can carry out complex operations are less tolerant to errors and noise, while systems that are more protected against noise are harder and slower to…
Discovery highlights ‘critical oversight’ in perceived security of wireless networks
A research team has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street. This article has been indexed…
VR may pose privacy risks for kids: A new study finds parents aren’t as worried as they should be
New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR technologies. The study also found that few…
Computer scientists unveil novel attacks on cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. This article has been indexed from Hacking News —…
This tiny chip can safeguard user data while enabling efficient computing on a smartphone
A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones while protecting sensitive user data from two common types of attacks — side-channel attacks and bus-probing attacks. This article has been indexed from Hacking News — ScienceDaily…
Breakthrough promises secure quantum computing at home
The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises to unlock the transformative potential of cloud-based quantum computing. This article has…
Protecting art and passwords with biochemistry
100 kilometers of quantum-encrypted transfer
Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable — roughly equivalent to the distance between Oxford and London. This article…
Satellites for quantum communications
Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this challenge, researchers are developing encryption methods that will apply physical laws…
Researchers unveil new way to counter mobile phone ‘account takeover’ attacks
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where a hacker gains unauthorized access to online accounts. This article has been indexed from Hacking News — ScienceDaily Read…
Defending your voice against deepfakes
Computer scientists have developed AntiFake, a tool to protect voice recordings from unauthorized speech synthesis. This article has been indexed from Hacking News — ScienceDaily Read the original article: Defending your voice against deepfakes
Keep it secret: Cloud data storage security approach taps quantum physics
Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage solution. This article has been indexed from Hacking News —…
Accelerating AI tasks while preserving data security
SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding…
Certain online games use dark designs to collect player data
The privacy policies and practices of online games contain dark design patterns which could be deceptive, misleading, or coercive to users, according to a new study. This article has been indexed from Hacking News — ScienceDaily Read the original article:…
Not too big: Machine learning tames huge data sets
A machine-learning algorithm demonstrated the capability to process data that exceeds a computer’s available memory by identifying a massive data set’s key features and dividing them into manageable batches that don’t choke computer hardware. The algorithm set a world record…
