Tag: Hacking News — ScienceDaily

Breakthrough promises secure quantum computing at home

The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises to unlock the transformative potential of cloud-based quantum computing. This article has…

Protecting art and passwords with biochemistry

A new molecular test method helps to prove the authenticity of works of art. The new method could also help to make passwords secure against quantum computers. This article has been indexed from Hacking News — ScienceDaily Read the original…

100 kilometers of quantum-encrypted transfer

Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable — roughly equivalent to the distance between Oxford and London. This article…

Satellites for quantum communications

Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this challenge, researchers are developing encryption methods that will apply physical laws…

Defending your voice against deepfakes

Computer scientists have developed AntiFake, a tool to protect voice recordings from unauthorized speech synthesis. This article has been indexed from Hacking News — ScienceDaily Read the original article: Defending your voice against deepfakes

Accelerating AI tasks while preserving data security

SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding…

Not too big: Machine learning tames huge data sets

A machine-learning algorithm demonstrated the capability to process data that exceeds a computer’s available memory by identifying a massive data set’s key features and dividing them into manageable batches that don’t choke computer hardware. The algorithm set a world record…

Better cybersecurity with new material

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that the new technology paves the way for a new…

How randomized data can improve our security

With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices. This article has been indexed from Hacking News — ScienceDaily Read the original article: How randomized data can improve our security

Smart devices: Putting a premium on peace of mind

The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium…

Evaluating cybersecurity methods

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker’s ability to learn secret information by observing the behavior of a victim computer program. This article…

How secure are voice authentication systems really?

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries. This article has been indexed from Hacking News — ScienceDaily Read the original…

Two qudits fully entangled

Recently quantum computers started to work with more than just the zeros and ones we know from classical computers. Now a team demonstrates a way to efficiently create entanglement of such high-dimensional systems to enable more powerful calculations. This article…

Absolute zero in the quantum computer

Absolute zero cannot be reached — unless you have an infinite amount of energy or an infinite amount of time. Scientists in Vienna (Austria) studying the connection between thermodynamics and quantum physics have now found out that there is a…

Are our pets leaking information about us?

Pet and animal-related apps are creating cybersecurity risks to their owners, new research has shown. This article has been indexed from Hacking News — ScienceDaily Read the original article: Are our pets leaking information about us?

Securing supply chains with quantum computing

New research in quantum computing is moving science closer to being able to overcome supply-chain challenges and restore global security during future periods of unrest. This article has been indexed from Hacking News — ScienceDaily Read the original article: Securing…

Chromo-encryption method encodes secrets with color

In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages. This article has been indexed from…

Quantum physicists make major nanoscopic advance

In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this…

Microlaser chip adds new dimensions to quantum communication

With only two levels of superposition, the qubits used in today’s quantum communication technologies have limited storage space and low tolerance for interference. Engineering’s hyperdimensional microlaser generates ‘qudits,’ photons with four simultaneous levels of information. The increase in dimension makes…

New form of universal quantum computers

Computing power of quantum machines is currently still very low. Increasing it is still proving to be a major challenge. Physicists now present a new architecture for a universal quantum computer that overcomes such limitations and could be the basis…

Thinking like a cyber-attacker to protect user data

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a…

Quantum cryptography: Hacking is futile

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts. This article has been indexed from Hacking…

A key role for quantum entanglement

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is…

Radio waves for the detection of hardware tampering

This article has been indexed from Hacking News — ScienceDaily Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick. Read…

Toward error-free quantum computing

This article has been indexed from Hacking News — ScienceDaily For quantum computers to be useful in practice, errors must be detected and corrected. A team of experimental physicists has now implemented a universal set of computational operations on fault-tolerant…

Secure communication with light particles

This article has been indexed from Hacking News — ScienceDaily While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution,…

Self-propelled, endlessly programmable artificial cilia

This article has been indexed from Hacking News — ScienceDaily Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of applications, including soft robotics, biocompatible medical…

New technique offers faster security for non-volatile memory tech

This article has been indexed from Hacking News — ScienceDaily Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster…

Tiny, cheap solution for quantum-secure encryption

This article has been indexed from Hacking News — ScienceDaily Engineers propose a new kind of encryption to protect data in the age of quantum computers. Read the original article: Tiny, cheap solution for quantum-secure encryption

A security technique to fool would-be cyber attackers

This article has been indexed from Hacking News — ScienceDaily Researchers developed a technique that effectively protects computer programs’ secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes. Read the original article: A security…

Entanglement unlocks scaling for quantum machine learning

This article has been indexed from Hacking News — ScienceDaily The field of machine learning on quantum computers got a boost from new research removing a potential roadblock to the practical implementation of quantum neural networks. Read the original article:…

How big does your quantum computer need to be?

This article has been indexed from Hacking News — ScienceDaily Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to…

IT security: Computer attacks with laser light

This article has been indexed from Hacking News — ScienceDaily Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to…

A nanoantenna for long-distance, ultra-secure communication

This article has been indexed from Hacking News — ScienceDaily Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and…

Securing data transfers with relativity

This article has been indexed from Hacking News — ScienceDaily The volume of data transferred is constantly increasing, but the absolute security of these exchanges cannot be guaranteed, as shown by cases of hacking frequently reported in the news. To…

Quantum networks in our future

This article has been indexed from Hacking News — ScienceDaily Investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate,…

One material with two functions could lead to faster memory

This article has been indexed from Hacking News — ScienceDaily Researchers have developed a new light-emitting memory device by integrating a resistive random-access memory with a light-emitting electrochemical cell that are both based on perovskite. The results are promising for…

Impenetrable optical OTP security platform

This article has been indexed from Hacking News — ScienceDaily An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible has been proposed. The device accomplishes this by controlling a variety of information of light including the color,…

New cybersecurity technique keeps hackers guessing

This article has been indexed from Hacking News — ScienceDaily Researchers developed a new machine learning-based framework to enhance the security of computer networks inside vehicles without undermining performance. Read the original article: New cybersecurity technique keeps hackers guessing

Making our computers more secure

This article has been indexed from Hacking News — ScienceDaily Researchers recently presented articles on memory safety that make computer systems more secure. This new research, which has zero to little effect on system performance, is already being used to…

Shadow figment technology foils cyberattacks

This article has been indexed from Hacking News — ScienceDaily Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits…

Graphene key for novel hardware security

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques…

Algorithms improve how we protect our data

Scientists have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach could reduce the computational complexity needed to validate encryption security. Read the original article: Algorithms…

Materials advances are key to development of quantum hardware

Read the original article: Materials advances are key to development of quantum hardware A new article argues that the ability to move forward on developing useful quantum computers requires new major advances in materials science, engineering and fabrication. The authors…

Scientists harness chaos to protect devices from hackers

Read the original article: Scientists harness chaos to protect devices from hackers Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers.…

Scientists harness chaos to protect devices from hackers

Read the original article: Scientists harness chaos to protect devices from hackers Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers.…

Quantum systems learn joint computing

Read the original article: Quantum systems learn joint computing Researchers realize quantum-logic computer operation between two separate quantum modules in different laboratories.   Become a supporter of IT Security News and help us remove the ads. Read the original article:…

Blueprint for fault-tolerant qubits

Read the original article: Blueprint for fault-tolerant qubits Building a quantum computer is a challenging task because of the fragility of quantum bits. To deal with this problem, various types of active error correction techniques have been developed. In contrast,…

Quantum computing: When ignorance is wanted

Read the original article: Quantum computing: When ignorance is wanted Quantum technologies for computers open up new concepts of preserving the privacy of input and output data of a computation. Scientists have shown that optical quantum systems are not only…

Cybersecurity vulnerabilities of common seismological equipment

Read the original article: Cybersecurity vulnerabilities of common seismological equipment Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points.   Become…

Physicists observe competition between magnetic orders

Read the original article: Physicists observe competition between magnetic orders Two-dimensional materials, consisting of a single layer of atoms, have been booming in research for years. They possess novel properties that can only be explained with the help of the…

A biochemical random number

Read the original article: A biochemical random number Scientists have generated a huge true random number using DNA synthesis. It is the first time that a number of this magnitude has been created by biochemical means.   Become a supporter…

Multi-state data storage leaving binary behind

Read the original article: Multi-state data storage leaving binary behind Electronic data is being produced at a breath-taking rate. Around ten zettabytes (ten trillion gigabytes) of data is stored in global server farms, and that’s doubling every two years. With…