Encryption News
July 16, 2024
Top Headlines
May 6, 2024 — New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR ...
Apr. 26, 2024 — Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in ...
Apr. 23, 2024 — A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones while protecting sensitive user data from two common types of attacks -- side-channel attacks and ...
Apr. 11, 2024 — The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises to unlock the transformative potential of ...
Latest Headlines
updated 10:34pm EDT
June 26, 2024 — Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of rigid, interconnected polymer cubes to store, retrieve and erase data without relying on electronic ...
Apr. 12, 2024 — Clear guidelines should be established for the generation and processing of synthetic data to ensure transparency, accountability and fairness, a new ...
Apr. 8, 2024 — A new molecular test method helps to prove the authenticity of works of art. The new method could also help to make passwords secure against quantum ...
Apr. 2, 2024 — Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable ...
Mar. 18, 2024 — The traveling salesman problem is considered a prime example of a combinatorial optimization problem. Now a team has shown that a certain class of such problems can actually be solved better and much ...
Mar. 13, 2024 — Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this ...
Feb. 15, 2024 — Creating a quantum computer powerful enough to tackle problems we cannot solve with current computers remains a big challenge for quantum physicists. A well-functioning quantum simulator -- a ...
Nov. 14, 2023 — Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage ...
Oct. 30, 2023 — SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. ...
Oct. 12, 2023 — A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional ...
Earlier Headlines
Sep. 4, 2023 — Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe ...
Aug. 9, 2023 — With an innovative approach, scientists are creating new standards for data security in the cache of electronic ...
Aug. 9, 2023 — The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being ...
Aug. 7, 2023 — The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. ...
July 25, 2023 — If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and ...
July 10, 2023 — Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential ...
July 5, 2023 — Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new ...
June 28, 2023 — Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information ...
June 27, 2023 — Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six ...
Mar. 7, 2023 — Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one ...
Feb. 13, 2023 — In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode ...
Jan. 26, 2023 — In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as ...
Dec. 12, 2022 — A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or ...
Nov. 21, 2022 — With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's ...
Nov. 9, 2022 — Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data ...
Sep. 2, 2022 — Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that ...
Aug. 29, 2022 — Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could ...
Aug. 15, 2022 — Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can ...
July 27, 2022 — A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated ...
July 27, 2022 — An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...
Monday, September 4, 2023
Wednesday, August 9, 2023
Monday, August 7, 2023
Tuesday, July 25, 2023
Monday, July 10, 2023
Wednesday, July 5, 2023
Wednesday, June 28, 2023
Tuesday, June 27, 2023
Tuesday, March 7, 2023
Monday, February 13, 2023
Thursday, January 26, 2023
Monday, December 12, 2022
Monday, November 21, 2022
Wednesday, November 9, 2022
Friday, September 2, 2022
Monday, August 29, 2022
Monday, August 15, 2022
Wednesday, July 27, 2022
Wednesday, July 20, 2022
Wednesday, June 8, 2022
Wednesday, May 25, 2022
Tuesday, May 24, 2022
Thursday, May 5, 2022
Thursday, April 28, 2022
Tuesday, April 5, 2022
Thursday, March 31, 2022
Wednesday, March 23, 2022
Tuesday, March 22, 2022
- Tiny, Cheap Solution for Quantum-Secure Encryption
- Qubits: Developing Long-Distance Quantum Telecommunications Networks
Monday, March 21, 2022
Tuesday, March 1, 2022
Friday, February 25, 2022
Tuesday, February 1, 2022
Tuesday, January 25, 2022
Tuesday, December 21, 2021
Friday, December 10, 2021
Tuesday, November 23, 2021
Tuesday, November 16, 2021
- Big Data Privacy for Machine Learning Just Got 100 Times Cheaper
- A Nanoantenna for Long-Distance, Ultra-Secure Communication