A research team developed a new paradigm for the control of quantum emitters, providing a new method for modulating and encoding quantum photonic information on a single photon light stream. This article has been indexed from Hacking News — ScienceDaily…
Category: Hacking News — ScienceDaily
New security protocol shields data from attackers during cloud-based computation
Researchers developed a technique guaranteeing that data remain secure during multiparty, cloud-based computation. This method, which leverages the quantum properties of light, could enable organizations like hospitals or financial companies to use deep learning to securely analyze confidential patient or…
Preventing counterfeiting by adding dye to liquid crystals to create uncrackable coded tags
A research group has developed an innovative approach to creating anti-counterfeiting labels for high-value goods. Their findings enhance the security of the currently used cholesteric liquid crystals (CLCs) by adding fluorescent dyes to produce florescent CLCs (FCLCs). Using this unique…
Toward a code-breaking quantum computer
Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for cryptography. This article has been indexed from Hacking News — ScienceDaily Read the original article: Toward a code-breaking quantum computer
Physicists develop new method to combine conventional internet with the quantum internet
Researchers send entangled photons and laser pulses of the same color over a single optical fiber for the first time. This article has been indexed from Hacking News — ScienceDaily Read the original article: Physicists develop new method to combine…
Optical fibers fit for the age of quantum computing
A new generation of specialty optical fibers has been developed by physicists to cope with the challenges of data transfer expected to arise in the future age of quantum computing. This article has been indexed from Hacking News — ScienceDaily…
Mass layoffs and data breaches could be connected
A research team has been exploring how mass layoffs and data breaches could be connected. Their theory: since layoffs create conditions where disgruntled employees face added stress or job insecurity, they are more likely to engage in risky behaviors that…
Mechanical computer relies on kirigami cubes, not electronics
Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of rigid, interconnected polymer cubes to store, retrieve and erase data without relying on electronic components. The system also includes a reversible feature that allows users to control…
Breakthrough may clear major hurdle for quantum computers
The potential of quantum computers is currently thwarted by a trade-off problem. Quantum systems that can carry out complex operations are less tolerant to errors and noise, while systems that are more protected against noise are harder and slower to…
Discovery highlights ‘critical oversight’ in perceived security of wireless networks
A research team has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street. This article has been indexed…
VR may pose privacy risks for kids: A new study finds parents aren’t as worried as they should be
New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR technologies. The study also found that few…
Computer scientists unveil novel attacks on cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. This article has been indexed from Hacking News —…
This tiny chip can safeguard user data while enabling efficient computing on a smartphone
A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones while protecting sensitive user data from two common types of attacks — side-channel attacks and bus-probing attacks. This article has been indexed from Hacking News — ScienceDaily…
Breakthrough promises secure quantum computing at home
The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises to unlock the transformative potential of cloud-based quantum computing. This article has…
Protecting art and passwords with biochemistry
100 kilometers of quantum-encrypted transfer
Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable — roughly equivalent to the distance between Oxford and London. This article…
Satellites for quantum communications
Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this challenge, researchers are developing encryption methods that will apply physical laws…
Researchers unveil new way to counter mobile phone ‘account takeover’ attacks
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where a hacker gains unauthorized access to online accounts. This article has been indexed from Hacking News — ScienceDaily Read…
Defending your voice against deepfakes
Computer scientists have developed AntiFake, a tool to protect voice recordings from unauthorized speech synthesis. This article has been indexed from Hacking News — ScienceDaily Read the original article: Defending your voice against deepfakes
Keep it secret: Cloud data storage security approach taps quantum physics
Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage solution. This article has been indexed from Hacking News —…
Accelerating AI tasks while preserving data security
SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding…
Certain online games use dark designs to collect player data
The privacy policies and practices of online games contain dark design patterns which could be deceptive, misleading, or coercive to users, according to a new study. This article has been indexed from Hacking News — ScienceDaily Read the original article:…
New study unveils stretchable high-resolution user-interactive synesthesia displays for visual–acoustic encryption
A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility. This article has been indexed from Hacking News — ScienceDaily Read the original article: New study…
Not too big: Machine learning tames huge data sets
A machine-learning algorithm demonstrated the capability to process data that exceeds a computer’s available memory by identifying a massive data set’s key features and dividing them into manageable batches that don’t choke computer hardware. The algorithm set a world record…
Better cybersecurity with new material
Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that the new technology paves the way for a new…
Pros and cons of ChatGPT plugin, Code Interpreter, in education, biology, health
Researchers see potential in educational settings for the newest official ChatGPT plugin, called Code Interpreter, they’ve found limitations for its use by scientists who work with biological data utilizing computational methods to prioritize targeted treatment for cancer and genetic disorders.…
How randomized data can improve our security
With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices. This article has been indexed from Hacking News — ScienceDaily Read the original article: How randomized data can improve our security
Smart devices: Putting a premium on peace of mind
The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium…
Why computer security advice is more confusing than it should be
If you find the computer security guidelines you get at work confusing and not very useful, you’re not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would improve them…
Evaluating cybersecurity methods
Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker’s ability to learn secret information by observing the behavior of a victim computer program. This article…
How secure are voice authentication systems really?
Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries. This article has been indexed from Hacking News — ScienceDaily Read the original…
‘Toggle switch’ can help quantum computers cut through the noise
What good is a powerful computer if you can’t read its output? Or readily reprogram it to do different jobs? People who design quantum computers face these challenges, and a new device may make them easier to solve. This article…
Quantum computers are better at guessing, new study demonstrates
Researchers have demonstrated a quantum speedup over the most efficient classical computer algorithm possible for what is believed to be the first time. The accomplishment was performed on an IBM Montreal Quantum Falcon r4 27-qubit device. This article has been…
Two qudits fully entangled
Recently quantum computers started to work with more than just the zeros and ones we know from classical computers. Now a team demonstrates a way to efficiently create entanglement of such high-dimensional systems to enable more powerful calculations. This article…
Absolute zero in the quantum computer
Absolute zero cannot be reached — unless you have an infinite amount of energy or an infinite amount of time. Scientists in Vienna (Austria) studying the connection between thermodynamics and quantum physics have now found out that there is a…
Qubits put new spin on magnetism: Boosting applications of quantum computers
Research using a quantum computer as the physical platform for quantum experiments has found a way to design and characterize tailor-made magnetic objects using quantum bits, or qubits. That opens up a new approach to develop new materials and robust…
Are our pets leaking information about us?
Pet and animal-related apps are creating cybersecurity risks to their owners, new research has shown. This article has been indexed from Hacking News — ScienceDaily Read the original article: Are our pets leaking information about us?
Securing supply chains with quantum computing
New research in quantum computing is moving science closer to being able to overcome supply-chain challenges and restore global security during future periods of unrest. This article has been indexed from Hacking News — ScienceDaily Read the original article: Securing…
Chromo-encryption method encodes secrets with color
In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages. This article has been indexed from…
Quantum physicists make major nanoscopic advance
In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this…