A research team developed a new paradigm for the control of quantum emitters, providing a new method for modulating and encoding quantum photonic information on a single photon light stream. This article has been indexed from Hacking News — ScienceDaily…
Category: Hacking News — ScienceDaily
New security protocol shields data from attackers during cloud-based computation
Researchers developed a technique guaranteeing that data remain secure during multiparty, cloud-based computation. This method, which leverages the quantum properties of light, could enable organizations like hospitals or financial companies to use deep learning to securely analyze confidential patient or…
Preventing counterfeiting by adding dye to liquid crystals to create uncrackable coded tags
A research group has developed an innovative approach to creating anti-counterfeiting labels for high-value goods. Their findings enhance the security of the currently used cholesteric liquid crystals (CLCs) by adding fluorescent dyes to produce florescent CLCs (FCLCs). Using this unique…
Toward a code-breaking quantum computer
Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for cryptography. This article has been indexed from Hacking News — ScienceDaily Read the original article: Toward a code-breaking quantum computer
Physicists develop new method to combine conventional internet with the quantum internet
Researchers send entangled photons and laser pulses of the same color over a single optical fiber for the first time. This article has been indexed from Hacking News — ScienceDaily Read the original article: Physicists develop new method to combine…
Optical fibers fit for the age of quantum computing
A new generation of specialty optical fibers has been developed by physicists to cope with the challenges of data transfer expected to arise in the future age of quantum computing. This article has been indexed from Hacking News — ScienceDaily…
Mass layoffs and data breaches could be connected
A research team has been exploring how mass layoffs and data breaches could be connected. Their theory: since layoffs create conditions where disgruntled employees face added stress or job insecurity, they are more likely to engage in risky behaviors that…
Mechanical computer relies on kirigami cubes, not electronics
Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of rigid, interconnected polymer cubes to store, retrieve and erase data without relying on electronic components. The system also includes a reversible feature that allows users to control…
Breakthrough may clear major hurdle for quantum computers
The potential of quantum computers is currently thwarted by a trade-off problem. Quantum systems that can carry out complex operations are less tolerant to errors and noise, while systems that are more protected against noise are harder and slower to…
Discovery highlights ‘critical oversight’ in perceived security of wireless networks
A research team has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street. This article has been indexed…
VR may pose privacy risks for kids: A new study finds parents aren’t as worried as they should be
New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR technologies. The study also found that few…
Computer scientists unveil novel attacks on cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. This article has been indexed from Hacking News —…
This tiny chip can safeguard user data while enabling efficient computing on a smartphone
A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones while protecting sensitive user data from two common types of attacks — side-channel attacks and bus-probing attacks. This article has been indexed from Hacking News — ScienceDaily…
Breakthrough promises secure quantum computing at home
The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises to unlock the transformative potential of cloud-based quantum computing. This article has…
Protecting art and passwords with biochemistry
100 kilometers of quantum-encrypted transfer
Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable — roughly equivalent to the distance between Oxford and London. This article…
Satellites for quantum communications
Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this challenge, researchers are developing encryption methods that will apply physical laws…
Researchers unveil new way to counter mobile phone ‘account takeover’ attacks
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where a hacker gains unauthorized access to online accounts. This article has been indexed from Hacking News — ScienceDaily Read…
Defending your voice against deepfakes
Computer scientists have developed AntiFake, a tool to protect voice recordings from unauthorized speech synthesis. This article has been indexed from Hacking News — ScienceDaily Read the original article: Defending your voice against deepfakes
Keep it secret: Cloud data storage security approach taps quantum physics
Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage solution. This article has been indexed from Hacking News —…
Accelerating AI tasks while preserving data security
SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding…
Certain online games use dark designs to collect player data
The privacy policies and practices of online games contain dark design patterns which could be deceptive, misleading, or coercive to users, according to a new study. This article has been indexed from Hacking News — ScienceDaily Read the original article:…
New study unveils stretchable high-resolution user-interactive synesthesia displays for visual–acoustic encryption
A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility. This article has been indexed from Hacking News — ScienceDaily Read the original article: New study…
Not too big: Machine learning tames huge data sets
A machine-learning algorithm demonstrated the capability to process data that exceeds a computer’s available memory by identifying a massive data set’s key features and dividing them into manageable batches that don’t choke computer hardware. The algorithm set a world record…
Better cybersecurity with new material
Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that the new technology paves the way for a new…
Pros and cons of ChatGPT plugin, Code Interpreter, in education, biology, health
Researchers see potential in educational settings for the newest official ChatGPT plugin, called Code Interpreter, they’ve found limitations for its use by scientists who work with biological data utilizing computational methods to prioritize targeted treatment for cancer and genetic disorders.…
How randomized data can improve our security
With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices. This article has been indexed from Hacking News — ScienceDaily Read the original article: How randomized data can improve our security
Smart devices: Putting a premium on peace of mind
The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium…
Why computer security advice is more confusing than it should be
If you find the computer security guidelines you get at work confusing and not very useful, you’re not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would improve them…
Evaluating cybersecurity methods
Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker’s ability to learn secret information by observing the behavior of a victim computer program. This article…
How secure are voice authentication systems really?
Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries. This article has been indexed from Hacking News — ScienceDaily Read the original…
‘Toggle switch’ can help quantum computers cut through the noise
What good is a powerful computer if you can’t read its output? Or readily reprogram it to do different jobs? People who design quantum computers face these challenges, and a new device may make them easier to solve. This article…
Quantum computers are better at guessing, new study demonstrates
Researchers have demonstrated a quantum speedup over the most efficient classical computer algorithm possible for what is believed to be the first time. The accomplishment was performed on an IBM Montreal Quantum Falcon r4 27-qubit device. This article has been…
Two qudits fully entangled
Recently quantum computers started to work with more than just the zeros and ones we know from classical computers. Now a team demonstrates a way to efficiently create entanglement of such high-dimensional systems to enable more powerful calculations. This article…
Absolute zero in the quantum computer
Absolute zero cannot be reached — unless you have an infinite amount of energy or an infinite amount of time. Scientists in Vienna (Austria) studying the connection between thermodynamics and quantum physics have now found out that there is a…
Qubits put new spin on magnetism: Boosting applications of quantum computers
Research using a quantum computer as the physical platform for quantum experiments has found a way to design and characterize tailor-made magnetic objects using quantum bits, or qubits. That opens up a new approach to develop new materials and robust…
Are our pets leaking information about us?
Pet and animal-related apps are creating cybersecurity risks to their owners, new research has shown. This article has been indexed from Hacking News — ScienceDaily Read the original article: Are our pets leaking information about us?
Securing supply chains with quantum computing
New research in quantum computing is moving science closer to being able to overcome supply-chain challenges and restore global security during future periods of unrest. This article has been indexed from Hacking News — ScienceDaily Read the original article: Securing…
Chromo-encryption method encodes secrets with color
In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages. This article has been indexed from…
Quantum physicists make major nanoscopic advance
In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this…
Quantum algorithms save time in the calculation of electron dynamics
Quantum computers promise significantly shorter computing times for complex problems. But there are still only a few quantum computers worldwide with a limited number of so-called qubits. However, quantum computer algorithms can already run on conventional servers that simulate a…
Microlaser chip adds new dimensions to quantum communication
With only two levels of superposition, the qubits used in today’s quantum communication technologies have limited storage space and low tolerance for interference. Engineering’s hyperdimensional microlaser generates ‘qudits,’ photons with four simultaneous levels of information. The increase in dimension makes…
New AI model can help prevent damaging and costly data breaches
Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks. This article has been indexed from Hacking News — ScienceDaily Read the original article: New AI model can help prevent damaging and costly data…
New form of universal quantum computers
Computing power of quantum machines is currently still very low. Increasing it is still proving to be a major challenge. Physicists now present a new architecture for a universal quantum computer that overcomes such limitations and could be the basis…
New method to systematically find optimal quantum operation sequences for quantum computers developed
Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from…
Why ‘erasure’ could be key to practical quantum computing
A new method for correcting errors in the calculations of quantum computers potentially clears a major obstacle to a powerful new realm of computing. This article has been indexed from Hacking News — ScienceDaily Read the original article: Why ‘erasure’…
From bits to p-bits: One step closer to probabilistic computing
Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can…
Thinking like a cyber-attacker to protect user data
Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a…
Quantum cryptography: Hacking is futile
An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts. This article has been indexed from Hacking…
A key role for quantum entanglement
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is…
‘Pulling back the curtain’ to reveal a molecular key to The Wizard of Oz
Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential…
Radio waves for the detection of hardware tampering
This article has been indexed from Hacking News — ScienceDaily Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick. Read…
Toward error-free quantum computing
This article has been indexed from Hacking News — ScienceDaily For quantum computers to be useful in practice, errors must be detected and corrected. A team of experimental physicists has now implemented a universal set of computational operations on fault-tolerant…
Secure communication with light particles
This article has been indexed from Hacking News — ScienceDaily While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution,…
Emulating impossible ‘unipolar’ laser pulses paves the way for processing quantum information
This article has been indexed from Hacking News — ScienceDaily A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing. Read the original article: Emulating impossible…
Eavesdroppers can hack 6G frequency with DIY metasurface
This article has been indexed from Hacking News — ScienceDaily Crafty hackers can make a tool to eavesdrop on some 6G wireless signals in as little as five minutes using office paper, an inkjet printer, a metallic foil transfer and…
Self-propelled, endlessly programmable artificial cilia
This article has been indexed from Hacking News — ScienceDaily Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of applications, including soft robotics, biocompatible medical…
Scientific advance leads to a new tool in the fight against hackers
This article has been indexed from Hacking News — ScienceDaily A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle…
New technique offers faster security for non-volatile memory tech
This article has been indexed from Hacking News — ScienceDaily Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster…
Single-photon source paves the way for practical quantum encryption
This article has been indexed from Hacking News — ScienceDaily Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly secure communication based…
Tiny, cheap solution for quantum-secure encryption
This article has been indexed from Hacking News — ScienceDaily Engineers propose a new kind of encryption to protect data in the age of quantum computers. Read the original article: Tiny, cheap solution for quantum-secure encryption
Tiny magnets could hold the secret to new quantum computers
This article has been indexed from Hacking News — ScienceDaily Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices. Read the original article: Tiny magnets could hold the secret to new quantum computers
Warning: Objects in driverless car sensors may be closer than they appear
This article has been indexed from Hacking News — ScienceDaily Researchers have demonstrated the first attack strategy that can fool industry-standard autonomous vehicle sensor components into believing nearby objects are closer (or further) than they appear without being detected. The…
Double locked: Polymer hydrogels secure confidential information
This article has been indexed from Hacking News — ScienceDaily The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a ‘double…
A security technique to fool would-be cyber attackers
This article has been indexed from Hacking News — ScienceDaily Researchers developed a technique that effectively protects computer programs’ secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes. Read the original article: A security…
Entanglement unlocks scaling for quantum machine learning
This article has been indexed from Hacking News — ScienceDaily The field of machine learning on quantum computers got a boost from new research removing a potential roadblock to the practical implementation of quantum neural networks. Read the original article:…
The power of chaos: A robust and low-cost cryptosystem for the post-quantum era
This article has been indexed from Hacking News — ScienceDaily Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers. Read the original article: The power of chaos: A robust and low-cost cryptosystem for the post-quantum…
How big does your quantum computer need to be?
This article has been indexed from Hacking News — ScienceDaily Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to…
IT security: Computer attacks with laser light
This article has been indexed from Hacking News — ScienceDaily Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to…
Real-world study shows the potential of gait authentication to enhance smartphone security
This article has been indexed from Hacking News — ScienceDaily A study showed that — within an appropriate framework — gait recognition could be a viable technique for protecting individuals and their data from potential crime. Read the original article:…
A nanoantenna for long-distance, ultra-secure communication
This article has been indexed from Hacking News — ScienceDaily Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and…
Big data privacy for machine learning just got 100 times cheaper
This article has been indexed from Hacking News — ScienceDaily Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning. Read the…
Revolutionary identity verification technique offers robust solution to hacking
This article has been indexed from Hacking News — ScienceDaily Computer scientists have developed an extremely secure identity verification method based on the fundamental principle that information cannot travel faster than the speed of light. The breakthrough has the potential…
Securing data transfers with relativity
This article has been indexed from Hacking News — ScienceDaily The volume of data transferred is constantly increasing, but the absolute security of these exchanges cannot be guaranteed, as shown by cases of hacking frequently reported in the news. To…
Government action needed to ensure insurance against major hacking of driverless vehicles, experts warn
This article has been indexed from Hacking News — ScienceDaily Government action is needed so driverless vehicles can be insured against malicious hacks which could have potentially catastrophic consequences, a study says. Read the original article: Government action needed to…
Quantum networks in our future
This article has been indexed from Hacking News — ScienceDaily Investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate,…
One material with two functions could lead to faster memory
This article has been indexed from Hacking News — ScienceDaily Researchers have developed a new light-emitting memory device by integrating a resistive random-access memory with a light-emitting electrochemical cell that are both based on perovskite. The results are promising for…
Is your mobile provider tracking your location? New technology could stop it
This article has been indexed from Hacking News — ScienceDaily Right now, there is a good chance your phone is tracking your location — even with GPS services turned off. That’s because, to receive service, our phones reveal personal identifiers…
Impenetrable optical OTP security platform
This article has been indexed from Hacking News — ScienceDaily An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible has been proposed. The device accomplishes this by controlling a variety of information of light including the color,…
New study examines privacy and security perceptions of online education proctoring services
This article has been indexed from Hacking News — ScienceDaily Educational institutions have had to transition to remote learning and exam taking. This has led to an increase in the use of online proctoring services to curb student cheating. In…
New cybersecurity technique keeps hackers guessing
This article has been indexed from Hacking News — ScienceDaily Researchers developed a new machine learning-based framework to enhance the security of computer networks inside vehicles without undermining performance. Read the original article: New cybersecurity technique keeps hackers guessing
Team streamlines neural networks to be more adept at computing on encrypted data
This article has been indexed from Hacking News — ScienceDaily Researchers are rethinking basic functions that drive the ability of neural networks to make inferences on encrypted data. Read the original article: Team streamlines neural networks to be more adept…
Making our computers more secure
This article has been indexed from Hacking News — ScienceDaily Researchers recently presented articles on memory safety that make computer systems more secure. This new research, which has zero to little effect on system performance, is already being used to…
New twist on DNA data storage lets users preview stored files
This article has been indexed from Hacking News — ScienceDaily Researchers have turned a longstanding challenge in DNA data storage into a tool, using it to offer users previews of stored data files — such as thumbnail versions of image…
‘PrivacyMic’: For a smart speaker that doesn’t eavesdrop
This article has been indexed from Hacking News — ScienceDaily Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world’s smart speakers. The trouble is that they’re…
Early endeavors on the path to reliable quantum machine learning
This article has been indexed from Hacking News — ScienceDaily The future quantum computers should be capable of super-fast and reliable computation. Today, this is still a major challenge. Now, computer scientists conduct an early exploration for reliable quantum machine…
Shadow figment technology foils cyberattacks
This article has been indexed from Hacking News — ScienceDaily Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits…
Graphene key for novel hardware security
As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques…
An uncrackable combination of invisible ink and artificial intelligence
Coded messages in invisible ink sound like something only found in espionage books, but in real life, they can have important security purposes. Yet, they can be cracked if their encryption is predictable. Now, researchers have printed complexly encoded data…
Algorithms improve how we protect our data
Scientists have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach could reduce the computational complexity needed to validate encryption security. Read the original article: Algorithms…
Computer scientists discover new vulnerability affecting computers globally
Read the original article: Computer scientists discover new vulnerability affecting computers globally A team o computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe…
Materials advances are key to development of quantum hardware
Read the original article: Materials advances are key to development of quantum hardware A new article argues that the ability to move forward on developing useful quantum computers requires new major advances in materials science, engineering and fabrication. The authors…
Scientists harness chaos to protect devices from hackers
Read the original article: Scientists harness chaos to protect devices from hackers Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers.…
Scientists harness chaos to protect devices from hackers
Read the original article: Scientists harness chaos to protect devices from hackers Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers.…
Facial recognition ID with a twist: Smiles, winks and other facial movements for access
Read the original article: Facial recognition ID with a twist: Smiles, winks and other facial movements for access Concurrent Two-Factor Identity Verification requires both one’s facial identity and a specific facial motion to gain access. To set it up, a…
Researchers discover that privacy-preserving tools leave private data anything but
Read the original article: Researchers discover that privacy-preserving tools leave private data anything but Researchers explored whether private data could still be recovered from images that had been ‘sanitized” by such deep-learning discriminators as privacy protecting GANs (PP-GANs). Become…
Heat-free optical switch would enable optical quantum computing chips
Read the original article: Heat-free optical switch would enable optical quantum computing chips In a potential boost for quantum computing and communication, a European research collaboration reported a new method of controlling and manipulating single photons without generating heat. The…
Cybersecurity researchers build a better ‘canary trap’
Read the original article: Cybersecurity researchers build a better ‘canary trap’ This new tool uses an artificial intelligence system to generate fake documents that foil IP theft by fooling adversaries. Become a supporter of IT Security News and help…
Quantum systems learn joint computing
Read the original article: Quantum systems learn joint computing Researchers realize quantum-logic computer operation between two separate quantum modules in different laboratories. Become a supporter of IT Security News and help us remove the ads. Read the original article:…
Blueprint for fault-tolerant qubits
Read the original article: Blueprint for fault-tolerant qubits Building a quantum computer is a challenging task because of the fragility of quantum bits. To deal with this problem, various types of active error correction techniques have been developed. In contrast,…