Read the original article: Cybersecurity vulnerabilities of common seismological equipment Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points. Become…
Tag: Hacking News — ScienceDaily
Artificial emotional intelligence: a safer, smarter future with 5G and emotion recognition
Read the original article: Artificial emotional intelligence: a safer, smarter future with 5G and emotion recognition The combination of new 5G communication technologies with AI-based systems are ushering in a ‘smart generation’ of vehicles, drones, and even entire cities. Now,…
Say goodbye to the dots and dashes to enhance optical storage media
Read the original article: Say goodbye to the dots and dashes to enhance optical storage media A new technology is aimed at modernizing the optical digital storage technology. This advancement allows for more data to be stored and for that…
Researchers improve data readout by using ‘quantum entanglement’
Read the original article: Researchers improve data readout by using ‘quantum entanglement’ Researchers say they have been able to greatly improve the readout of data from digital memories – thanks to a phenomenon known as ‘quantum entanglement’. Become a…
Physicists observe competition between magnetic orders
Read the original article: Physicists observe competition between magnetic orders Two-dimensional materials, consisting of a single layer of atoms, have been booming in research for years. They possess novel properties that can only be explained with the help of the…
New transistor design disguises key computer chip hardware from hackers
Read the original article: New transistor design disguises key computer chip hardware from hackers Engineers propose a built-in security measure that would better protect computer chip hardware from hackers. Become a supporter of IT Security News and help us…
Misinformation or artifact: A new way to think about machine learning
Read the original article: Misinformation or artifact: A new way to think about machine learning Machine learning has delivered amazing results, but there also have been failures, ranging from the harmless to potentially deadly. New work suggests that common assumptions…
A biochemical random number
Read the original article: A biochemical random number Scientists have generated a huge true random number using DNA synthesis. It is the first time that a number of this magnitude has been created by biochemical means. Become a supporter…
Computer scientists launch counteroffensive against video game cheaters
Read the original article: Computer scientists launch counteroffensive against video game cheaters Computer scientists have devised a new weapon against video game players who cheat. The researchers developed their approach for detecting cheaters using the popular first-person shooter game Counter-Strike.…
Researchers simulate privacy leaks in functional genomics studies
Read the original article: Researchers simulate privacy leaks in functional genomics studies Researchers demonstrate that it’s possible to de-identify raw functional genomics data to ensure patient privacy. They also demonstrate how these raw data could be linked back to specific…
Individuals may legitimize hacking when angry with system or authority
Read the original article: Individuals may legitimize hacking when angry with system or authority New research has found that when individuals feel that a system or authority is unresponsive to their demands, they are more likely to legitimize hacker activity…
Multi-state data storage leaving binary behind
Read the original article: Multi-state data storage leaving binary behind Electronic data is being produced at a breath-taking rate. Around ten zettabytes (ten trillion gigabytes) of data is stored in global server farms, and that’s doubling every two years. With…
New algorithm could unleash the power of quantum computers
Read the original article: New algorithm could unleash the power of quantum computers A new algorithm that fast forwards simulations could bring greater use ability to current and near-term quantum computers, opening the way for applications to run past strict…
A question of reality
Read the original article: A question of reality Physicists have published a review that explores Bell’s inequalities and his concepts of reality and explains their relevance to quantum information and its applications. Advertise on IT Security News. Read the…
How do people prefer coronavirus contact tracing to be carried out?
Read the original article: How do people prefer coronavirus contact tracing to be carried out? New research shows that people prefer coronavirus contact tracing to be carried out by a combination of apps and humans. Advertise on IT Security…
Revolutionary quantum breakthrough paves way for safer online communication
Read the original article: Revolutionary quantum breakthrough paves way for safer online communication The world is one step closer to having a totally secure internet and an answer to the growing threat of cyber-attacks, thanks to a team of international…
Predicting computational power of early quantum computers
Read the original article: Predicting computational power of early quantum computers Quantum physicists have developed an algorithm which helps early quantum computers to perform calculations most efficiently. Advertise on IT Security News. Read the original article: Predicting computational power…
Security gap allows eavesdropping on mobile phone calls
Read the original article: Security gap allows eavesdropping on mobile phone calls Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers have shown that this is not always the case.…
Digital content on track to equal half ‘Earth’s mass’ by 2245
Read the original article: Digital content on track to equal half ‘Earth’s mass’ by 2245 As we use resources to power massive computer farms and process digital information, our technological progress is redistributing Earth’s matter from physical atoms to digital…
Consumers don’t fully trust smart home technologies
Read the original article: Consumers don’t fully trust smart home technologies Smart home technologies are marketed to enhance your home and make life easier. However, consumers are not convinced that they can trust the privacy and security of these technologies,…
Consumers don’t fully trust smart home technologies
Read the original article: Consumers don’t fully trust smart home technologies Smart home technologies are marketed to enhance your home and make life easier. However, consumers are not convinced that they can trust the privacy and security of these technologies,…
Sharing a secret…the quantum way
Read the original article: Sharing a secret…the quantum way Researchers have demonstrated a record setting quantum protocol for sharing a secret amongst many parties. Advertise on IT Security News. Read the original article: Sharing a secret…the quantum way
Randomness theory could hold key to internet security
Read the original article: Randomness theory could hold key to internet security Researchers identified a problem that holds the key to whether all encryption can be broken — as well as a surprising connection to a mathematical concept that aims…
Randomness theory could hold key to internet security
Read the original article: Randomness theory could hold key to internet security Researchers identified a problem that holds the key to whether all encryption can be broken — as well as a surprising connection to a mathematical concept that aims…
Recognizing fake images using frequency analysis
Read the original article: Recognizing fake images using frequency analysis They look deceptively real, but they are made by computers: so-called deep-fake images are generated by machine learning algorithms, and humans are pretty much unable to distinguish them from real…
Spintronics: Faster data processing through ultrashort electric pulses
Read the original article: Spintronics: Faster data processing through ultrashort electric pulses Physicists have developed a simple concept that could improve significantly magnetic-based data processing. Using ultrashort electric pulses in the terahertz range, data can be written, read and erased…
No keys to the kingdom: New single sign-on algorithm provides superior privacy
Read the original article: No keys to the kingdom: New single sign-on algorithm provides superior privacy Single sign-on systems (SSOs) allow us to login to multiple websites and applications using a single username and password combination. But these are third…
Quantum physics provides a way to hide ignorance
Read the original article: Quantum physics provides a way to hide ignorance Students can hide their ignorance and answer questions correctly in an exam without their lack of knowledge being detected by teachers — but only in the quantum world.…
Tool to protect children’s online privacy
Read the original article: Tool to protect children’s online privacy A new study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Researchers developed a tool that can determine whether…
Tool to protect children’s online privacy
Read the original article: Tool to protect children’s online privacy A new study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Researchers developed a tool that can determine whether…
Adding noise for completely secure communication
Read the original article: Adding noise for completely secure communication How can we protect communications against ‘eavesdropping’ if we don’t trust the devices used in the process? This is one of the main questions in quantum cryptography research. Researchers have…
Do COVID-19 apps protect your privacy?
Read the original article: Do COVID-19 apps protect your privacy? Many mobile apps that track the spread of COVID-19 ask for personal data but don’t indicate the information will be secure. Advertise on IT Security News. Read the original…
Genetic barcodes can ensure authentic DNA fingerprints
Read the original article: Genetic barcodes can ensure authentic DNA fingerprints Engineers have demonstrated a method for ensuring that an increasingly popular method of genetic identification called ”DNA fingerprinting” remains secure against inadvertent mistakes or malicious attacks in the field.…
Identifying light sources using artificial intelligence
Read the original article: Identifying light sources using artificial intelligence Identifying sources of light plays an important role in the development of many photonic technologies, such as lidar, remote sensing, and microscopy. Traditionally, identifying light sources as diverse as sunlight,…
Scientists take steps to create a ‘racetrack memory,’ potentially enhancing data storage
Read the original article: Scientists take steps to create a ‘racetrack memory,’ potentially enhancing data storage A team of scientists has taken steps to create a new form of digital data storage, a ”Racetrack Memory,” which opens the possibility to…
Critical ‘starbleed’ vulnerability in FPGA chips identified
Read the original article: Critical ‘starbleed’ vulnerability in FPGA chips identified Field Programmable Gate Arrays (FPGAs) are flexibly programmable computer chips that are considered very secure components in many applications. Scientists have now discovered that a critical vulnerability is hidden…
Cybersecurity, tech infrastructure requires international trust
Researchers use the field of incident response to shed light on how experts — and nations — can more effectively combat cyber-warfare when they foster trust and transcend politics. Advertise on IT Security News. Read the complete article: Cybersecurity,…
Faster way to replace bad info in networks
Researchers have demonstrated a new model of how competing pieces of information spread in online social networks and the Internet of Things (IoT). The findings could be used to disseminate accurate information more quickly, displacing false information about anything from…
Chip-based devices improve practicality of quantum-secured communication
Researchers have demonstrated new chip-based devices that contain all the optical components necessary for quantum key distribution while increasing real-world security. The fast and cost-effective platform is poised to facilitate implementation of extremely secure data communication that can be used…
Computer scientists’ new tool fools hackers into sharing keys for better cybersecurity
Instead of blocking hackers, a new cybersecurity defense approach actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the…
New sandboxing approach in web browser increases security
A powerful new approach to securing web browsers, using a tool called WebAssembly, is getting its first real-world application in the Firefox browser. Developed by a team of researchers, the approach shifts some of the browser code into ‘secure sandboxes’…
Cryptographic ‘tag of everything’ could protect the supply chain
To combat supply chain counterfeiting, which can cost companies billions of dollars annually, researchers have invented a cryptographic ID tag that’s small enough to fit on virtually any product and verify its authenticity. Advertise on IT Security News. Read…
New technology could help solve AI’s ‘memory bottleneck’
Electrical engineers have developed a new magnetic memory device that could potentially support the surge of data-centric computing, which requires ever-increasing power, storage and speed. Advertise on IT Security News. Read the complete article: New technology could help solve…
First all-optical, stealth encryption technology developed
Engineers are introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network transmission. Advertise on IT Security News. Read the complete article: First all-optical, stealth encryption…
Security risk for e-scooters and riders
New research finds e-scooters have risks beyond the perils of potential collisions. Computer science experts have published the first review of the security and privacy risks posed by e-scooters and their related software services and applications. Advertise on IT…
Security risk for e-scooters and riders
New research finds e-scooters have risks beyond the perils of potential collisions. Computer science experts have published the first review of the security and privacy risks posed by e-scooters and their related software services and applications. Advertise on IT…
Organized cybercrime — not your average mafia
Scientists have identified common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year. Advertise on IT Security News. Read the complete article: Organized cybercrime —…