Tag: Hacking News — ScienceDaily

Cybersecurity vulnerabilities of common seismological equipment

Read the original article: Cybersecurity vulnerabilities of common seismological equipment Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points.   Become…

Physicists observe competition between magnetic orders

Read the original article: Physicists observe competition between magnetic orders Two-dimensional materials, consisting of a single layer of atoms, have been booming in research for years. They possess novel properties that can only be explained with the help of the…

A biochemical random number

Read the original article: A biochemical random number Scientists have generated a huge true random number using DNA synthesis. It is the first time that a number of this magnitude has been created by biochemical means.   Become a supporter…

Multi-state data storage leaving binary behind

Read the original article: Multi-state data storage leaving binary behind Electronic data is being produced at a breath-taking rate. Around ten zettabytes (ten trillion gigabytes) of data is stored in global server farms, and that’s doubling every two years. With…

New algorithm could unleash the power of quantum computers

Read the original article: New algorithm could unleash the power of quantum computers A new algorithm that fast forwards simulations could bring greater use ability to current and near-term quantum computers, opening the way for applications to run past strict…

A question of reality

Read the original article: A question of reality Physicists have published a review that explores Bell’s inequalities and his concepts of reality and explains their relevance to quantum information and its applications.   Advertise on IT Security News. Read the…

Predicting computational power of early quantum computers

Read the original article: Predicting computational power of early quantum computers Quantum physicists have developed an algorithm which helps early quantum computers to perform calculations most efficiently.   Advertise on IT Security News. Read the original article: Predicting computational power…

Security gap allows eavesdropping on mobile phone calls

Read the original article: Security gap allows eavesdropping on mobile phone calls Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers have shown that this is not always the case.…

Consumers don’t fully trust smart home technologies

Read the original article: Consumers don’t fully trust smart home technologies Smart home technologies are marketed to enhance your home and make life easier. However, consumers are not convinced that they can trust the privacy and security of these technologies,…

Consumers don’t fully trust smart home technologies

Read the original article: Consumers don’t fully trust smart home technologies Smart home technologies are marketed to enhance your home and make life easier. However, consumers are not convinced that they can trust the privacy and security of these technologies,…

Sharing a secret…the quantum way

Read the original article: Sharing a secret…the quantum way Researchers have demonstrated a record setting quantum protocol for sharing a secret amongst many parties.   Advertise on IT Security News. Read the original article: Sharing a secret…the quantum way

Randomness theory could hold key to internet security

Read the original article: Randomness theory could hold key to internet security Researchers identified a problem that holds the key to whether all encryption can be broken — as well as a surprising connection to a mathematical concept that aims…

Randomness theory could hold key to internet security

Read the original article: Randomness theory could hold key to internet security Researchers identified a problem that holds the key to whether all encryption can be broken — as well as a surprising connection to a mathematical concept that aims…

Recognizing fake images using frequency analysis

Read the original article: Recognizing fake images using frequency analysis They look deceptively real, but they are made by computers: so-called deep-fake images are generated by machine learning algorithms, and humans are pretty much unable to distinguish them from real…

Quantum physics provides a way to hide ignorance

Read the original article: Quantum physics provides a way to hide ignorance Students can hide their ignorance and answer questions correctly in an exam without their lack of knowledge being detected by teachers — but only in the quantum world.…

Tool to protect children’s online privacy

Read the original article: Tool to protect children’s online privacy A new study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Researchers developed a tool that can determine whether…

Tool to protect children’s online privacy

Read the original article: Tool to protect children’s online privacy A new study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Researchers developed a tool that can determine whether…

Adding noise for completely secure communication

Read the original article: Adding noise for completely secure communication How can we protect communications against ‘eavesdropping’ if we don’t trust the devices used in the process? This is one of the main questions in quantum cryptography research. Researchers have…

Do COVID-19 apps protect your privacy?

Read the original article: Do COVID-19 apps protect your privacy? Many mobile apps that track the spread of COVID-19 ask for personal data but don’t indicate the information will be secure.   Advertise on IT Security News. Read the original…

Genetic barcodes can ensure authentic DNA fingerprints

Read the original article: Genetic barcodes can ensure authentic DNA fingerprints Engineers have demonstrated a method for ensuring that an increasingly popular method of genetic identification called ”DNA fingerprinting” remains secure against inadvertent mistakes or malicious attacks in the field.…

Identifying light sources using artificial intelligence

Read the original article: Identifying light sources using artificial intelligence Identifying sources of light plays an important role in the development of many photonic technologies, such as lidar, remote sensing, and microscopy. Traditionally, identifying light sources as diverse as sunlight,…

Critical ‘starbleed’ vulnerability in FPGA chips identified

Read the original article: Critical ‘starbleed’ vulnerability in FPGA chips identified Field Programmable Gate Arrays (FPGAs) are flexibly programmable computer chips that are considered very secure components in many applications. Scientists have now discovered that a critical vulnerability is hidden…

Faster way to replace bad info in networks

Researchers have demonstrated a new model of how competing pieces of information spread in online social networks and the Internet of Things (IoT). The findings could be used to disseminate accurate information more quickly, displacing false information about anything from…

New sandboxing approach in web browser increases security

A powerful new approach to securing web browsers, using a tool called WebAssembly, is getting its first real-world application in the Firefox browser. Developed by a team of researchers, the approach shifts some of the browser code into ‘secure sandboxes’…

New technology could help solve AI’s ‘memory bottleneck’

Electrical engineers have developed a new magnetic memory device that could potentially support the surge of data-centric computing, which requires ever-increasing power, storage and speed.   Advertise on IT Security News. Read the complete article: New technology could help solve…

First all-optical, stealth encryption technology developed

Engineers are introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network transmission.   Advertise on IT Security News. Read the complete article: First all-optical, stealth encryption…

Security risk for e-scooters and riders

New research finds e-scooters have risks beyond the perils of potential collisions. Computer science experts have published the first review of the security and privacy risks posed by e-scooters and their related software services and applications.   Advertise on IT…

Security risk for e-scooters and riders

New research finds e-scooters have risks beyond the perils of potential collisions. Computer science experts have published the first review of the security and privacy risks posed by e-scooters and their related software services and applications.   Advertise on IT…

Organized cybercrime — not your average mafia

Scientists have identified common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.   Advertise on IT Security News. Read the complete article: Organized cybercrime —…