Computer Science: Encryption Computer Science: Quantum Computers Mathematics: Puzzles Physics: General Physics: Quantum Computing Physics: Quantum Physics
Published

Keep it secret: Cloud data storage security approach taps quantum physics      (via sciencedaily.com)     Original source 

Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage solution.

Computer Science: Encryption Computer Science: General
Published

Accelerating AI tasks while preserving data security      (via sciencedaily.com)     Original source 

SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding AI applications, while ensuring sensitive data remain safe from attackers.

Energy: Nuclear Engineering: Biometric
Published

Monitoring nuclear weapons stockpiles with radio waves      (via sciencedaily.com)     Original source 

Monitoring whether states are complying with disarmament treaties is not an easy task. An international team has been exploring remote monitoring with the help of two antennas and a couple of mirrors.

Computer Science: Encryption Physics: Optics
Published

New study unveils stretchable high-resolution user-interactive synesthesia displays for visual--acoustic encryption      (via sciencedaily.com)     Original source 

A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility.

Chemistry: General Engineering: Biometric
Published

Not the usual suspects: New interactive lineup boosts eyewitness accuracy      (via sciencedaily.com)     Original source 

Allowing eyewitnesses to dynamically explore digital faces using a new interactive procedure can significantly improve identification accuracy compared to the video lineup and photo array procedures used by police worldwide, a new study reveals.

Chemistry: Inorganic Chemistry Computer Science: Encryption Computer Science: General Computer Science: Quantum Computers Energy: Technology Mathematics: Puzzles Physics: General Physics: Optics Physics: Quantum Computing Physics: Quantum Physics
Published

Better cybersecurity with new material      (via sciencedaily.com) 

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that the new technology paves the way for a new type of quantum communication.

Computer Science: Encryption
Published

How randomized data can improve our security      (via sciencedaily.com) 

With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices.

Computer Science: Encryption
Published

A new weapon in the war on robocall scams      (via sciencedaily.com) 

The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being perpetuated by robocalls. The tool, called SnorCall, is designed to help regulators, phone carriers and other stakeholders better understand and monitor robocall trends -- and take action against related criminal activity.

Computer Science: Encryption
Published

Smart devices: Putting a premium on peace of mind      (via sciencedaily.com) 

The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium to tell which gadgets are safe from security attacks before they buy. But voluntary product labels may not be enough if the program is going to protect consumers in the long run, the findings suggest.

Engineering: Biometric Physics: Optics
Published

Engineering team uses diamond microparticles to create high security anti-counterfeit labels      (via sciencedaily.com)     Original source 

Researchers have developed a pioneering technological solution that counterfeiters have no response to.

Computer Science: Encryption Computer Science: General
Published

Why computer security advice is more confusing than it should be      (via sciencedaily.com) 

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would improve them -- and probably make your computer safer.

Engineering: Biometric Engineering: Nanotechnology
Published

Researchers visualize activity of CRISPR genetic scissors      (via sciencedaily.com)     Original source 

Scientists have developed a new method to measure the smallest twists and torques of molecules within milliseconds. The method makes it possible to track the gene recognition of CRISPR-Cas protein complexes, also known as 'genetic scissors', in real time and with the highest resolution. With the data obtained, the recognition process can be accurately characterized and modeled to improve the precision of the genetic scissors.

Computer Science: Encryption
Published

Solving rare disease mysteries ... and protecting privacy      (via sciencedaily.com) 

Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential applications across society.

Computer Science: Encryption
Published

Stressed for a bit? Then don't click it, cybersecurity experts advise      (via sciencedaily.com)     Original source 

Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new study.

Computer Science: Encryption Mathematics: General Mathematics: Modeling
Published

Evaluating cybersecurity methods      (via sciencedaily.com)     Original source 

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information by observing the behavior of a victim computer program.

Computer Science: Encryption Physics: Acoustics and Ultrasound
Published

How secure are voice authentication systems really?      (via sciencedaily.com)     Original source 

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.

Computer Science: Artificial Intelligence (AI) Computer Science: Encryption Engineering: Robotics Research
Published

New cyber software can verify how much knowledge AI really knows      (via sciencedaily.com)     Original source 

With a growing interest in generative artificial intelligence (AI) systems worldwide, researchers have created software that is able to verify how much information an AI farmed from an organization's digital database.

Chemistry: Biochemistry Engineering: Biometric
Published

Can investigators use household dust as a forensic tool?      (via sciencedaily.com)     Original source 

It is possible to retrieve forensically relevant information from human DNA in household dust.

Chemistry: General Engineering: Biometric
Published

New research suggests peer-advisor relationship is key to success      (via sciencedaily.com) 

Collaborative research across the country has shown that strengthening the relationship between the student and advisor can increase retention rates in engineering doctoral studies.