Showing 20 articles starting at article 21
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption
Published A new weapon in the war on robocall scams (via sciencedaily.com)
The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being perpetuated by robocalls. The tool, called SnorCall, is designed to help regulators, phone carriers and other stakeholders better understand and monitor robocall trends -- and take action against related criminal activity.
Published Smart devices: Putting a premium on peace of mind (via sciencedaily.com)
The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium to tell which gadgets are safe from security attacks before they buy. But voluntary product labels may not be enough if the program is going to protect consumers in the long run, the findings suggest.
Published Why computer security advice is more confusing than it should be (via sciencedaily.com)
If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would improve them -- and probably make your computer safer.
Published Solving rare disease mysteries ... and protecting privacy (via sciencedaily.com)
Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential applications across society.
Published Stressed for a bit? Then don't click it, cybersecurity experts advise (via sciencedaily.com) Original source
Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new study.
Published Evaluating cybersecurity methods (via sciencedaily.com) Original source
Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information by observing the behavior of a victim computer program.
Published How secure are voice authentication systems really? (via sciencedaily.com) Original source
Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.
Published New cyber software can verify how much knowledge AI really knows (via sciencedaily.com) Original source
With a growing interest in generative artificial intelligence (AI) systems worldwide, researchers have created software that is able to verify how much information an AI farmed from an organization's digital database.
Published New breakthrough enables perfectly secure digital communications (via sciencedaily.com)
Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one piece of content inside another in a way that cannot be detected. This may have strong implications for information security, besides further applications in data compression and storage.
Published Chromo-encryption method encodes secrets with color (via sciencedaily.com)
In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages.
Published Quantum physicists make major nanoscopic advance (via sciencedaily.com) Original source
In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this colossal breakthrough allows researchers to create a phenomenon known as quantum mechanical entanglement. This in turn, opens new doors for companies and others to exploit the technology commercially.
Published Researchers propose methods for automatic detection of doxing (via sciencedaily.com)
A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.
Published Microlaser chip adds new dimensions to quantum communication (via sciencedaily.com)
With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.
Published New AI model can help prevent damaging and costly data breaches (via sciencedaily.com)
Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.
Published New method to systematically find optimal quantum operation sequences for quantum computers developed (via sciencedaily.com)
Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.
Published From bits to p-bits: One step closer to probabilistic computing (via sciencedaily.com)
Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.
Published Thinking like a cyber-attacker to protect user data (via sciencedaily.com)
Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.
Published A key role for quantum entanglement (via sciencedaily.com)
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.
Published Quantum cryptography: Hacking is futile (via sciencedaily.com)
An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.
Published 'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz (via sciencedaily.com)
Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.