Menu

Blog

Archive for the ‘encryption’ category: Page 26

Oct 31, 2020

Quantum-computing pioneer warns of complacency over Internet security

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Quantum computers are now a reality, although they are still too rudimentary to factor numbers of more than two digits. But it is only a matter of time until quantum computers threaten Internet encryption.

Nature caught up with Shor to ask him about the impact of his work — and where Internet security is heading.


Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

Oct 28, 2020

In a first, researchers extract secret key used to encrypt Intel CPU code

Posted by in categories: computing, encryption

Hackers can now reverse engineer updates or write their own custom firmware.

Oct 22, 2020

The 5 Faces Of Chinese Espionage: The World’s First ‘Digital Authoritarian State’

Posted by in category: encryption

Chinese spies are different from those of most other wealthy and developed countries where the majority of spies are highly trained, with some serving under diplomatic cover and others operating under what the US Intelligence Community calls Non Official Cover (NOC).

Chinese intelligence operations are the first in modern times to use, as a foundation, the whole of society. Because of this, China’s espionage tactics are sometimes artless, operating with little in the way of standard spy-fare, (encrypted communication, dead drops, etc.) instead relying on an overwhelming volume of espionage operations conducted by all manner of citizen and a sort of impunity inherent in the lack of substantive penalty for when a Chinese agent is discovered, a study I recently published analyzing 595 cases of intelligence collection efforts sanctioned and abetted by the Chinese Communist Party.

Oct 17, 2020

‘Classified knots’: Researchers create optical framed knots to encode information

Posted by in categories: encryption, quantum physics, security

In a world first, researchers from the University of Ottawa in collaboration with Israeli scientists have been able to create optical framed knots in the laboratory that could potentially be applied in modern technologies. Their work opens the door to new methods of distributing secret cryptographic keys—used to encrypt and decrypt data, ensure secure communication and protect private information. The group recently published their findings in Nature Communications.

“This is fundamentally important, in particular from a topology-focused perspective, since framed knots provide a platform for topological quantum computations,” explained senior author, Professor Ebrahim Karimi, Canada Research Chair in Structured Light at the University of Ottawa.

“In addition, we used these non-trivial optical structures as information carriers and developed a security protocol for classical communication where information is encoded within these framed knots.”

Oct 17, 2020

#SpaceWatchGL Opinion: Let’s not make Newspace a paradise for hackers

Posted by in categories: cybercrime/malcode, encryption

In the race to launch smallsats into low earth orbit quickly and cost-effectively, operators and manufacturers have compromised on security and left themselves vulnerable to cyber attacks. Let’s not make Newspace a paradise for hackers.

Smallsat operators and manufacturers need to consider why their smallsats are so vulnerable to cyber attacks, the harm attacks can cause, cyber security weaknesses, why basic encryption is not enough and what can be done about it now. These are the issues that this article addresses.

Oct 4, 2020

Single photons from a silicon chip

Posted by in categories: encryption, quantum physics, robotics/AI, security

(Nanowerk News) Quantum technology holds great promise: Just a few years from now, quantum computers are expected to revolutionize database searches, AI systems, and computational simulations. Today already, quantum cryptography can guarantee absolutely secure data transfer, albeit with limitations. The greatest possible compatibility with our current silicon-based electronics will be a key advantage. And that is precisely where physicists from the Helmholtz-Zentrum Dresden-Rossendorf (HZDR) and TU Dresden have made remarkable progress: The team has designed a silicon-based light source to generate single photons that propagate well in glass fibers.

Oct 2, 2020

This ‘unhackable’ network uses the weird power of quantum physics

Posted by in categories: encryption, engineering, quantum physics

O,.o.


BT and Toshiba have deployed an ‘unhackable’ quantum network that uses streams of photons to encrypt sensitive communications.

Continue reading “This ‘unhackable’ network uses the weird power of quantum physics” »

Sep 18, 2020

Revolutionary Quantum Cryptography Breakthrough Paves Way for Safer Online Communication

Posted by in categories: biotech/medical, cybercrime/malcode, encryption, internet, quantum physics

The world is one step closer to having a totally secure internet and an answer to the growing threat of cyber-attacks, thanks to a team of international scientists who have created a unique prototype that could transform how we communicate online.

The invention led by the University of Bristol, revealed today in the journal Science Advances, has the potential to serve millions of users, is understood to be the largest-ever quantum network of its kind, and could be used to secure people’s online communication, particularly in these internet-led times accelerated by the COVID-19 pandemic.

Aug 28, 2020

DARPA Launches Project CHARIOT in Bid to Shield Big Tech Profits

Posted by in categories: computing, encryption, internet, military, quantum physics

DARPA announces a new type of cryptography to protect the Big Tech firm profits from the dawn of quantum computers and allow backdoor access into 3 trillion internet-connected devices.

by Raul Diego

Continue reading “DARPA Launches Project CHARIOT in Bid to Shield Big Tech Profits” »

Aug 24, 2020

New Bluetooth Vulnerability: Hackers Could Spy on You

Posted by in categories: cybercrime/malcode, encryption, mobile phones

O,.o.


Millions of us use Bluetooth wireless communications every day—to make phone calls when driving, with our fitness trackers, streaming at work or play. Innocent enough, seemingly. But no technology comes without a warning: a recently discovered Bluetooth vulnerability allows hackers to spy on your conversations or take control of your smart phone. The vulnerability deals with the encryption between two devices. It even has a name—a KNOB hack (Key Negotiation Of Bluetooth).

This is not the first time Bluetooth has been hacked and it likely won’t be the last. And this one has its limitations. To take advantage of the KNOB vulnerability the hacker has to be in close proximity of your phone. There is also currently no evidence that this vulnerability has been exploited maliciously.

Continue reading “New Bluetooth Vulnerability: Hackers Could Spy on You” »

Page 26 of 58First2324252627282930Last