Menu

Blog

Archive for the ‘encryption’ category: Page 34

Aug 25, 2019

Researchers Demonstrate The World’s First Quantum Radar

Posted by in categories: computing, encryption, quantum physics

Yes, we know that sometimes it feels like they just tack the word quantum on new technology and call it a day like we are all living in the Marvel Cinematic Universe. Nevertheless, quantum technology is very real and is just as exciting. Our better understanding of the quantum world and handle on the principals will help us improve everything from computing to encryption.

Aug 23, 2019

Quantum radar has been demonstrated for the first time

Posted by in categories: computing, encryption, quantum physics

One of the advantages of the quantum revolution is the ability to sense the world in a new way. The general idea is to use the special properties of quantum mechanics to make measurements or produce images that are otherwise impossible.

Much of this work is done with photons. But as far as the electromagnetic spectrum is concerned, the quantum revolution has been a little one-sided. Almost all the advances in quantum computing, cryptography, teleportation, and so on have involved visible or near-visible light.

Aug 21, 2019

Cambridge Quantum Random Key Generation and Encryption

Posted by in categories: computing, encryption, quantum physics, security

Cambridge Quantum Computing has a demo of its quantum key security generation at Ironbridgeapi.com.

Aug 21, 2019

These 4 Gmail alternatives put your privacy first

Posted by in category: encryption

If you don’t want your email provider, its partners, or even hackers skimming your messages, choose one of these providers, which offer end-to-end encryption and other measures.

[Photo: courtesy of Tutanota].

Aug 18, 2019

How will quantum computing change the world? | The Economist

Posted by in categories: computing, encryption, quantum physics

The potential for quantum computing to crack other countries’ encrypted networks has captured the attention of national governments. Which of the world’s fundamental challenges could be solved by quantum computing?

Click here to subscribe to The Economist on YouTube: https://econ.st/2xvTKdy

Continue reading “How will quantum computing change the world? | The Economist” »

Aug 1, 2019

New SystemBC Malware Uses Your PC to Hide Malicious Traffic

Posted by in categories: cybercrime/malcode, encryption

A new malware strain is being distributed by threat actors via exploit kits like Fallout and RIG to hide malicious network traffic with the help of SOCKS5 proxies set up on compromised computers.

The malware, provisionally named SystemBC by the Proofpoint Threat Insight Team researchers who found it, uses secure HTTP connections to encrypt the information sent to command-and-control servers by other strains dropped on the infected machines.

“SystemBC is written in C++ and primarily sets up SOCKS5 proxies on victim computers that can then be used by threat actors to tunnel/hide the malicious traffic associated with other malware,” says Proofpoint.

Jul 30, 2019

New Android Ransomware Uses SMS Spam to Infect Its Victims

Posted by in categories: cybercrime/malcode, encryption, robotics/AI

A new ransomware family targeting Android devices spreads to other victims by sending text messages containing malicious links to the entire contact list found on already infected targets.

The malware dubbed Android/Filecoder. C (FileCoder) by the ESET research team which discovered it is currently targeting devices running Android 5.1 or later.

“Due to narrow targeting and flaws in both execution of the campaign and implementation of its encryption, the impact of this new ransomware is limited,” ESET’s researchers found.

Jul 21, 2019

What is post-quantum cryptography?

Posted by in categories: computing, encryption, quantum physics

The race is on to create new ways to protect data and communications from the threat posed by super-powerful quantum computers.

Jul 21, 2019

How an authoritarian regime will intercept all internet traffic inside its country

Posted by in categories: encryption, government, internet, security, surveillance

How dictators work in the 21st century.


The new president of Kazakhstan is now proving that he will keep the old, oppressive systems alive for the 21st century, using advanced technical tools.

The man in the middle: Beginning last week, Kazakhstan’s government is intercepting all HTTPS traffic inside the country, ZDNet reports. HTTPS is a protocol meant to offer encryption, security, and privacy to users, but now the nation’s internet service providers are forcing all users to install certificates that enable pervasive interception and surveillance.

Continue reading “How an authoritarian regime will intercept all internet traffic inside its country” »

Jul 6, 2019

Researchers use kirigami to spin terahertz rays

Posted by in categories: biotech/medical, encryption

CHICAGO, July 2 (Xinhua) — With a light-spinning device inspired by the Japanese art of paper cutting, researchers at the University of Michigan (UM) have detected microscopic twists in the internal structure of plant and animal tissue without harmful X-rays.

The approach is the first that can fully rotate terahertz radiation in real time, and could open new dimensions in medical imaging, encrypted communications and cosmology, according to a news release posted on UM’s website on Monday.

With an eye to exploring how chirality may help distinguish tissues, the researchers gathered everyday biological materials to look for differences in the absorption of clockwise- or counter-clockwise-rotating radiation in the terahertz spectrum. They studied a maple leaf, a dandelion flower, pork fat and the wing case of an iridescent beetle.

Page 34 of 58First3132333435363738Last