Blog

Archive for the ‘encryption’ category: Page 50

Jun 27, 2016

New, better way to build circuits for world’s first useful quantum computers

Posted by in categories: computing, encryption, quantum physics, security

We’re on a roll with QC.


The era of quantum computers is one step closer as a result of research published in the current issue of the journal Science. The research team has devised and demonstrated a new way to pack a lot more quantum computing power into a much smaller space and with much greater control than ever before. The research advance, using a 3-dimensional array of atoms in quantum states called quantum bits—or qubits—was made by David S. Weiss, professor of physics at Penn State University, and three students on his lab team. He said “Our result is one of the many important developments that still are needed on the way to achieving quantum computers that will be useful for doing computations that are impossible to do today, with applications in cryptography for electronic data security and other computing-intensive fields.”

The new technique uses both laser light and microwaves to precisely control the switching of selected individual qubits from one quantum state to another without altering the states of the other atoms in the cubic array. The new technique demonstrates the potential use of atoms as the building blocks of circuits in future quantum computers.

Continue reading “New, better way to build circuits for world’s first useful quantum computers” »

Jun 15, 2016

Google and NSA Competing to Build World’s Most Powerful Quantum Computer

Posted by in categories: computing, encryption, privacy, quantum physics, robotics/AI

Over the next 3 to 5 years you will see more and more in tech (medical/ bio, chip/ semiconductors, software, AI, services, platform, etc.) adopting QC in their nextgen products and services. We’re (as in Vern B. — D-Wave co-founder and CEO terms) in the Era of Quantum Computing. I highly urge techies to learn about QC so that you remain relevant.


Google is being driven by need to prevent the NSA from breaking into its system to access confidential personal data of its millions of users. On the other hand, the NSA is bent on cracking the tough encryption systems Google and other tech firms use to shield their information from them. Quantum computers will attain this aim for both Google and the NSA.

Google recently said it’s gotten closer to building a universal quantum computer. A team of Google researchers in California and Spain has built an experimental prototype of a quantum computer that can solve a wide range of problems and has the potential to be scaled up to larger systems.

Continue reading “Google and NSA Competing to Build World’s Most Powerful Quantum Computer” »

Jun 14, 2016

Quantum Computation: A cryptography armageddon?

Posted by in categories: computing, encryption, quantum physics

Glad that folks have awaken to the fact that QC is indeed coming and best to learn about this technology and make it part of the IT’s Future State.

http://www.welivesecurity.com/2016/06/14/quantum-computation

Cryptography-armageddon/

Continue reading “Quantum Computation: A cryptography armageddon?” »

Jun 5, 2016

Quantum weirdness survives space travel

Posted by in categories: encryption, quantum physics, satellites

In a feat that demonstrates the feasibility of using satellites to transmit uncrackable quantum messages, scientists have measured the quantum properties of photons sent to space and back again.

Physicists beamed the blips of light up to a satellite that reflected them back to Earth. Upon the photons’ return, the team, led by Paolo Villoresi of the University of Padua in Italy, observed a property known as quantum interference. That confirmed that the particles’ quantum traits remained intact over the 5,000-kilometer space voyage. The team reports the advance in a paper to be published in Physical Review Letters.

The technique could one day lead to quantum cryptography by satellite, allowing users to send snoop-proof encryption keys for encoding secret information. It’s important for the sake of secure communication and advancement of physics,” says Villoresi. But that’s not the only reason he took on the challenge. “I can more honestly say that it’s cool.”

Continue reading “Quantum weirdness survives space travel” »

May 26, 2016

China may send the first unhackable messages with quantum encryption

Posted by in categories: cybercrime/malcode, encryption, quantum physics, satellites

I sure hope US, Canada, UK, etc. are already for a Quantum Net China.


China is set to become the first nation in the world to launch a quantum communications satellite, which might make its data hacker-proof.

Read more

May 22, 2016

Ransomware: the digital plague infecting the world

Posted by in categories: bitcoin, cybercrime/malcode, economics, encryption

“The individuals who do these types of attacks are well aware of the pressure points and pain points, economic-wise,” says Dr. John Hale, a cybersecurity expert at the University of Tulsa. “They know what they can extract, how much they can extract.

“They prey upon two things: an organization’s reliance on information systems and two, the common situation, where an organization is a little bit behind on backup procedures and policies to prevent these types of things. It really is easy pickings for the bad guys.”

Crypto ransomware is designed to encrypt data stored on the computer, making the data useless unless the user obtains the key to decrypt it. A message details the ransom, which is typically paid in digital currencies such as bitcoin. Locker ransomware locks the computer or device’s interface — save for the ability to interact with the hacker — and demands money to restore it.

Continue reading “Ransomware: the digital plague infecting the world” »

May 18, 2016

How Blockchain Will End World Poverty

Posted by in categories: bitcoin, cryptocurrencies, economics, encryption, geopolitics, law, transparency

Steve Forbes sits across Brian Singer, a partner at William Blair, as Blair explains the potential of blockhain encryption to empower individuals. He also explains why credit card companies are beginning to embrace a technology that undermines their high fees.

https://youtu.be/CecpCepnkAU

Singer-Forbes

May 18, 2016

Chief Scientist at Security Innovation Presents on Quantum Safety at Fourth International Cryptographic Module Conference

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

I am glad that D. Whyte recognizes “If quantum computers are developed faster than anticipated, certification would mandate insecure modules, given the time to approve and implement new quantum resistant algorithms. Worse, it is conceivable that data encrypted by a certified module is more vulnerable than data encrypted by a non-certified module that has the option of using a quantum-safe encryption algorithm.”

Because many of us who are researching and developing in this space have seen the development pace accelerated this year and what was looking like we’re 10 years away is now looking like we’re less than 7 years.


Dr. William Whyte, Chief Scientist for Security Innovation, a cybersecurity provider and leader in the 2015 Gartner Magic Quadrant for Security Awareness Training, will be presenting at the Fourth International Cryptographic Module Conference in Ottawa, Ontario.

Read more

May 18, 2016

A hacker is reportedly selling the stolen emails and passwords of 117 million LinkedIn users

Posted by in categories: bitcoin, cybercrime/malcode, encryption, humor, internet

Privacy is practically a joke anymore.


A hacker known as “Peace” is selling what is reportedly account information from 117 million LinkedIn users. The stolen data is said to include email addresses and passwords, which a malicious party could use to gain access to other websites and accounts for which people used the same password.

LinkedIn says it has about 433 million members worldwide, so this data could represent 27% of its user base.

Continue reading “A hacker is reportedly selling the stolen emails and passwords of 117 million LinkedIn users” »

May 14, 2016

Nanotechnology To Make Holographic Applications More Secure And Efficient

Posted by in categories: biotech/medical, encryption, nanotechnology, security

Making Holographic Apps more secured and efficient.


Since its birth, holograms have been extensively used to serve security systems and related purposes. The making of a hologram, dissecting it to pieces and again rejoining the blocks involves a steady orientation of lenses which encodes the information with depth perception that could be deciphered later according to requirement.

It’s hard to imagine a 21st century city running smooth without an immense use of holograms, small or big sized 2D cards with 3D engraved pictures that are present in credit cards, grocery objects, books, biomedical devices and in other objects requiring retrievable information to be stored.

Continue reading “Nanotechnology To Make Holographic Applications More Secure And Efficient” »

Page 50 of 58First4748495051525354Last