Blog

Archive for the ‘security’ category: Page 46

Nov 11, 2022

Watch a virus in the moments right before it attacks

Posted by in categories: biotech/medical, security

When Courtney “CJ” Johnson pulls up footage from her Ph.D. dissertation, it’s like she’s watching an attempted break-in on a home security camera.

The intruder cases its target without setting a foot inside, looking for a point of entry. But this intruder is not your typical burglar. It’s a virus.

Continue reading “Watch a virus in the moments right before it attacks” »

Nov 9, 2022

Cryptography’s Future Will Be Quantum-Safe. Here’s How It Will Work

Posted by in categories: computing, encryption, mathematics, quantum physics, security, space

In 1994, the computer scientist Peter Shor discovered that if quantum computers were ever invented, they would decimate much of the infrastructure used to protect information shared online. That frightening possibility has had researchers scrambling to produce new, “post-quantum” encryption schemes, to save as much information as they could from falling into the hands of quantum hackers.

Earlier this year, the National Institute of Standards and Technology revealed four finalists in its search for a post-quantum cryptography standard. Three of them use “lattice cryptography” — a scheme inspired by lattices, regular arrangements of dots in space.

Lattice cryptography and other post-quantum possibilities differ from current standards in crucial ways. But they all rely on mathematical asymmetry. The security of many current cryptography systems is based on multiplication and factoring: Any computer can quickly multiply two numbers, but it could take centuries to factor a cryptographically large number into its prime constituents. That asymmetry makes secrets easy to encode but hard to decode.

Nov 9, 2022

Paving the Way for Satellite Quantum Communications

Posted by in categories: computing, encryption, quantum physics, satellites, security

A series of demonstrations by Micius—a low-orbit satellite with quantum capabilities—lays the groundwork for a satellite-based quantum communication network.

Few things have captured the scientific imagination quite like the vastness of space and the promise of quantum technology. Micius—the Chinese Academy of Science’s quantum communications satellite launched in 2016—has connected these two inspiring domains, producing a string of exciting first demonstrations in quantum space communications. Reviewing the efforts leading up to the satellite launch and the major outcomes of the mission, Jian-Wei Pan and colleagues at the University of Science and Technology of China provide a perspective on what the future of quantum space communications may look like [1]. The success of this quantum-satellite mission proves the viability of several space-based quantum communications protocols, providing a solid foundation for future improvements that may lead to an Earth-spanning quantum communications network (Fig. 1).

Photons, the quanta of light, are wonderful carriers of quantum information because they are easy to manipulate and travel extremely fast. They can be created in a desired quantum state or as the output of some quantum sensor or quantum computer. Quantum entanglement between multiple photons—the nonclassical correlation between their quantum states—can be amazingly useful in quantum communications protocols such as quantum key distribution (QKD), a cryptography approach that can theoretically guarantee absolute information security. QKD schemes have been demonstrated on distances of a few hundreds of kilometers—sufficient to cover communications networks between cities. But increasing their range, eventually to the global scale, is a formidable challenge.

Nov 8, 2022

Quantum materials enable next-generation photonics and mobile networks in the terahertz regime

Posted by in categories: quantum physics, security

Terahertz light, radiation in the far-infrared part of the emission spectrum, is currently not fully exploited in technology, although it shows great potential for many applications in sensing, homeland security screening, and future (sixth generation) mobile networks.

Indeed, this radiation is harmless due to its small photon energy, but it can penetrate many materials (such as skin, packaging, etc.). In the last decade, a number of research groups have focused their attention on identifying techniques and materials to efficiently generate THz electromagnetic waves: among them is the wonder material graphene, which, however, does not provide the desired results. In particular, the generated terahertz output power is limited.

Better performance has now been achieved by topological insulators (TIs)—quantum materials that behave as insulators in the bulk while exhibiting conductive properties on the surface—according to a paper recently published in Light: Science & Applications.

Nov 7, 2022

Quantum Cryptography Is Unbreakable. So Is Human Ingenuity

Posted by in categories: business, computing, encryption, government, internet, mathematics, privacy, quantum physics, security

face_with_colon_three circa 2016.


Two basic types of encryption schemes are used on the internet today. One, known as symmetric-key cryptography, follows the same pattern that people have been using to send secret messages for thousands of years. If Alice wants to send Bob a secret message, they start by getting together somewhere they can’t be overheard and agree on a secret key; later, when they are separated, they can use this key to send messages that Eve the eavesdropper can’t understand even if she overhears them. This is the sort of encryption used when you set up an online account with your neighborhood bank; you and your bank already know private information about each other, and use that information to set up a secret password to protect your messages.

The second scheme is called public-key cryptography, and it was invented only in the 1970s. As the name suggests, these are systems where Alice and Bob agree on their key, or part of it, by exchanging only public information. This is incredibly useful in modern electronic commerce: if you want to send your credit card number safely over the internet to Amazon, for instance, you don’t want to have to drive to their headquarters to have a secret meeting first. Public-key systems rely on the fact that some mathematical processes seem to be easy to do, but difficult to undo. For example, for Alice to take two large whole numbers and multiply them is relatively easy; for Eve to take the result and recover the original numbers seems much harder.

Continue reading “Quantum Cryptography Is Unbreakable. So Is Human Ingenuity” »

Nov 7, 2022

New camera system taps into terahertz wavelengths for better imaging

Posted by in categories: materials, security

A team of engineers has developed a new type of camera that can detect radiation in terahertz (THz) wavelengths. This new imaging system can see through certain materials in high detail, which could make it useful for security scanners and other sensors.

Terahertz radiation is that which has wavelengths between microwaves and visible light, and these frequencies show promise in a new class of imaging systems. They can penetrate many materials and capture new levels of detail, and importantly the radiation is non-ionizing, meaning it’s safer than X-rays when used on humans.

The problem is that detectors that pick up THz wavelengths can be bulky, slow, expensive, difficult to run under practical conditions, or some combination of these. But in a new study, researchers at MIT, Samsung and the University of Minnesota have developed a system that can detect THz pulses quickly, precisely and at regular room temperature and pressure.

Nov 7, 2022

A startup building software to encrypt messaging tools such as Slack just raised $11 million from Molten Ventures. Check out the 17-slide pitch deck Worldr used to secure the round

Posted by in categories: encryption, security

The company gives its customers full control over their data and claims to increase security, with a focus on compliance and auditing.

Nov 5, 2022

Chinese scientists turn a simple wire into laser-like light

Posted by in categories: mobile phones, security

The invention could enhance the speed of electronic devices and improve security screening technology.

Chinese scientists have conceived of a new method for generating laser-like light that could significantly enhance the communication speed of everyday electronics, according to a report by the South China Morning Post.

The new device that makes this light possible is known as a free-electron laser, and it has been developed by scientists from the Shanghai Institute of Optics and Fine Mechanics under the Chinese Academy of Sciences.

Continue reading “Chinese scientists turn a simple wire into laser-like light” »

Nov 3, 2022

Researchers discover security loophole allowing attackers to use Wi-Fi to see through walls

Posted by in categories: drones, internet, security

A research team based out of the University of Waterloo has developed a drone-powered device that can use Wi-Fi networks to see through walls.

The , nicknamed Wi-Peep, can fly near a building and then use the inhabitants’ Wi-Fi network to identify and locate all Wi-Fi-enabled devices inside in a matter of seconds.

The Wi-Peep exploits a loophole the researchers call polite Wi-Fi. Even if a network is password protected, will automatically respond to contact attempts from any device within range. The Wi-Peep sends several messages to a device as it flies and then measures the response time on each, enabling it to identify the device’s location to within a meter.

Nov 3, 2022

Malicious Android apps with 1M+ installs found on Google Play

Posted by in categories: mobile phones, security

A set of four malicious applications currently available in Google Play, the official store for the Android system, are directing users sites that steal sensitive information or generate ‘pay-per-click’ revenue for the operators.

Some of these sites offer victims to download fake security tools or updates, to trick users into installing the malicious files manually.

At the time of publishing, the apps are still present on Google Play under a developer account called Mobile apps Group, and have a total install count of more than one million.

Page 46 of 146First4344454647484950Last