Internet security: Researchers break W3C standard Oct 19th 2011, 14:49 Standards are supposed to guarantee security, especially in the WWW. The World Wide Web Consortium (W3C) is the main force behind standards like HTML, XML, and XML Encryption. But implementing a W3C standard does not mean that a system is secure. Researchers from the chair of network and data security have found a serious attack against XML Encryption. "Everything is insecure", is the uncomfortable message from the researchers. | The future of airport passport control Oct 14th 2011, 14:44 Digital security specialists, major European electronics makers, and experts in biometrics worked together to make passport control at airports faster. The technology also could have broader applications on the way our identity documents are design and on the way we access public services. | Cyber threats forecast for 2012 released Oct 11th 2011, 17:20 The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy, according to computer security experts. | Secure updates for navigation systems Oct 5th 2011, 15:02 At the push of a button by the driver, control units download the car manufacturer's new software -- such as enhanced map material for the navigation system. To ensure that this data channel is protected from hacker attack, the system needs the right cryptographic key. To date, these keys have been stored in each one of a vehicle's electronic control units. Thanks to a new form of trust anchor, this will be simpler and more economical in the future. | Physicists move one step closer to quantum computer Oct 4th 2011, 16:36 Physicists have created a tiny "electron superhighway" that could one day be useful for building a quantum computer -- a new type of computer that will use quantum particles in place of the digital transistors found in today's microchips. Researchers now describe how to make a "topological insulator," a much-sought device that could help physicists create elusive pairs of quantum particles that are particularly useful for storing information. | Cyber security report identifies key research priorities Sep 13th 2011, 14:32 Developing self-learning, self aware cyber security technologies, protecting smart utility grids and enhancing the security of mobile networks are among the top research priorities needed to safeguard the internet of tomorrow, according to a new report. | Physicists demonstrate quantum integrated circuit that implements quantum von Neumann architecture Sep 1st 2011, 19:52 A new paradigm in quantum information processing has been demonstrated. Physicists have developed a quantum integrated circuit that implements the quantum von Neumann architecture. In this architecture, a long-lived quantum random access memory can be programmed using a quantum central processing unit, all constructed on a single chip, providing the key components for a quantum version of a classical computer. | To clear digital waste in computers, 'think green,' researchers say Sep 1st 2011, 17:51 A digital dumping ground lies inside most computers, a wasteland where old, rarely used and unneeded files pile up. Such data can deplete precious storage space, bog down the system's efficiency and sap its energy. Computer scientists now propose adapting a real-world approach to the cleanup effort. | Simple security for wireless Aug 22nd 2011, 15:17 Researchers have demonstrated the first wireless security scheme that can protect against "man-in-the-middle" attacks -- but doesn't require a password. | First flaws in the Advanced Encryption Standard used for internet banking identified Aug 17th 2011, 11:54 Researchers have found a weakness in the AES algorithm used worldwide to protect internet banking, wireless communications, and data on hard disks. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. However the attack has no practical implications on the security of user data due to various complexities. | |