| Beating the dark side of quantum computing Nov 16th 2012, 13:56 A future quantum computer will be able to carry out calculations billions of times faster than even today's most powerful machines by exploit the fact that the tiniest particles, molecules, atoms and subatomic particles can exist in more than one state simultaneously. Scientists and engineers are looking forward to working with such high-power machines but so too are cyber-criminals who will be able to exploit this power in cracking passwords and decrypting secret messages much faster than they can now. | | Beating the dark side of quantum computing Nov 16th 2012, 13:56 A future quantum computer will be able to carry out calculations billions of times faster than even today's most powerful machines by exploit the fact that the tiniest particles, molecules, atoms and subatomic particles can exist in more than one state simultaneously. Scientists and engineers are looking forward to working with such high-power machines but so too are cyber-criminals who will be able to exploit this power in cracking passwords and decrypting secret messages much faster than they can now. | | Georgia Tech Releases Cyber Threats Forecast for 2013 Nov 14th 2012, 16:31 The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources. Those were the findings released by the Georgia Tech Emerging Cyber Threats Report for 2013. | | The perfect clone: Researchers hack RFID smartcards Nov 3rd 2011, 12:13 Professional safecrackers use a stethoscope to find the correct combination by listening to the clicks of the lock. Researchers have now demonstrated how to bypass the security mechanisms of a widely used contactless smartcard in a similar way. Employing so-called "Side-Channel Analysis" the researchers can break the cryptography of millions of cards that are used all around the world. | | Using photons to manage data Oct 27th 2011, 20:31 Managing light to carry computer data, such as text, audio and video, is possible today with laser light beams that are guided along a fiber-optic cable. These waves consist of countless billions of photons, which carry information down the fiber across continents. A research team wants to refine the optical transmission of information by using a single photon, the fundamental building block of light that can allow unprecedented applications in optical information transfer. | | Internet security: Researchers break W3C standard Oct 19th 2011, 14:49 Standards are supposed to guarantee security, especially in the WWW. The World Wide Web Consortium (W3C) is the main force behind standards like HTML, XML, and XML Encryption. But implementing a W3C standard does not mean that a system is secure. Researchers from the chair of network and data security have found a serious attack against XML Encryption. "Everything is insecure", is the uncomfortable message from the researchers. | | The future of airport passport control Oct 14th 2011, 14:44 Digital security specialists, major European electronics makers, and experts in biometrics worked together to make passport control at airports faster. The technology also could have broader applications on the way our identity documents are design and on the way we access public services. | | Cyber threats forecast for 2012 released Oct 11th 2011, 17:20 The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy, according to computer security experts. | | Secure updates for navigation systems Oct 5th 2011, 15:02 At the push of a button by the driver, control units download the car manufacturer's new software -- such as enhanced map material for the navigation system. To ensure that this data channel is protected from hacker attack, the system needs the right cryptographic key. To date, these keys have been stored in each one of a vehicle's electronic control units. Thanks to a new form of trust anchor, this will be simpler and more economical in the future. | | Cyber security report identifies key research priorities Sep 13th 2011, 14:32 Developing self-learning, self aware cyber security technologies, protecting smart utility grids and enhancing the security of mobile networks are among the top research priorities needed to safeguard the internet of tomorrow, according to a new report. | | Physicists demonstrate quantum integrated circuit that implements quantum von Neumann architecture Sep 1st 2011, 19:52 A new paradigm in quantum information processing has been demonstrated. Physicists have developed a quantum integrated circuit that implements the quantum von Neumann architecture. In this architecture, a long-lived quantum random access memory can be programmed using a quantum central processing unit, all constructed on a single chip, providing the key components for a quantum version of a classical computer. | | Simple security for wireless Aug 22nd 2011, 15:17 Researchers have demonstrated the first wireless security scheme that can protect against "man-in-the-middle" attacks -- but doesn't require a password. | | First flaws in the Advanced Encryption Standard used for internet banking identified Aug 17th 2011, 11:54 Researchers have found a weakness in the AES algorithm used worldwide to protect internet banking, wireless communications, and data on hard disks. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. However the attack has no practical implications on the security of user data due to various complexities. | |