iServe New Mexico Non Profits and Charities Web Content and Scripts, get your free domain, 24/7 customer service and affordability with a NM web hosting professional.
Southwest Website Templates

Friday, November 16, 2012

Your Daily digest for Server, ISP and Host News Service

Server, ISP and Host News Service
Simply Sly`s Server Services News and Information Outlet Feed Pipe
Beating the dark side of quantum computing
Nov 16th 2012, 13:56

A future quantum computer will be able to carry out calculations billions of times faster than even today's most powerful machines by exploit the fact that the tiniest particles, molecules, atoms and subatomic particles can exist in more than one state simultaneously. Scientists and engineers are looking forward to working with such high-power machines but so too are cyber-criminals who will be able to exploit this power in cracking passwords and decrypting secret messages much faster than they can now.

Beating the dark side of quantum computing
Nov 16th 2012, 13:56

A future quantum computer will be able to carry out calculations billions of times faster than even today's most powerful machines by exploit the fact that the tiniest particles, molecules, atoms and subatomic particles can exist in more than one state simultaneously. Scientists and engineers are looking forward to working with such high-power machines but so too are cyber-criminals who will be able to exploit this power in cracking passwords and decrypting secret messages much faster than they can now.

Georgia Tech Releases Cyber Threats Forecast for 2013
Nov 14th 2012, 16:31

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources. Those were the findings released by the Georgia Tech Emerging Cyber Threats Report for 2013.

The perfect clone: Researchers hack RFID smartcards
Nov 3rd 2011, 12:13

Professional safecrackers use a stethoscope to find the correct combination by listening to the clicks of the lock. Researchers have now demonstrated how to bypass the security mechanisms of a widely used contactless smartcard in a similar way. Employing so-called "Side-Channel Analysis" the researchers can break the cryptography of millions of cards that are used all around the world.

Using photons to manage data
Oct 27th 2011, 20:31

Managing light to carry computer data, such as text, audio and video, is possible today with laser light beams that are guided along a fiber-optic cable. These waves consist of countless billions of photons, which carry information down the fiber across continents. A research team wants to refine the optical transmission of information by using a single photon, the fundamental building block of light that can allow unprecedented applications in optical information transfer.

Internet security: Researchers break W3C standard
Oct 19th 2011, 14:49

Standards are supposed to guarantee security, especially in the WWW. The World Wide Web Consortium (W3C) is the main force behind standards like HTML, XML, and XML Encryption. But implementing a W3C standard does not mean that a system is secure. Researchers from the chair of network and data security have found a serious attack against XML Encryption. "Everything is insecure", is the uncomfortable message from the researchers.

iPhone turned into spiPhone: Smartphone senses nearby keyboard vibrations and deciphers sentences
Oct 18th 2011, 17:13

Engineers have discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent accuracy.

The future of airport passport control
Oct 14th 2011, 14:44

Digital security specialists, major European electronics makers, and experts in biometrics worked together to make passport control at airports faster. The technology also could have broader applications on the way our identity documents are design and on the way we access public services.

Professor uncovers potential issues with apps built for Android systems
Oct 13th 2011, 20:29

Experts are concerned with potential issues with mobile applications (commonly referred to as apps) written for the Android system using the WebView platform.

Cyber threats forecast for 2012 released
Oct 11th 2011, 17:20

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy, according to computer security experts.

Smart phones: Keeping business data secure while allowing installation of personal apps
Oct 7th 2011, 14:32

More and more companies are providing their employees with smartphones. While companies seek the best security available for their data, employees would also like to install apps of their own. Security experts have now developed equipment software with two separate areas: the business area and the personal area.

Secure updates for navigation systems
Oct 5th 2011, 15:02

At the push of a button by the driver, control units download the car manufacturer's new software -- such as enhanced map material for the navigation system. To ensure that this data channel is protected from hacker attack, the system needs the right cryptographic key. To date, these keys have been stored in each one of a vehicle's electronic control units. Thanks to a new form of trust anchor, this will be simpler and more economical in the future.

Cyber security report identifies key research priorities
Sep 13th 2011, 14:32

Developing self-learning, self aware cyber security technologies, protecting smart utility grids and enhancing the security of mobile networks are among the top research priorities needed to safeguard the internet of tomorrow, according to a new report.

Physicists demonstrate quantum integrated circuit that implements quantum von Neumann architecture
Sep 1st 2011, 19:52

A new paradigm in quantum information processing has been demonstrated. Physicists have developed a quantum integrated circuit that implements the quantum von Neumann architecture. In this architecture, a long-lived quantum random access memory can be programmed using a quantum central processing unit, all constructed on a single chip, providing the key components for a quantum version of a classical computer.

Simple security for wireless
Aug 22nd 2011, 15:17

Researchers have demonstrated the first wireless security scheme that can protect against "man-in-the-middle" attacks -- but doesn't require a password.

First flaws in the Advanced Encryption Standard used for internet banking identified
Aug 17th 2011, 11:54

Researchers have found a weakness in the AES algorithm used worldwide to protect internet banking, wireless communications, and data on hard disks. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. However the attack has no practical implications on the security of user data due to various complexities.

New anti-censorship scheme could make it impossible to block individual Web sites
Aug 10th 2011, 17:30

A radical new approach to thwarting Internet censorship would essentially turn the whole Web into a proxy server, making it virtually impossible for a censoring government to block individual Web sites.

Quantum computers? Physicists 'entangle' two atoms using microwaves for the first time
Aug 10th 2011, 17:28

Physicists have for the first time linked the quantum properties of two separated ions (electrically charged atoms) by manipulating them with microwaves instead of the usual laser beams.

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions