| New quantum encryption method foils hackers Apr 2nd 2012, 13:43 Scientists have found a new quantum encryption method to foil even the most sophisticated hackers. Researchers have come up with a simple solution to the untrusted device problem. Their method is called "Measurement Device Independent QKD." The aim is to detect subtle changes that occur when quantum data is manipulated by a third party. | | Who goes there? Verifying identity online Feb 17th 2012, 19:57 We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an identity-based network system is useful because it is relatively simple. However, there are three major drawbacks including loss of anonymity of communicating users, misplaced trust and identity theft. | | Genetics-inspired research prevents cyber attacks Feb 14th 2012, 17:17 Leveraging the concept of "survival of the fittest," researchers are fighting the continual evolution of computer viruses, worms and malware with evolution by developing the first-ever automated computer configurations that adjust as quickly as the threats. | | Risk-based passenger screening could make air travel safer Jan 31st 2012, 18:57 Intensive screening of all airline passengers actually makes the system less secure by overtaxing security resources, while risk-based methods increase overall security, according to new research. The researchers developed three algorithms dealing with risk uncertainty in the passenger population. Then, they ran simulations to demonstrate how their algorithms could estimate risk in the overall passenger population and how errors in this estimation procedure can be mitigated to reduce the risk to the overall system. | | Consumers should be vigilant in wake of Zappos cyberattack Jan 18th 2012, 17:26 As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised, an expert is warning those affected to be on the lookout for targeted fraud attempts. | |