New! Sign up for our free email newsletter.

Encryption News

June 11, 2025

Top Headlines

 

New technology that uses light's color and spin to display multiple ...
Neuroscientists and materials scientists have created contact lenses that enable infrared vision in both humans and mice by converting infrared light into visible light. Unlike infrared night vision ...
Researchers developed a framework to enable decentralized artificial intelligence-based building automation with a focus on privacy. The system enables AI-powered devices like cameras and interfaces to cooperate directly, using a new form of ...
According to new research next-generation DNA sequencing (NGS) -- the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking, and gene research -- could become a prime target for ...
Researchers devised a way to maintain an AI model's accuracy while ensuring attackers can't extract sensitive information used to train it. The approach is computationally efficient, reducing a longstanding tradeoff between accuracy and ...
Researchers have successfully demonstrated the UK's first long-distance ultra-secure transfer of data over a quantum communications network, including the UK's first long-distance quantum-secured ...
Researchers have discovered a way to protect quantum information from environmental disruptions, offering hope for more reliable future ...
Scientists have successfully established the world's longest intercontinental ultra-secure quantum satellite link, spanning 12,900 km. Using the Chinese quantum microsatellite Jinan-1, launched into low Earth orbit, this milestone marks the ...
Working at nanoscale dimensions, billionths of a meter in size, a team of scientists revealed a new way to measure high-speed fluctuations in magnetic materials. Knowledge obtained by these new measurements could be used to advance technologies ...
Researchers developed a new optical system that uses holograms to encode information, creating a level of encryption that traditional methods cannot ...
The world of quantum physics is experiencing a second revolution, which will drive an exponential leap in the progress of computing, the internet, telecommunications, cybersecurity and biomedicine. Quantum technologies are attracting more and more ...
Various methods are used to correct errors in quantum computers. Not all operations can be implemented equally well with different correction codes. Therefore, a research team has developed a method and implemented it experimentally for the first ...

Latest Headlines

updated 9:18am EDT

Earlier Headlines

 

New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR ...

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors ...

A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones while protecting sensitive user data from two common types of attacks -- side-channel attacks and ...

Clear guidelines should be established for the generation and processing of synthetic data to ensure transparency, accountability and fairness, a new study ...

The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises ...

A new molecular test method helps to prove the authenticity of works of art. The new method could also help to make passwords secure against quantum ...

Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable ...

The traveling salesman problem is considered a prime example of a combinatorial optimization problem. Now a team has shown that a certain class of such problems can actually be solved better and much ...

Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To address this ...

Creating a quantum computer powerful enough to tackle problems we cannot solve with current computers remains a big challenge for quantum physicists. A well-functioning quantum simulator -- a ...

Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage ...

SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. ...

A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of ...

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe ...

With an innovative approach, scientists are creating new standards for data security in the cache of electronic ...

The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being ...

The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. ...

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and ...

Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential ...

Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new ...

Monday, May 6, 2024

Friday, April 26, 2024

Tuesday, April 23, 2024

Friday, April 12, 2024

Thursday, April 11, 2024

Monday, April 8, 2024

Tuesday, April 2, 2024

Monday, March 18, 2024

Wednesday, March 13, 2024

Thursday, February 15, 2024

Tuesday, November 14, 2023

Monday, October 30, 2023

Thursday, October 12, 2023

Monday, September 4, 2023

Wednesday, August 9, 2023

Monday, August 7, 2023

Tuesday, July 25, 2023

Monday, July 10, 2023

Wednesday, July 5, 2023

Wednesday, June 28, 2023

Tuesday, June 27, 2023

Tuesday, March 7, 2023

Monday, February 13, 2023

Thursday, January 26, 2023

Monday, December 12, 2022

Monday, November 21, 2022

Wednesday, November 9, 2022

Friday, September 2, 2022

Monday, August 29, 2022

Monday, August 15, 2022

Wednesday, July 27, 2022

Wednesday, July 20, 2022