New! Sign up for our free email newsletter.

Encryption News

April 16, 2024

Top Headlines

 

The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises to unlock the transformative potential of ...
A new molecular test method helps to prove the authenticity of works of art. The new method could also help to make passwords secure against quantum ...
Researchers have taken a big step towards securing information against hacking. They have succeeded in using quantum encryption to securely transfer information 100 kilometers via fiber optic cable -- roughly equivalent to the distance between ...
The traveling salesman problem is considered a prime example of a combinatorial optimization problem. Now a team has shown that a certain class of such problems can actually be solved better and much faster with quantum computers than with ...

Latest Headlines

updated 2:50pm EDT

Earlier Headlines

 

Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential ...

Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new ...

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information ...

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six ...

Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one ...

In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode ...

In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as ...

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or ...

With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's ...

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data ...

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that ...

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could ...

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can ...

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated ...

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...

Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption ...

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the ...

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called ...

A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum ...

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of ...

Monday, July 10, 2023

Wednesday, July 5, 2023

Wednesday, June 28, 2023

Tuesday, June 27, 2023

Tuesday, March 7, 2023

Monday, February 13, 2023

Thursday, January 26, 2023

Monday, December 12, 2022

Monday, November 21, 2022

Wednesday, November 9, 2022

Friday, September 2, 2022

Monday, August 29, 2022

Monday, August 15, 2022

Wednesday, July 27, 2022

Wednesday, July 20, 2022

Wednesday, June 8, 2022

Wednesday, May 25, 2022

Tuesday, May 24, 2022

Thursday, May 5, 2022

Thursday, April 28, 2022

Tuesday, April 5, 2022

Thursday, March 31, 2022

Wednesday, March 23, 2022

Tuesday, March 22, 2022

Monday, March 21, 2022

Tuesday, March 1, 2022

Friday, February 25, 2022

Tuesday, February 1, 2022

Tuesday, January 25, 2022

Tuesday, December 21, 2021

Friday, December 10, 2021

Tuesday, November 23, 2021

Tuesday, November 16, 2021

Thursday, November 4, 2021

Thursday, October 21, 2021

Friday, October 15, 2021

Tuesday, August 31, 2021

Monday, August 23, 2021

Thursday, August 12, 2021

Wednesday, August 11, 2021

Friday, June 18, 2021

Thursday, June 10, 2021

Wednesday, June 9, 2021

Monday, May 10, 2021

Wednesday, May 5, 2021

Tuesday, May 4, 2021

Friday, April 30, 2021

Monday, April 19, 2021