New Quantum Approach for Sharing Secrets Sets a Record With 11 Dimensions
Wits Researchers have demonstrated a new quantum approach for sharing a secret amongst many parties, setting a new record for the highest dimensions and parties…
Wits Researchers have demonstrated a new quantum approach for sharing a secret amongst many parties, setting a new record for the highest dimensions and parties…
A research team led by Princeton University has developed a technique for tracking online foreign misinformation campaigns in real-time, which could help mitigate outside interference…
This method exposes fake images created by computer algorithms rather than by humans. They look deceptively real, but they are made by computers: so-called deep-fake…
An international study has used data from a major home Internet Protocol (IP) security camera provider to evaluate potential privacy risks for users. IP home…
Chaos could help put cyberhackers out of business with a patterned silicon chip that will be uncrackable even in the future. Confidential data—including credit card…
Researchers from University of Pennsylvania published a new paper in the Journal of Marketing that explains that the device people use to communicate can affect the extent…
Quantum computers that are exponentially faster than any of our current classical computers and are capable of code-breaking applications could be available in 12 to…
To deter attempts to disable U.S. electrical utilities and to defend U.S. nuclear weapon systems from evolving technological threats, Sandia National Laboratories has begun two…
Researchers use ultrasound waves vibrating through tables to access cellphones. Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone…
Does the common stereotype for “organized crime” hold up for organizations of hackers? Research from Michigan State University is one of the first to identify…
Researchers from Ben-Gurion University of the Negev’s (BGU) Cyber Security Research Center have found that they can cause the autopilot on an autonomous vehicle to…
Tiny, battery-free ID chip can authenticate nearly any product to help protect the supply chain. To combat supply chain counterfeiting, which can cost companies billions…
Mobile voting application could allow hackers to alter individual votes and may pose privacy issues for users. In recent years, there has been a growing…
Optical end-to-end solution includes encryption, transmission, decryption, and detection. BGN Technologies, the technology-transfer company of Ben-Gurion University of the Negev (BGU), Israel, is introducing the…
Password meters are frequently made available to help users secure their personal data against the threats posed by cybercriminals. However, the ‘inconsistent and misleading’ advice…
The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself….
Researchers at Nanyang Technological University, Singapore (NTU Singapore) have developed a quantum communication chip that is 1,000 times smaller than current quantum setups, but offers…