Encryption News
July 4, 2015

Latest Headlines
updated 12:41am EDT

More Encryption News
July 4, 2015

July 2, 2015 — A researcher has created an easier email encryption method – one that sounds familiar to parents who try to outsmart their 8-year-old child. The new technique gets rid of the complicated, ... read more

Lack of Control on E-Coaches

June 23, 2015 — There is no guarantee that smart, personal coaching apps can live up to claims to make our lives more healthy and more productive. Users may receive incorrect, commercially slanted, or ineffective ... read more

Time to Move Beyond 'Medieval' Cyber Security Approach, Expert Says

May 21, 2015 — The nation's approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security ... read more

Online Safety: If You Want Something Done Right, Do It Yourself

May 20, 2015 — The end-user is often the 'weakest link' in the Internet safety chain according to experts. The team's conclusion: Internet users have to take personal responsibility for their safety ... read more

New Technology to Help Users Combat Mobile Malware Attacks

Mar. 26, 2015 — Researchers have developed simple but effective techniques to prevent sophisticated malware from secretly attacking ... read more

Simple Tasks Help Protect Your Credit

Mar. 23, 2015 — With mega data breaches coming from entities such as retail stores, insurance providers and restaurant chains, someone could more easily gain access to personal financial information that consumers ... read more

New Approach Uses 'Twisted Light' to Increase Efficiency of Quantum Cryptography Systems

Mar. 20, 2015 — Researchers have developed a way to transfer 2.05 bits per photon by using 'twisted light.' This remarkable achievement is possible because the researchers used the orbital angular momentum ... read more

Mobile Quarantine Station for Malicious Android Apps

Mar. 13, 2015 — The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store -- ones ... read more

Developers Neglect Privacy, Security in Health Apps

Mar. 12, 2015 — Telemedicine researchers have proposed a series of recommendations to programmers to improve the security of health applications on mobile devices. According to these specialists, it is a rapidly ... read more

Mar. 10, 2015 — Phishing scams are such a problem that some businesses are sending out fake phishing emails to employees. A professor says the scams work in part because it's harder to detect deception ... read more

Find out What Your Apps Are Really Doing

Mar. 10, 2015 — Apps, these tiny programs on Internet-connected mobile phones are increasingly becoming entryways for surveillance and fraud. Computer scientists have now developed a program that can show users ... read more

Security in a Smart World

Mar. 5, 2015 — More stable power grids and quicker accident care: When used properly, digital data may be of high benefit. However, electronic processing also facilitates data abuse. For this reason, scientists ... read more

Feb. 27, 2015 — Engineers have taken the ordinary QR code and transformed it into a high-end cybersecurity application that can protect the integrity of computer chips using advanced optical imaging and photon-based ... read more

Feb. 24, 2015 — Smartphones have replaced nearly every conceivable gadget, but computer scientists are teaching them some new tricks. The researchers are adapting accelerometers, GPS chips, gyroscopes and other ... read more

Social Network Analysis Privacy Tackled

Feb. 14, 2015 — Protecting people's privacy in an age of online big data is difficult, but doing so when using visual representations of such things as social network data may present unique challenges, ... read more

Feb. 13, 2015 — Communication security and metrology could be enhanced through a study of the role of quantum correlations in the distinguishability of physical processes, scientists ... read more

Feb. 2, 2015 — Production facilities and components of Industry 4.0 are linked to the Internet, networked with each other, and thus open to attack. Using an IT security laboratory, researchers offer a test ... read more

Stalking Versus Cyberstalking: Effects on Victims, Their Responses Compared

Jan. 23, 2015 — The devastating effects of stalking and cyberstalking – harassing or threatening communication via the Internet – are explored in a new study. Key among the findings is that victims of ... read more

Profitable Phishing Schemes Slyly Tinker With Our Heads, Then Rip Us Off

Jan. 22, 2015 — Researchers have found evidence that the incredible spread of email phishing scams may be due to phishers' increased use of "information-rich" emails that alter recipients' ... read more

Doing More With Less: Steering a Quantum Path to Improved Internet Security

Jan. 7, 2015 — New research may lead to greatly improved security of information transfer over the internet. Physicists have demonstrated the potential for 'quantum steering' to be used to enhance data ... read more

Thursday, July 2, 2015
Tuesday, June 23, 2015
Thursday, May 21, 2015
Wednesday, May 20, 2015
Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Monday, February 2, 2015
Friday, January 23, 2015
Thursday, January 22, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014
Tuesday, October 14, 2014
Tuesday, October 7, 2014
Monday, October 6, 2014
Monday, September 22, 2014
Monday, September 15, 2014
Wednesday, September 10, 2014
Tuesday, September 9, 2014
Friday, August 29, 2014
Thursday, August 21, 2014
Wednesday, August 20, 2014
Friday, August 1, 2014
Thursday, July 24, 2014
Wednesday, July 23, 2014
Thursday, July 10, 2014
Wednesday, July 9, 2014
Tuesday, June 24, 2014
Thursday, June 19, 2014
Friday, June 13, 2014
Wednesday, June 4, 2014
Monday, June 2, 2014
Friday, May 30, 2014
Wednesday, May 21, 2014
Monday, May 12, 2014
Tuesday, April 29, 2014
Thursday, April 24, 2014
Tuesday, April 15, 2014
Monday, April 14, 2014
Thursday, April 3, 2014
Thursday, March 27, 2014
Wednesday, March 26, 2014
Thursday, March 20, 2014
Wednesday, March 19, 2014
Wednesday, March 12, 2014
Tuesday, March 11, 2014
Friday, March 7, 2014
Thursday, March 6, 2014
Wednesday, March 5, 2014
Friday, February 28, 2014
Tuesday, February 25, 2014
Tuesday, February 4, 2014
Friday, January 31, 2014
Thursday, January 30, 2014
Wednesday, January 22, 2014
Wednesday, January 15, 2014
Monday, December 16, 2013
Sunday, December 8, 2013
Wednesday, December 4, 2013
Monday, November 25, 2013
Tuesday, November 19, 2013
Thursday, November 14, 2013
Thursday, November 7, 2013
Wednesday, November 6, 2013
Monday, November 4, 2013
Friday, October 11, 2013
Wednesday, September 11, 2013
Monday, September 9, 2013
Wednesday, September 4, 2013
Wednesday, August 21, 2013
Thursday, August 15, 2013