Encryption News
September 5, 2015

Latest Headlines
updated 3:42am EDT

More Encryption News
September 5, 2015

Computers: Protecting Your Cloud

Aug. 12, 2015 — A powerful new computer security tool, called XDet, can detect malicious files being uploaded to a cloud computing service. The researchers have carried out successful tests on live data on a cloud ... read more

Cybersecurity Experts to Discuss Tricky Balance Between Data Sharing and Privacy

Aug. 4, 2015 — In its efforts to curb criminal activity, should the government be allowed to see confidential consumer data collected by businesses? Or does the right to privacy trump such intrusions? The conflict ... read more

Why Organizations Fight Data Breaches Differently

July 9, 2015 — In the wake of recent high-profile security breaches at retail stores such as Target and Neiman Marcus, a new study determines why differences exist in the level of information security control ... read more

July 2, 2015 — A researcher has created an easier email encryption method – one that sounds familiar to parents who try to outsmart their 8-year-old child. The new technique gets rid of the complicated, ... read more

Lack of Control on E-Coaches

June 23, 2015 — There is no guarantee that smart, personal coaching apps can live up to claims to make our lives more healthy and more productive. Users may receive incorrect, commercially slanted, or ineffective ... read more

Time to Move Beyond 'Medieval' Cyber Security Approach, Expert Says

May 21, 2015 — The nation's approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security ... read more

Online Safety: If You Want Something Done Right, Do It Yourself

May 20, 2015 — The end-user is often the 'weakest link' in the Internet safety chain according to experts. The team's conclusion: Internet users have to take personal responsibility for their safety ... read more

Apr. 22, 2015 — In a first-of-its-kind study, researchers tested brain activity to better understand employees who pose a risk to ... read more

Invisible Inks Could Help Foil Counterfeiters of All Kinds

Apr. 22, 2015 — Scientists have invented sophisticated fluorescent inks that one day could be used as multicolored barcodes for consumers to authenticate products often counterfeited. Snap a photo with your ... read more

Quantum Cryptography at the Speed of Light: Researchers Design First All-Photonic Repeaters

Apr. 15, 2015 — Engineers bring perfectly secure information exchanges one step to reality. They have now designed the first all-photonic quantum repeaters -- protocols that ensure data can be carried reliably and ... read more

Increase Seen in Data Breaches of Health Information

Apr. 14, 2015 — Between 2010 and 2013, data breaches of protected health information reported by HIPAA-covered entities increased and involved approximately 29 million records, with most data breaches resulting from ... read more

Apr. 8, 2015 — In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that ... read more

New Technology to Help Users Combat Mobile Malware Attacks

Mar. 26, 2015 — Researchers have developed simple but effective techniques to prevent sophisticated malware from secretly attacking ... read more

Mar. 26, 2015 — Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an ... read more

Simple Tasks Help Protect Your Credit

Mar. 23, 2015 — With mega data breaches coming from entities such as retail stores, insurance providers and restaurant chains, someone could more easily gain access to personal financial information that consumers ... read more

New Approach Uses 'Twisted Light' to Increase Efficiency of Quantum Cryptography Systems

Mar. 20, 2015 — Researchers have developed a way to transfer 2.05 bits per photon by using 'twisted light.' This remarkable achievement is possible because the researchers used the orbital angular momentum ... read more

Mobile Quarantine Station for Malicious Android Apps

Mar. 13, 2015 — The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store -- ones ... read more

Developers Neglect Privacy, Security in Health Apps

Mar. 12, 2015 — Telemedicine researchers have proposed a series of recommendations to programmers to improve the security of health applications on mobile devices. According to these specialists, it is a rapidly ... read more

Mar. 10, 2015 — Phishing scams are such a problem that some businesses are sending out fake phishing emails to employees. A professor says the scams work in part because it's harder to detect deception ... read more

Find out What Your Apps Are Really Doing

Mar. 10, 2015 — Apps, these tiny programs on Internet-connected mobile phones are increasingly becoming entryways for surveillance and fraud. Computer scientists have now developed a program that can show users ... read more

Wednesday, August 12, 2015
Tuesday, August 4, 2015
Thursday, July 9, 2015
Thursday, July 2, 2015
Tuesday, June 23, 2015
Thursday, May 21, 2015
Wednesday, May 20, 2015
Wednesday, April 22, 2015
Wednesday, April 15, 2015
Tuesday, April 14, 2015
Wednesday, April 8, 2015
Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Monday, February 2, 2015
Friday, January 23, 2015
Thursday, January 22, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014
Tuesday, October 14, 2014
Tuesday, October 7, 2014
Monday, October 6, 2014
Monday, September 22, 2014
Monday, September 15, 2014
Wednesday, September 10, 2014
Tuesday, September 9, 2014
Friday, August 29, 2014
Thursday, August 21, 2014
Wednesday, August 20, 2014
Friday, August 1, 2014
Thursday, July 24, 2014
Wednesday, July 23, 2014
Thursday, July 10, 2014
Wednesday, July 9, 2014
Tuesday, June 24, 2014
Thursday, June 19, 2014
Friday, June 13, 2014
Wednesday, June 4, 2014
Monday, June 2, 2014
Friday, May 30, 2014
Wednesday, May 21, 2014
Monday, May 12, 2014
Tuesday, April 29, 2014
Thursday, April 24, 2014
Tuesday, April 15, 2014
Monday, April 14, 2014
Thursday, April 3, 2014
Thursday, March 27, 2014
Wednesday, March 26, 2014
Thursday, March 20, 2014
Wednesday, March 19, 2014
Wednesday, March 12, 2014
Tuesday, March 11, 2014
Friday, March 7, 2014
Thursday, March 6, 2014
Wednesday, March 5, 2014
Friday, February 28, 2014
Tuesday, February 25, 2014
Tuesday, February 4, 2014
Friday, January 31, 2014
Thursday, January 30, 2014
Wednesday, January 22, 2014
Wednesday, January 15, 2014
Monday, December 16, 2013
Sunday, December 8, 2013
Wednesday, December 4, 2013
Monday, November 25, 2013
Tuesday, November 19, 2013
Thursday, November 14, 2013
Thursday, November 7, 2013