Encryption News
February 7, 2016

Latest Headlines
updated 4:48pm EST

More Encryption News
February 7, 2016

Comfort Is Important in Identification: Bank Identification Is the Most Trusted Method, Passwords Come Second

Dec. 10, 2015 — A study about user attitudes to different personal identification methods has been conducted. It concludes that the most popular identification methods were internet banking access codes and ... read more

Closing a Malware Security Loophole

Dec. 7, 2015 — An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. The research raises the ... read more

Nov. 10, 2015 — Think your web browsing is private? A new study of one million top websites finds that 88 percent reveal user data to third parties, often without the user's ... read more

Oct. 23, 2015 — Researchers tested users’ abilities to detect malware and phishing attacks while measuring the neurophysiological behavior underlying these ... read more

Smart Car Cyberattack Warning: Flaws Found in Security Systems

Oct. 20, 2015 — How Australia acts today will determine the security and safety of driverless cars, autonomous vehicles and intelligent transport systems in the future, with academics warning there is a risk of ... read more

Think Again Before Tapping the Install Button for That App

Oct. 17, 2015 — Multitasking when using mobile devices creates stress and increases the potential for choosing unsafe apps, new research shows. A new study examined the conditions under which mobile device users are ... read more

Is Your Digital Information More at Risk Today Than It Was Ten Years Ago?

Oct. 13, 2015 — Researchers say that cybersecurity breeches are not happening more frequently than they did a decade ago. And these data breaches in general are not growing in ... read more

New Research Method Identifies Stealth Attacks on Complicated Computer Systems

Oct. 13, 2015 — Computer scientists are unveiling a novel approach to discovering stealth attacks on computers. The scientists' secret formula in finding a stealth attack is in their algorithms. With specific ... read more

Theoretical Computer Science Provides Answers to Data Privacy Problem

Oct. 7, 2015 — The promise of big data lies in researchers' ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the world.These data may be ... read more

Identifying Problems With National Identifiers

Sep. 29, 2015 — A team of researchers in two experiments was able to decrypt more than 23,000 RRNs using both computation and logical reasoning. The findings suggest that, while such identifiers are encrypted to ... read more

Scientists Stop and Search Malware Hidden in Shortened Urls on Twitter

Sep. 25, 2015 — Cyber-criminals are taking advantage of real-world events with high volumes of traffic on Twitter in order to post links to websites which contain ... read more

Information Handling by Some Health Apps Not as Secure as It Should Be

Sep. 24, 2015 — Some health apps that have been clinically accredited may not have been complying with principles of data protection, according to research. In some instances health apps were found to be sending ... read more

Protecting Identities in a Sea of Big Data

Sep. 23, 2015 — A computer scientist will use three grants to develop approaches to safeguarding sensitive genetic information. Along with co-researchers, he will systematically evaluate potential privacy breaches ... read more

Sep. 21, 2015 — For the first time, researchers have developed an inexpensive, secure method to prevent mass credit card fraud using existing magnetic card readers. The novel technique -- called SafePay -- works by ... read more

Can Typing Habits Prevent Cybercrime?

Sep. 10, 2015 — New research proposes a new keystroke algorithm which intends on making online authentication processes more secure, reliable, and cheap.  The new method hopes to alleviate some of the common issues ... read more

Issues Surrounding Security Tools for Software Developers

Aug. 24, 2015 — For software programmers, security tools are analytic software that can scan or run their code to expose vulnerabilities long before the software goes to market. But these tools can have ... read more

Securing Data from Tomorrow's Supercomputers

Aug. 18, 2015 — For the powerful quantum computers that will be developed in the future, cracking online bank account details and credit cards number will be a synch. But a team of cryptographers is already working ... read more

Computers: Protecting Your Cloud

Aug. 12, 2015 — A powerful new computer security tool, called XDet, can detect malicious files being uploaded to a cloud computing service. The researchers have carried out successful tests on live data on a cloud ... read more

Cybersecurity Experts to Discuss Tricky Balance Between Data Sharing and Privacy

Aug. 4, 2015 — In its efforts to curb criminal activity, should the government be allowed to see confidential consumer data collected by businesses? Or does the right to privacy trump such intrusions? The conflict ... read more

Aug. 4, 2015 — Today, almost everything in your car is managed by an electronic control unit (ECU). The problem is that these minicomputers are increasingly coming under attack. Researchers have now developed a ... read more

Thursday, December 10, 2015
Monday, December 7, 2015
Tuesday, November 10, 2015
Friday, October 23, 2015
Tuesday, October 20, 2015
Saturday, October 17, 2015
Tuesday, October 13, 2015
Wednesday, October 7, 2015
Tuesday, September 29, 2015
Friday, September 25, 2015
Thursday, September 24, 2015
Wednesday, September 23, 2015
Monday, September 21, 2015
Thursday, September 10, 2015
Monday, August 24, 2015
Tuesday, August 18, 2015
Wednesday, August 12, 2015
Tuesday, August 4, 2015
Wednesday, July 29, 2015
Tuesday, July 28, 2015
Wednesday, July 22, 2015
Thursday, July 9, 2015
Thursday, July 2, 2015
Monday, June 29, 2015
Wednesday, June 24, 2015
Tuesday, June 23, 2015
Thursday, May 21, 2015
Wednesday, May 20, 2015
Thursday, April 30, 2015
Wednesday, April 22, 2015
Wednesday, April 15, 2015
Tuesday, April 14, 2015
Wednesday, April 8, 2015
Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Monday, February 2, 2015
Friday, January 23, 2015
Thursday, January 22, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Tuesday, November 11, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014
Tuesday, October 14, 2014
Tuesday, October 7, 2014
Monday, October 6, 2014
Thursday, September 25, 2014
Monday, September 22, 2014
Monday, September 15, 2014
Wednesday, September 10, 2014
Tuesday, September 9, 2014
Friday, August 29, 2014
Thursday, August 21, 2014
Wednesday, August 20, 2014
Friday, August 1, 2014
Thursday, July 24, 2014
Wednesday, July 23, 2014
Thursday, July 10, 2014
Wednesday, July 9, 2014
Tuesday, June 24, 2014
Thursday, June 19, 2014
Friday, June 13, 2014
Wednesday, June 4, 2014
Monday, June 2, 2014
Friday, May 30, 2014
Wednesday, May 21, 2014
Monday, May 12, 2014
Tuesday, April 29, 2014
Thursday, April 24, 2014
Tuesday, April 15, 2014
Monday, April 14, 2014
Thursday, April 3, 2014