Encryption News
May 6, 2016

Latest Headlines
updated 8:49am EDT

More Encryption News
May 6, 2016

Sensitive People More Vulnerable to Online Dating Scams

Apr. 26, 2016 — Sensitive and less emotionally intelligent people are more likely to be vulnerable to online dating scams, new research concludes. Over 90 victims of dating scams took part in questionnaires relating ... read more

Apr. 14, 2016 — Notices of personal data breaches have become an alarmingly common occurrence for American consumers. The first survey to examine consumers' attitudes about such data hacks finds that few people ... read more

Breakthrough in Cybersecurity Is No Phish Story

Apr. 1, 2016 — Corporations, small businesses and public sector entities have tried unsuccessfully for years to educate consumers and employees on how to recognize phishing emails, those authentic-looking messages ... read more

Computer Security: With Boxmate Malicious Programs Have No Place Left to Hide

Mar. 9, 2016 — By preventing unexpected behavior changes, the “Boxmate” approach defends existing embedded systems, mobile devices, and even servers against known and as-yet unknown forms of ... read more

Bad Vibrations: Researchers Find Security Breach in 3-D Printing Process

Mar. 2, 2016 — With findings that could have been taken from the pages of a spy novel, researchers have demonstrated that they can purloin intellectual property by recording and processing sounds emitted by a 3-D ... read more

New Vulnerability Discovered in Common Online Security

Mar. 2, 2016 — One of the world's most common security software packages – used as the basis of protection for many web browsers – has been found to be vulnerable to a specific form of attack, according to ... read more

Web: Security Protocol TLS Compromised

Mar. 2, 2016 — Do you have faith in the little green padlock symbol in your browser’s URL bar during online banking? You should be careful: in one third of all servers worldwide, the internationally approved ... read more

Mar. 1, 2016 — Researchers are seeing potential in a software application that could effectively warn users when they are about to give away sensitive personal information ... read more

Feb. 29, 2016 — Researchers have achieved a new milestone in quantum physics: they were able to entangle three particles of light in a high-dimensional quantum property related to the 'twist' of their ... read more

Is Zero-Effort Computer Security a Dream? Breaking a New User Verification System

Feb. 24, 2016 — A new study shows that, although ZEBRA, a system intended to enable prompt and user-friendly deauthentication, works very well with honest people, opportunistic attackers can fool the ... read more

Feb. 23, 2016 — Free smart phone apps aren't really free. A research finds that mobile apps can leak your personal, sensitive information from personalized advertisements. Researchers found that mobile app ... read more

Method to Safely Share Password Data

Feb. 22, 2016 — An unfortunate reality for cybersecurity researchers is that real-world data for their research too often comes via a security breach. Now computer scientists have devised a way to let organizations ... read more

Feb. 19, 2016 — A digital 'magic wand' has been developed to improve home healthcare and to prevent hackers from stealing your personal ... read more

Feb. 19, 2016 — New technology detects and tracks you from the second you arrive at the airport until you’re out of the arrivals hall at your destination. Face recognition is the preferred method to identify ... read more

Feb. 10, 2016 — A Q&A with a veteran knot theorist discusses the strange origins of the discipline, as well as its modern-day applications. This field of mathematics, rich in aesthetic beauty and intellectual ... read more

Images, Codes Could Provide Secure Alternative to Multiple Device Password Systems

Dec. 23, 2015 — A system using images and a one-time numerical code could provide a secure and easy to use alternative to multi-factor systems dependent on hardware or software and one-time passwords, a study ... read more

Swedish Researchers Reveal Security Hole

Dec. 18, 2015 — Quantum cryptography is considered a fully secure encryption method, but researchers have discovered that this is not always the case. They found that energy-time entanglement -- the method that ... read more

Encryption Technologies for the Era of Quantum Computers: Effective Protection for Microdevices

Dec. 18, 2015 — Engineers have developed encryption technologies for practical applications to protect microdevices from hacker attacks conducted by quantum computers. The team is currently working towards ... read more

Dec. 18, 2015 — Physical attacks on devices connected to the Internet can be detected by analysing WiFi signals, computer scientists have ... read more

Let Go My Info: People Are Info-Egoists When It Comes to Their Privacy

Dec. 15, 2015 — People are much more concerned about sharing their own private information with third-party app developers than they are about revealing their friends' data, according to ... read more

Tuesday, April 26, 2016
Thursday, April 14, 2016
Friday, April 1, 2016
Wednesday, March 9, 2016
Wednesday, March 2, 2016
Tuesday, March 1, 2016
Monday, February 29, 2016
Wednesday, February 24, 2016
Tuesday, February 23, 2016
Monday, February 22, 2016
Friday, February 19, 2016
Wednesday, February 10, 2016
Wednesday, December 23, 2015
Friday, December 18, 2015
Tuesday, December 15, 2015
Thursday, December 10, 2015
Monday, December 7, 2015
Wednesday, December 2, 2015
Thursday, November 19, 2015
Monday, November 16, 2015
Wednesday, November 11, 2015
Tuesday, November 10, 2015
Wednesday, October 28, 2015
Friday, October 23, 2015
Tuesday, October 20, 2015
Saturday, October 17, 2015
Tuesday, October 13, 2015
Wednesday, October 7, 2015
Monday, October 5, 2015
Tuesday, September 29, 2015
Friday, September 25, 2015
Thursday, September 24, 2015
Wednesday, September 23, 2015
Tuesday, September 22, 2015
Monday, September 21, 2015
Thursday, September 10, 2015
Monday, August 24, 2015
Tuesday, August 18, 2015
Wednesday, August 12, 2015
Tuesday, August 4, 2015
Wednesday, July 29, 2015
Tuesday, July 28, 2015
Wednesday, July 22, 2015
Thursday, July 9, 2015
Thursday, July 2, 2015
Monday, June 29, 2015
Wednesday, June 24, 2015
Tuesday, June 23, 2015
Thursday, May 21, 2015
Wednesday, May 20, 2015
Thursday, April 30, 2015
Wednesday, April 22, 2015
Wednesday, April 15, 2015
Tuesday, April 14, 2015
Wednesday, April 8, 2015
Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Monday, February 2, 2015
Friday, January 23, 2015
Thursday, January 22, 2015
Thursday, January 8, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Tuesday, November 11, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014
Tuesday, October 14, 2014
Tuesday, October 7, 2014
Monday, October 6, 2014
Thursday, September 25, 2014
Monday, September 22, 2014