New! Sign up for our free email newsletter.

Encryption News

July 17, 2024

Top Headlines

 

New research finds that, while an increasing number of minors are using virtual reality (VR) apps, not many parents recognize the extent of the security and privacy risks that are specific to VR ...
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in ...
A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones while protecting sensitive user data from two common types of attacks -- side-channel attacks and ...
The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough guaranteeing security and privacy. This advance promises to unlock the transformative potential of ...

Latest Headlines

updated 1:35pm EDT

Earlier Headlines

 

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe ...

With an innovative approach, scientists are creating new standards for data security in the cache of electronic ...

The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being ...

The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. ...

If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and ...

Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential ...

Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new ...

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information ...

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six ...

Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one ...

In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode ...

In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as ...

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or ...

With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's ...

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data ...

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that ...

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could ...

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can ...

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated ...

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...

Monday, September 4, 2023

Wednesday, August 9, 2023

Monday, August 7, 2023

Tuesday, July 25, 2023

Monday, July 10, 2023

Wednesday, July 5, 2023

Wednesday, June 28, 2023

Tuesday, June 27, 2023

Tuesday, March 7, 2023

Monday, February 13, 2023

Thursday, January 26, 2023

Monday, December 12, 2022

Monday, November 21, 2022

Wednesday, November 9, 2022

Friday, September 2, 2022

Monday, August 29, 2022

Monday, August 15, 2022

Wednesday, July 27, 2022

Wednesday, July 20, 2022

Wednesday, June 8, 2022

Wednesday, May 25, 2022

Tuesday, May 24, 2022

Thursday, May 5, 2022

Thursday, April 28, 2022

Tuesday, April 5, 2022

Thursday, March 31, 2022

Wednesday, March 23, 2022

Tuesday, March 22, 2022

Monday, March 21, 2022

Tuesday, March 1, 2022

Friday, February 25, 2022

Tuesday, February 1, 2022

Tuesday, January 25, 2022

Tuesday, December 21, 2021

Friday, December 10, 2021

Tuesday, November 23, 2021

Tuesday, November 16, 2021

Thursday, November 4, 2021

Thursday, October 21, 2021

Friday, October 15, 2021

Tuesday, August 31, 2021

Monday, August 23, 2021

Thursday, August 12, 2021

Wednesday, August 11, 2021