Researchers from University of Copenhagen have developed a new technique that keeps quantum bits of light stable at room temperature instead of only working at -270 degrees. Their discovery saves power and money and is a breakthrough in quantum research.
The encryption algorithm GEA-1 was implemented in mobile phones in the 1990s to encrypt data connections. Since then, it has been kept secret. Now, a research team has analysed the algorithm and has come to the following conclusion: GEA-1 is so easy to break that it must be a deliberately weak encryption that was built in as a backdoor. Although the vulnerability is still present in many modern mobile phones, it no longer poses any significant threat to users, according to the researchers.
Fraud is going uninvestigated by police who are "hiding behind the veil" of the Action Fraud national crime reporting agency.
The world is one step closer to ultimately secure conference calls, thanks to a collaboration between Quantum Communications Hub researchers and their German colleagues, enabling a quantum-secure conversation to take place between four parties simultaneously.
Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive--but imaginary--world. The technology is aimed at protecting physical targets--infrastructure such as buildings, the electric grid, water and sewage systems, and pipelines.
A security issue in the certification signatures of PDF documents has been discovered by researchers from Bochum. This special form of signed PDF files can be used, for instance, to conclude contracts. The team showed that the second contractual party can change the contract text unnoticed when they add their digital signature, without this invalidating the certification.
Columbia Engineering researchers have developed SeKVM, the first system that guarantees--through a mathematical proof--the security of virtual machines in the cloud. "This is the first time that a real-world multiprocessor software system has been shown to be mathematically correct and secure," said Computer Science Professor Jason Nieh. "This means that users' data are correctly managed by software running in the cloud and are safe from security bugs and hackers."
The Cybersecurity Laboratory of the National Institute of Information and Communications Technology (NICT) has enhanced its cyber attack integrated analysis platform "NIRVANA Kai" to support the Internet Protocol version 6 (IPv6), the successor to IPv4. NIRVANA Kai has succeeded in real-time visualization of packets flowing in the vast address space of IPv6 for the first time in the world. It is expected to be useful for security measures for more diverse and extensive networks.
In most cameras, there is a trade-off between the field-of-view and resolution. Omnidirectional cameras offer a 360-degree field of view but poor resolution. In a new study, researchers from Shibaura Institute of Technology, Japan design a dual camera-based platform employing an omnidirectional camera for target detection and a separate camera for its high-resolution capture and report an overall improved performance, opening doors to potential applications in security systems.
A scientist from HSE University has developed an image recognition algorithm that works 40% faster than analogues. It can speed up real-time processing of video-based image recognition systems. The results of the study have been published in the journal Information Sciences.