Researchers at the NYU Center for Cyber Security at the NYU Tandon School of Engineering are rethinking basic functions that drive the ability of neural networks to make inferences on encrypted data.
A new study from computer scientists at Columbia Engineering reveals what may be the first way to encrypt personal images on popular cloud photo services, such as those from Google, Apple, Flickr and others, all without requiring any changes to -- or trust in -- those services.
Researchers from the National University of Singapore have come up with two new ways to protect quantum communications from attacks - the first is an ultra-secure cryptography protocol, and the other is a first-of-its-kind quantum power limiter device. These two approaches hold promise to ensure information systems used for critical services, such as banking and healthcare, can hold up any potential future attacks.
A pair of College of Business professors and their doctoral student at The University of Texas at Arlington are exploring how ransomware attacks sometimes pit organizations against the law enforcement agencies trying to protect them.
Scientists have uncovered an important security vulnerability that has been overlooked so far. Large websites often have many subdomains - for example, "sub.example.com" could be a subdomain of the website "example.com". With certain tricks, it is possible to take control of such subdomains. And if that happens, new security holes open up that also put people at risk who simply want to use the actual website.
A novel, two-step cryptography technique is the first to combine genetic technology with mathematical techniques to generate a complex cryptographic environment with high security and flexibility. In experiments, the proposed algorithm outperformed existing algorithms based on a variety of parameters.
Researchers from University of Copenhagen have developed a new technique that keeps quantum bits of light stable at room temperature instead of only working at -270 degrees. Their discovery saves power and money and is a breakthrough in quantum research.
The encryption algorithm GEA-1 was implemented in mobile phones in the 1990s to encrypt data connections. Since then, it has been kept secret. Now, a research team has analysed the algorithm and has come to the following conclusion: GEA-1 is so easy to break that it must be a deliberately weak encryption that was built in as a backdoor. Although the vulnerability is still present in many modern mobile phones, it no longer poses any significant threat to users, according to the researchers.
Fraud is going uninvestigated by police who are "hiding behind the veil" of the Action Fraud national crime reporting agency.
The world is one step closer to ultimately secure conference calls, thanks to a collaboration between Quantum Communications Hub researchers and their German colleagues, enabling a quantum-secure conversation to take place between four parties simultaneously.