Information Security

Game-changing invention to revolutionise internet security

Quantum entanglement is the future of the internet whether we understand it or not

New insider attack steals passwords by reading thermal energy from keyboards

BT builds the UK’s first ‘unhackable’ quantum-secured network

Quantum step forward in protecting communications from hackers

UGA is cyber ready to help state fight hacker attacks

Crypto crumpling could solve the encryption conundrum

Email encryption standards hacked

Alphabet’s Jigsaw offers political campaigns free DDoS protection

Interpol’s New Software Will Recognize Criminals by Their Voices

Robot Designed to Defend Factories Against Cyberthreats

The Unhackable Envelope

Researchers deliver open-source simulator for cyber physical systems

Organic Molecules as Bearers of Secrets

Army develops face recognition technology that works in the dark

Army scientists uncover how to stop cyber intrusions

NASA Researches Ethereum Blockchain Tech for Deep Space Exploration

Could these grain-sized computers using blockchain networks thwart counterfeiters?

Robot Designed to Defend Factories Against Cyberthreats

Attacks on 4G LTE networks could send fake emergency alerts

Image processing algorithm shows promise for mapping the blood vessel networks in the eye

Real-Time Captcha Technique Improves Biometric Authentication

New Quantum Crypto Scheme Looks Ahead to “Quantum Internet”

Mobile health applications put millions of users’ privacy and security at risk, researchers find

Energy-efficient encryption for the internet of things

Berkeley Lab Researchers Contribute to Making Blockchains Even More Robust

The new-age Manhattan Project: How do we protect today’s secrets from tomorrow’s quantum computers?

Pulses of Light to Encrypt Data and Protect Security of Cryptocurrencies

Developing a secure, un-hackable net

Researchers Discover Two Major Flaws in the World’s Computers

Proof of randomness builds future of digital security

Researchers found a security flaw that had 10 million banking app users at risk

Yale SEAS works to usher an era of hacker-proof computing

NUS scientist develops “toolboxes” for quantum cybersecurity

Computer scientists develop a simple tool to tell if websites suffered a data breach

Phones vulnerable to location tracking even when GPS services off


Universities band together to protect Scotland from cyber attacks

Game theory harnessed for cybersecurity of large-scale nets

Voice impersonators can fool speaker recognition systems

Information Security

Secure Payment without Leaving a Trace

Intel Accelerates Its Quantum Computing Efforts With 17-Qubit Chip

Quantum Communication Demonstrated in Real-Life City Conditions

Serious flaw in WPA2 protocol lets attackers intercept passwords and much more

Goodbye, login. Hello, heart scan.

Stanford Cyber Initiative tackles pressing issues in cybersecurity, governance and the future of work

Security Cameras Can Be Hacked Using Infrared Light

Artificial intelligence just made guessing your password a whole lot easier

New Army models predict number of cyberattacks that pierce company networks

http://New Army models predict number of cyberattacks that pierce company networks

NIST’s lead cryptographer talks encryption’s paradigm shifts



NSF Project Sets Up First Machine Learning Cyberinfrastructure – CHASE-CI

Security flaw shows 3G, 4G LTE networks are just as prone to stingray phone tracking

IARPA explores easy-to-use cryptography

Cybersecurity researchers claim every network router at risk of secretly leaking data

Russian Researchers Claim First Quantum-Safe Blockchain

Under Cyber Attack: UH Researchers Look at How to Catch a ‘Phisher’

The Bizarre Quantum Test That Could Keep Your Data Secure

Texas A&M research team suggests how to defend against collective attention threats

Smartphone security hole: ‘Open port’ backdoors are widespread

Using AI-enhanced malware, researchers disrupt algorithms used in antimalware

Could a doodle replace your password?

Microsoft’s novel approach to securing IoT

Researchers at University of Luxembourg develop core component for Zcash cryptocurrency

Novel technique tracks more web users across browsers

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls

Malware Lets a Drone Steal Data by Watching a Computer’s Blinking LED

Researchers from Google, CTI Break SHA-1 Hash Encryption Function

Google Releases Test Set to Check Cryptographic Library Security

Six seconds to hack a credit card

Malware that turns PCs into eavesdropping devices demonstrated by Ben-Gurion U.

Computer scientists work to prevent hackers from remotely controlling cars


Encrypting medical photos with chaos

Computer scientists explore random numbers, cybersecurity

Combating cybercrime when there’s plenty of phish in the sea

Crypto needs more transparency, researchers warn

Hacker-Proof Code Confirmed

Hardware hack defeats iPhone passcode security

The Cryptographic Key That Secures the Web Is Being Changed for the First Time


Smartphone hacks 3-D printer by measuring ‘leaked’ energy and acoustic waves

Researchers create 3D faces from online photos to defeat face authentication systems




New approach needed to IT, says NIST’s top cyber scientist


Secure networks for the Internet of the future


World’s most efficient AES crypto processing technology for IoT devices developed

Encryption breakthrough: Scientists derive truly random numbers using two-source extractors

DARPA Challenge Tests AI as Cybersecurity Defenders

Sandia Labs Researchers Build DNA-Based Encrypted Storage—threats/sandia-labs-researchers-build-dna-based-encrypted-storage-/d/d-id/1326267

Harmonised security across devices

How well do facial recognition algorithms cope with a million strangers?

Computing a secret, unbreakable key

Tor Project works on boosting encryption for next release

Closing security gaps in Internet-connected household

Advanced game theory goes to work for homeland security


Researchers Demo How to Build Nearly Invisible Backdoor in Computer Chips


Computing a secret, unbreakable key

4 big plans to fix internet security

How to Hack the Hackers: The Human Side of Cyber Crime

New Method of Producing Random Numbers Could Improve Cybersecurity

DARPA has since September awarded seven XD3 multi-million contracts to Georgia Tech, George Mason University, Invincea Labs, Raytheon BBN, Vencore Labs and this week to the University of Pennsylvania

NIST looks to reengineer thinking about cyber

It’s the year 2020…how’s your cybersecurity?

NIST Kicks Off Effort to Defend Encrypted Data from Quantum Computer Threat

DARPA Is Looking For The Perfect Encryption App, and It’s Willing to Pay

NIST is nearly ready to pick the next hash algorithm

DARPA takes aim at insider threats

Scientists view cybersecurity as an intimidating conundrum

New Research Improves Ability To Detect Malware in Cloud-Computing Systems


Rivest unlocks cryptography’s past, looks toward future
Public-key system has worked and made Internet commerce feasible, but new systems are ready in case flaws are found

Cyber security summit signs UK-US university deal

Strong protection for weak passwords

Cyber identity strategy would eliminate the need for multiple passwords

Researchers show Android devices susceptible to eavesdropping

Stanford computer scientists find Internet security flaw

Alberta research aims to keep information secure

UA Researchers Develop Prototype to Detect Fake Websites

Researchers identify first flaws in the Advanced Encryption Standard

Secure updates for navigation systems & Co

Will advanced biometrics automate future war machines?

The Science of Cyber Security

New forensics tool can expose all your online activity

Texas Computer Scientist Outflanks Next-Generation Computer Viruses

NIST Signs Agreement to Enhance Cybersecurity Education Programs

Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

NIST Improves Tool for Hardening Software Against Cyber Attack

White House Sets Cybersecurity R&D Priorities

Could hackers develop a ‘computer virus’ to infect the human mind?

Microsoft to launch real-time intelligent threat feed

Sandia cyber project looks to help IT professionals with complex Domain Name System (DNS) vulnerabilities

DARPA set to develop super secure “cognitive fingerprint”

Researchers crack online encryption system

Scripps Research and Technion Scientists Develop Biological Computer to Encrypt and Decipher Images

Researchers set new cryptanalysis world record for pairing-based cryptography

Researchers advance biometric security

Scientists Develop Method for Authenticating Digital Images by Analyzing ‘Noise’

Swiss scientists develop algorithm to sniff out source of malware, spam attacks

The password you can use without knowing it

New Tool Aims To Ensure Software Security Policies Reflect User Needs

Researchers borrow DNA tricks to identify malware’s genetic code

UAB develops a simple defense for complex smartphone malware

More secure bank cards

HTTPS Security Encryption Flaws Found

Encryption Chip Fights Off Sneak Attacks

Security holes in smartphone apps (WITH VIDEO)


Shadows and light: Dartmouth researchers develop new software to detect forged photos

Detecting program-tampering in the cloud

Bristol researchers work to secure next generation chip-card payment technology!

NSA’s reported tampering could change how crypto standards are made!

Engineers Plan a Fully Encrypted Internet

Research trio crack RSA encryption keys by listening to computer noise!

“Honey Encryption” Will Bamboozle Attackers with Fake Secrets

Cryptography Breakthrough Could Make Software Unhackable

Fighting off virtual attacks

New algorithm shakes up cryptography

Researchers Test Distributed Computing As Defense against Cyberattacks on Power Grids

MINT program helps pinpoint threats contained in intelligence data

How to Exchange Encrypted Messages on Any Website

Raising cryptography’s standards

The future of encryption

A basis for all cryptography


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: