Tag Archives | Encryption
Quantum Info Transmitted Through Atmosphere

Quantum Info Transmitted Through Atmosphere

It could be difficult for the NSA to hack encrypted messages in the future — at least if a technology being investigated by scientists at the Max Planck Institute for the Science of Light in Erlangen and the University Erlangen-Nürnberg is successful: quantum cryptography. The physicists are now laying the foundation to make this technique, [...]

Read full story Comments { 0 }
Most Complete Antarctic Map for Climate Research Made Public

Most Complete Antarctic Map for Climate Research Made Public

The University of Waterloo has unveiled a new satellite image of Antarctica, and the imagery will help scientists all over the world gain new insight into the effects of climate change.   Thanks to a partnership between the Canadian Space Agency (CSA), MacDonald, Dettwiler and Associates Ltd. (MDA), the prime contractor for the RADARSAT-2 program, [...]

Read full story Comments { 0 }
Laser Makes Microscopes Far More Sensitive

Laser Makes Microscopes Far More Sensitive

Laser physicists have found a way to make atomic-force microscope probes 20 times more sensitive and capable of detecting forces as small as the weight of an individual virus.   The technique, developed by researchers at The Australian National University (ANU), hinges on using laser beams to cool a nanowire probe to minus 265 degrees [...]

Read full story Comments { 0 }
New Characteristics of Complex Oxide Surfaces

New Characteristics of Complex Oxide Surfaces

A novel combination of microscopy and data processing has given researchers at the Department of Energy’s Oak Ridge National Laboratory an unprecedented look at the surface of a material known for its unusual physical and electrochemical properties.   The research team led by ORNL’s Zheng Gai examined how oxygen affects the surface of a perovskite [...]

Read full story Comments { 0 }

Is Your Data Safe? Why You Should Care More About Spam

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company’s spam volume to evaluate its security vulnerability through the SpamRankings.net project. “The goal is to alert companies that they are spamming [and] hold them accountable to stop spamming, thus enhancing [...]

Read full story Comments { 0 }
Computer Security: ‘Melbourne Shuffle’ Secures Data in the Cloud

Computer Security: ‘Melbourne Shuffle’ Secures Data in the Cloud

  To keep data safe in the cloud, a group of computer scientists suggests doing the Melbourne Shuffle. That may sound like a dance move (and it is), but it’s also a computer algorithm developed by researchers at Brown University. The computing version of the Melbourne Shuffle aims to hide patterns that may emerge as [...]

Read full story Comments { 0 }
Thousands of Secret Keys Found in Android Apps

Thousands of Secret Keys Found in Android Apps

In a paper presented — and awarded the Ken Sevcik Outstanding Student Paper Award — at the ACM SIGMETRICS conference on June 18, Jason Nieh, professor of computer science at Columbia Engineering, and PhD candidate Nicolas Viennot reported that they have discovered a crucial security problem in Google Play, the official Android app store where [...]

Read full story Comments { 0 }
‘Hello, World!’ Space Station Video Via Laser

‘Hello, World!’ Space Station Video Via Laser

“Hello, World!” came the message from the International Space Station as NASA successfully beamed high-definition video via laser from space to ground on Thursday, June 5. The 175-megabit video transmission was the first of its kind for the Optical Payload for Lasercomm Science (OPALS) with the goal of improving the way we receive data from [...]

Read full story Comments { 0 }
Liberating Devices From Their Power Cords

Liberating Devices From Their Power Cords

Imagine a future in which our electrical gadgets are no longer limited by plugs and external power sources.   This intriguing prospect is one of the reasons for the current interest in building the capacity to store electrical energy directly into a wide range of products, such as a laptop whose casing serves as its [...]

Read full story Comments { 0 }
Voltage Security Comments on Gmail Encryption, Microsoft Email Policy

Voltage Security Comments on Gmail Encryption, Microsoft Email Policy

Brendan Rizzo, technical director with Voltage Security, today commented on the news of Google’s Gmail encryption: “Google has always provided the option for encrypting the link to their webmail service, but this announcement has now completed the evolution from being an option only enabled by the security conscious, to one that will protect the end user [...]

Read full story Comments { 0 }