'Teleporting' images across a network securely using only light

Nature Communications published research by an international team from Wits and ICFO- The Institute of Photonic Sciences, which demonstrates the teleportation-like transport of "patterns" of light—this is the first approach ...

Scientists recognize intruders in noise

A team of scientists from MIPT and Kazan National Research Technical University is developing a mathematical apparatus that could lead to a breakthrough in network security. The results of the work have been published in ...

How old does your computer think you are?

Computerised face recognition is an important part of initiatives to develop security systems, in building social networks, in curating photographs, and many other applications. Systems that allow a computer to estimate with ...

Anthem: Hackers tried to breach system as early as Dec. 10

(AP)—The hackers who stole millions of health insurance records from Anthem Inc. commandeered the credentials of five different employees while seeking to penetrate the company's computer network—and they may have been ...

WPA2 wireless security cracked

There are various ways to protect a wireless network. Some are generally considered to be more secure than others. Some, such as WEP (Wired Equivalent Privacy), were broken several years ago and are not recommended as a way ...

page 1 from 4