How to certify a quantum computer

Quantum computers are being developed by teams working not only at universities but also at Google, IBM, Microsoft and D-Wave, a start-up company. And things are evolving quickly, says Nicolas Sangouard, SNSF Professor at ...

Password managers vulnerable to insider hacking

A new study shows that communication channels between different parts and pieces of computer software are prone to security breaches. Anyone with access to a shared computer – co-workers, family members, or guests – can ...

Security gaps identified in internet protocol IPsec

In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the internet protocol IPsec is vulnerable ...

page 8 from 21