Serious security: Device-Independent Quantum Key Distribution guards against the most general attacks
Anti-counterfeit polymers work like fingerprints
Internet Explorer 11 vulnerability allows policy bypass
Team shows how 'spontaneous' social norms emerge
Fifteen years ago, the name "Aiden" was hardly on the radar of Americans with new babies. It ranked a lowly 324th on the Social Security Administration's list of popular baby names. But less than a decade ...
Calculating encryption schemes' theoretical security guarantees eases comparison, improvement
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.
WEDG wants to make a difference in personal cloud privacy
Hackers threaten phone in your pocket, experts warn
The boom in smartphones among often careless users has made happy hunting for hackers, whose virus attacks and hijacking of unprotected mobiles are multiplying, experts warn.
Newly found online security flaw stems from 1990s
A newly discovered Internet security flaw could leave many websites vulnerable to hackers because of weak US encryption standards in the 1990s, researchers said Tuesday.
Companies increasingly turn to tech to keep drones out of no-fly zones
Low-cost hobby drones are making the power of flight accessible to anyone with a few hundred bucks to spare. But a combination of technology and safety laws could take the controls out of users' hands.
Journalists' use of social media in decline according to study
The annual Social Journalism Study, conducted by Canterbury Christ Church University and Cision, has highlighted that while the majority of UK journalists now use social media for their work, they actually ...
Superfish points fingers over ad software security flaws
A little-known Silicon Valley startup was caught in a firestorm of criticism this week for making software that exposed Lenovo laptop users to hackers bent on stealing personal information. But Superfish Inc. ...
Stolen SIM card keys could be powerful spy tool (Update)
It would be another powerful tool in the arsenal of US and British spy services: encryption keys for a large share of the SIM cards used for mobile phones.
Powerful cyber spy tool linked to US-led effort
A powerful cyberspying tool can tap into millions of computers worldwide through secretly installed malware, security researchers say, with many signs pointing to a US-led effort.
BMW fixes security flaw that exposed 2.2M cars to break-ins
German automaker BMW says it has fixed a security flaw that made 2.2 million of its vehicles vulnerable to break-ins.