Secure computers aren't so secure
(PhysOrg.com) -- Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down.
(PhysOrg.com) -- Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down.
Computer Sciences
Oct 30, 2009
3
0
(AP) -- China is building its cyberwarfare capabilities and appears to be using the growing technical abilities to collect U.S. intelligence through a sophisticated and long-term computer attack campaign, according to an ...
Internet
Oct 22, 2009
3
0
(PhysOrg.com) -- University of Texas at Austin scientists have shown that they can break "Vanish," a program that promised to self-destruct computer data, such as emails and photographs, and thereby protect a person's privacy.
Computer Sciences
Sep 29, 2009
0
0
(PhysOrg.com) -- Two Japanese computer scientists have developed a way to crack the WPA encryption between wireless routes and devices in 60 seconds.
A system that allows biometric data to be used to create a secret key for data encryption has been developed by researchers in South Africa. They describe details of the new technology in the International Journal of Electronic ...
Computer Sciences
Jul 31, 2009
0
0
New research in imaging may lead to advancements for the Air Force in data encryption and wide-area photography with high resolution.
General Physics
Jul 14, 2009
0
0
(PhysOrg.com) -- An IBM Researcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, called "privacy homomorphism," ...
Mathematics
Jun 25, 2009
9
0