Related topics: security

Breach exposed data of half-million Chicago students, staff

The personal information of more than half a million Chicago Public Schools students and staff was compromised in a ransomware attack last December, but the vendor didn't report it to the district until last month, officials ...

Implementing a 46-node quantum metropolitan area network

Quantum key distribution (QKD) is a method used for secure or secret key exchanges between two remote users. Using secure communication, cyberscientists ultimately aim to establish a global quantum network. Existing field ...

Monitoring system protects trial crops

The world is having to feed an increasing number of mouths. Studies indicate that global population will rise to over nine billion by the year 2050. In response, Bayer AG is researching resistant cereal varieties and enhanced ...

Semi-random scattering of light

What is the exact path of light inside a highly scattering material like white paint? This is a question that is impossible to answer, as the particles inside the paint are distributed randomly. This, at the same time, is ...

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Secure printing with water-based invisible ink

Researchers in China have developed a rewriteable paper coating that can encrypt secret information with relatively low-tech invisible ink—water. A message printed out by a water-jet printer on a manganese-complex-coated ...

page 1 from 34