Implementing a 46-node quantum metropolitan area network

Quantum key distribution (QKD) is a method used for secure or secret key exchanges between two remote users. Using secure communication, cyberscientists ultimately aim to establish a global quantum network. Existing field ...

Team shows how 'spontaneous' social norms emerge

Fifteen years ago, the name "Aiden" was hardly on the radar of Americans with new babies. It ranked a lowly 324th on the Social Security Administration's list of popular baby names. But less than a decade later, the name ...

Android apps are full of potential leaks, finds study

(Phys.org)—Many Android apps are capable of falling victim to Man in the Middle (MITM) attacks. How many? Far too many. Thousands of apps in the Google Play mobile market present vulnerabilities because of the way that ...

Internet Explorer users are warned against Poison Ivy

(Phys.org)—More than a few Internet Explorer users stand vulnerable to fresh attacks of Poison Ivy. In the latest headline in the "Internet Explorer has a flaw" saga, a security hole in Internet Explorer 7,8, and 9 is ...

CRIME attack is shown to decrypt HTTPS web sessions

(Phys.org)—The fun of acronyms is reflected in coming up with CRIME, which stands for Compression Ratio Info-leak Made Easy. What it translates into, though, is not much fun. Two security researchers have developed the ...

Power-strip lookalike hacks office networks

(Phys.org) -- Pwnie Express, the company specializing in cyber security products, calls its new device “ingenious.” Bloggers hearing about it are paying attention to the fact that it is a power-strip lookalike ...

GSM phones -- call them unsafe, says security expert

(PhysOrg.com) -- A German security expert has issued a warning that billions of mobile phone users who depend on GSM networks are vulnerable to having their personal mail hacked. He blames the problem on network operators ...

Android suited up for C-level security

(PhysOrg.com) -- Android is enterprise-ready, with this week's announcement of a new security platform for Android, from Motorola Mobility's subsidiary, 3LM (stands for Three Laws Mobility). This is a potential milestone ...

page 1 from 33