Advertisement
more top stories »

Encryption

— Science

Scientists create prototype quantum hard drive

By - January 12, 2015 2 Pictures
Researchers from the Australian National University (ANU) and the University of Otago in New Zealand have created a prototype quantum hard drive that may fundamentally alter the realm of secure, long-distance data encryption. Using atoms of the rare-earth element europium embedded in yttrium orthosilicate (YSO) crystals, the scientists have shattered previous records for quantum information retention by creating a storage device capable of holding quantum state information for up to six hours at a time. Read More
— Electronics

QR codes could generate 3D images on phones – no internet required

By - November 14, 2014 3 Pictures
Whether they're on product packaging, promotional materials or in magazines, most QR codes do the same thing – when a smartphone scans them with its camera, they trigger that phone's web browser to navigate to a given website. In the near future, however, they may be used to securely display 3D images on the user's phone, without even involving the often-untrustworthy internet. Read More
— Mobile Technology

Apps to easily encrypt your text messaging and mobile calls

By - September 27, 2014 9 Pictures
Mobile phone users are becoming more savvy to the potential security risks of standard, unencrypted text messaging and wary of government intrusion into everyday communications. Some consumers require encrypted phone calls for information-sensitive business requirements and others just don't like the idea of others prying into their personal lives. Gizmag takes a look at a sampling of the apps available for iOS and Android (and sometimes desktop) to encrypt mobile communications, both text messaging and phone calls. Read More
— Computers

Super-secure quantum-based data encryption for everyone

By - September 5, 2014 1 Picture
With a new device set to make unbreakable, quantum-based cryptographic security available for everyone for the very first time, ordinary people will be able to use cryptographic systems that – until recently – only existed as experiments in the most advanced physics laboratories. Developed at the Los Alamos National Laboratory (LANL) the device incorporates the quantum mechanics of random photon polarization to generate random numbers and create cryptographic keys. Read More
— Computers

Gatekeeper Chain key fob automatically locks your PC when AFK

By - February 5, 2014 3 Pictures
For some office workers the task of locking and unlocking their computer is a regular part of the job, while for others it's frequency is dictated by the extent of their caffeine addiction. Looking to automate this process is the team behind the GateKeeper Chain, a key fob with a built-in proximity sensor which automatically locks your PC when you walk away and then unlocks it when you return to your desk. Read More
— Mobile Technology

Blackphone announces an encrypted smartphone designed for mass appeal

By - January 15, 2014 2 Pictures
While news of smartphone hacks, data sniffing, and government intrusion has regrettably become commonplace, it’s also had the consequence of raising public awareness of privacy risks which used to be solely the domain of security geeks. In this climate of readiness, Blackphone is launching a smartphone it says will be both secure and user-friendly, developed as a partnership between founders of the encryption firm Silent Circle and phone manufacturer Geeksphone. Read More
— Computers

Undetectable hardware Trojans could compromise cryptography

By - October 2, 2013 1 Picture
Researchers have shown that it is possible to compromise the functioning of a cryptographic chip without changing its physical layout. Based on altering the distribution of dopants in a few components on the chip during fabrication, this method represents a big challenge for cyber-security as it is nearly impossible to detect with any currently practical detection scheme. Read More
— Telecommunications Feature

False sense of security: Your TV, car, neighborhood may be hackable

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year. Read More
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement

Subscribe to Gizmag's email newsletter

Advertisement