Advertisement

Encryption

Quantum Computing

Scientists create prototype quantum hard drive

Researchers from the Australian National University (ANU) and the University of Otago in New Zealand have created a prototype quantum hard drive that may fundamentally alter the realm of secure, long-distance data encryption. Using atoms of the rare-earth element europium embedded in yttrium orthosilicate (YSO) crystals, the scientists have shattered previous records for quantum information retention by creating a storage device capable of holding quantum state information for up to six hours at a time.Read More

Electronics

QR codes could generate 3D images on phones – no internet required

Whether they're on product packaging, promotional materials or in magazines, most QR codes do the same thing – when a smartphone scans them with its camera, they trigger that phone's web browser to navigate to a given website. In the near future, however, they may be used to securely display 3D images on the user's phone, without even involving the often-untrustworthy internet. Read More

Mobile Technology

Apps to easily encrypt your text messaging and mobile calls

Mobile phone users are becoming more savvy to the potential security risks of standard, unencrypted text messaging and wary of government intrusion into everyday communications. Some consumers require encrypted phone calls for information-sensitive business requirements and others just don't like the idea of others prying into their personal lives. Gizmag takes a look at a sampling of the apps available for iOS and Android (and sometimes desktop) to encrypt mobile communications, both text messaging and phone calls.Read More

Computers

Super-secure quantum-based data encryption for everyone

With a new device set to make unbreakable, quantum-based cryptographic security available for everyone for the very first time, ordinary people will be able to use cryptographic systems that – until recently – only existed as experiments in the most advanced physics laboratories. Developed at the Los Alamos National Laboratory (LANL) the device incorporates the quantum mechanics of random photon polarization to generate random numbers and create cryptographic keys.Read More

Computers

Gatekeeper Chain key fob automatically locks your PC when AFK

For some office workers the task of locking and unlocking their computer is a regular part of the job, while for others it's frequency is dictated by the extent of their caffeine addiction. Looking to automate this process is the team behind the GateKeeper Chain, a key fob with a built-in proximity sensor which automatically locks your PC when you walk away and then unlocks it when you return to your desk.Read More

Mobile Technology

Blackphone announces an encrypted smartphone designed for mass appeal

While news of smartphone hacks, data sniffing, and government intrusion has regrettably become commonplace, it’s also had the consequence of raising public awareness of privacy risks which used to be solely the domain of security geeks. In this climate of readiness, Blackphone is launching a smartphone it says will be both secure and user-friendly, developed as a partnership between founders of the encryption firm Silent Circle and phone manufacturer Geeksphone.Read More

Computers

Undetectable hardware Trojans could compromise cryptography

Researchers have shown that it is possible to compromise the functioning of a cryptographic chip without changing its physical layout. Based on altering the distribution of dopants in a few components on the chip during fabrication, this method represents a big challenge for cyber-security as it is nearly impossible to detect with any currently practical detection scheme.Read More

Telecommunications Feature

False sense of security: Your TV, car, neighborhood may be hackable

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year. Read More

    Advertisement
    Advertisement
    Advertisement

    See the stories that matter in your inbox every morning