Highlights from the 2014 LA Auto Show

Encryption

Using a smartphone, users could scan QR codes to see encrypted 3D images (Photo: Shutterst...

Whether they're on product packaging, promotional materials or in magazines, most QR codes do the same thing – when a smartphone scans them with its camera, they trigger that phone's web browser to navigate to a given website. In the near future, however, they may be used to securely display 3D images on the user's phone, without even involving the often-untrustworthy internet.  Read More

Free or inexpensive apps to secure your mobile communications (Image: Shutterstock)

Mobile phone users are becoming more savvy to the potential security risks of standard, unencrypted text messaging and wary of government intrusion into everyday communications. Some consumers require encrypted phone calls for information-sensitive business requirements and others just don't like the idea of others prying into their personal lives. Gizmag takes a look at a sampling of the apps available for iOS and Android (and sometimes desktop) to encrypt mobile communications, both text messaging and phone calls.  Read More

The new device incorporates quantum photon polarization to generate random numbers and cre...

With a new device set to make unbreakable, quantum-based cryptographic security available for everyone for the very first time, ordinary people will be able to use cryptographic systems that – until recently – only existed as experiments in the most advanced physics laboratories. Developed at the Los Alamos National Laboratory (LANL) the device incorporates the quantum mechanics of random photon polarization to generate random numbers and create cryptographic keys.  Read More

ProtonMail is a new secure email service created by scientists from CERN and MIT

The privacy of the data that we put online has been a hot topic over the last year. In order to protect against unwanted snooping, a group of scientists has created a new secure email service. ProtonMail provides end-to-end encryption, meaning that even the company itself can't even see the content of your messages.  Read More

The human body has inspired a new form of digital security (Image: Shutterstock)

Researchers at Lancaster University, UK have taken a hint from the way the human lungs and heart constantly communicate with each other, to devise an innovative, highly flexible encryption algorithm that they claim can't be broken using the traditional methods of cyberattack.  Read More

The distance at which the fob will work is adjustable, meaning it can be set to unlock the...

For some office workers the task of locking and unlocking their computer is a regular part of the job, while for others it's frequency is dictated by the extent of their caffeine addiction. Looking to automate this process is the team behind the GateKeeper Chain, a key fob with a built-in proximity sensor which automatically locks your PC when you walk away and then unlocks it when you return to your desk.  Read More

With data privacy becoming a bigger concern, Blackphone presents itself as a secure option...

While news of smartphone hacks, data sniffing, and government intrusion has regrettably become commonplace, it’s also had the consequence of raising public awareness of privacy risks which used to be solely the domain of security geeks. In this climate of readiness, Blackphone is launching a smartphone it says will be both secure and user-friendly, developed as a partnership between founders of the encryption firm Silent Circle and phone manufacturer Geeksphone.  Read More

Undetectable hardware Trojans could subvert cryptographic security (Image: Shutterstock)

Researchers have shown that it is possible to compromise the functioning of a cryptographic chip without changing its physical layout. Based on altering the distribution of dopants in a few components on the chip during fabrication, this method represents a big challenge for cyber-security as it is nearly impossible to detect with any currently practical detection scheme.  Read More

DefCon and Black Hat highlight the fact that companies often seem more concerned about the...

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year.  Read More

Fraunhofer is developing machines with built-in copy protection (Photo: Volker Steger)

Mention counterfeit goods and most people will probably think of knock-off watches or pirated DVDs, but counterfeiting is a much wider problem. Everything from aircraft components to groceries are faked on a regular basis, with a third of industries affected at an estimated worldwide cost of US$650 billion dollars. German machine tools are a favorite target and to help combat this the Fraunhofer Research Institution for Applied and Integrated Security (AISEC) in Garching, Germany, is developing new technologies and techniques to make counterfeiting of these items more difficult.  Read More

Looking for something? Search our 29,485 articles