Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended 'side channel' signals from smartphones.
The researchers analyzed and found vulnerabilities in a number of commercial smart irrigation systems, which enable attackers to remotely turn watering systems on and off at will. The researchers tested three of the most widely sold smart irrigation systems: GreenIQ, BlueSpray, and RainMachine smart irrigation systems.
AUDIT is a cryptographic system aimed at improving government accountability for surveillance while still maintaining enough confidentiality for police to do their jobs. AUDIT involves a public ledger in which officials share information about data requests through so-called 'cryptographic commitments.' If the courts decide to release the data they requested, the public can be assured that the correct documents were released in full; if they decide not to, then that refusal itself is made known.
The human factors researchers' alternative passphrase systems showed significantly better user recall compared with existing systems.
The Internet gives people worldwide access to applications and services, but in many cases, Internet traffic passes through a few dominant countries, according to new research from Princeton University.
They compared their detection model to 60 industry-leading antivirus engines as well as previous research, and found their system outperformed the next best antivirus engine by 13 percent -- significantly better than such products including Kaspersky, MacAfee and Avast.
Leading brands including Amazon and Wikipedia are failing to support users with advice on how to securely protect their data, a study shows.
By abusing security weaknesses in the LTE mobile telephony standard, attackers are able to identify which web pages a user visits and to reroute him to a scam website. The weaknesses are impossible to close; and they are also still present in the upcoming mobile telephony standard 5G, the standardization of which is currently pending. Still, the problem may be stemmed with the aid of other security mechanisms in browsers or apps.
In a paper in the journal Bioinformatics released on June 20, the Large Scale Genomics Work Stream announced six new implementations of its htsget protocol for streaming genomic without using file transfers.
Researchers at QuTech in Delft have succeeded in generating quantum entanglement between two quantum chips faster than the entanglement is lost. Entanglement -- once referred to by Einstein as 'spooky action' -- forms the link that will provide a future quantum internet its power and fundamental security. This opens the door to connect multiple quantum nodes and create the very first quantum network in the world.