Menu

Blog

Archive for the ‘encryption’ category: Page 37

Jul 7, 2018

Synthetic Diamonds Lead Princeton Team to Quantum Computing Breakthrough

Posted by in categories: computing, encryption, quantum physics

Electrical engineers at Princeton, working with UK manufacturer Element Six, created synthetic diamonds capable of storing and transmitting quantum information, as published in the journal ‘Science’ on Thursday. The research is a major advance for the creation of quantum-encrypted communications.

Read more

Jun 14, 2018

Why a DNA data breach is much worse than a credit card leak

Posted by in categories: biotech/medical, cybercrime/malcode, encryption, genetics, health, neuroscience

As the Equifax hack last year showed, there’s a lack of legislation governing what happens to data from a breach. And ultimately, a breach of genetic data is much more serious than most credit breaches. Genetic information is immutable: Vigna points out that it’s possible to change credit card numbers or even addresses, but genetic information cannot be changed. And genetic information is often shared involuntarily. “Even if I don’t use 23andMe, I have cousins who did, so effectively I may be genetically searchable,” says Ram. In one case, an identical twin having her genetic data sequenced created a tricky situation for her sister.


This week, DNA testing service MyHeritage revealed that hackers had breached 92 million of its accounts. Though the hackers only accessed encrypted emails and passwords — so they never reached the actual genetic data — there’s no question that this type of hack will happen more frequently as consumer genetic testing becomes more and more popular. So why would hackers want DNA information specifically? And what are the implications of a big DNA breach?

One simple reason is that hackers might want to sell DNA data back for ransom, says Giovanni Vigna, a professor of computer science at UC Santa Barbara and co-founder of cybersecurity company Lastline. Hackers could threaten to revoke access or post the sensitive information online if not given money; one Indiana hospital paid $55,000 to hackers for this very reason. But there are reasons genetic data specifically could be lucrative. “This data could be sold on the down-low or monetized to insurance companies,” Vigna adds. “You can imagine the consequences: One day, I might apply for a long-term loan and get rejected because deep in the corporate system, there is data that I am very likely to get Alzheimer’s and die before I would repay the loan.”

Continue reading “Why a DNA data breach is much worse than a credit card leak” »

Jun 12, 2018

Britain’s first ‘unhackable’ internet network may solve quantum computing threat

Posted by in categories: cybercrime/malcode, encryption, finance, internet, quantum physics

S cientists have created the UK’s first ever “unhackable” fibre network in anticipation of the dawn of quantum computers, a technology that could render current security systems completely useless and leave critical infrastructure, banking and healthcare networks open to hackers.

The network, constructed by researchers from BT, the University of York and the University of Cambridge over the past two years, is secured by the laws of quantum physics which dictate how light and matter behave at a fundamental level. Using this, it is able to block anyone attempting to crack into the fibre link.

This could be a game changer for the healthcare and financial sector, when it is feared existing encryption…

Continue reading “Britain’s first ‘unhackable’ internet network may solve quantum computing threat” »

Jun 8, 2018

Edward Snowden: ‘The people are still powerless, but now they’re aware’

Posted by in categories: encryption, privacy, security

Developers at major technology companies, outraged by the Snowden disclosures, started pushing back. Some, such as those at WhatsApp, which was bought by Facebook a year after the story broke, implemented their own encryption. Others, such as Yahoo’s Alex Stamos, quit rather than support further eavesdropping. (Stamos is now the head of security at Facebook.)


Five years after historic NSA leaks, whistleblower tells the Guardian he has no regrets.

Mon 4 Jun 2018 13.00 EDT Last modified on Tue 5 Jun 2018 04.46 EDT.

Continue reading “Edward Snowden: ‘The people are still powerless, but now they’re aware’” »

Jun 6, 2018

Quantum Computing: Is it the end of blockchain?

Posted by in categories: bitcoin, cybercrime/malcode, encryption, internet, quantum physics

E xperts are suggesting quantum computing may render blockchain obsolete. As the tech giants such as Google and IBM are showing interest in Quantum computing the danger is evident. According to MIT Technology Review, this type of computing can hack the cryptography hash that universally secures the blockchain and in general the internet. This would suggest quantum computers may complete fraudulent transactions and steal coins. With its exponential power, quantum computers threaten blockchain’s future security.

Blockchain consists of encrypted nodes connected on a chain, which currently makes it almost impossible to hack. The order of entries adheres to the blockchain protocol, which makes it counterfeit-resistant.

To successfully hack a blockchain, you would need to alter both the targeted block and all of the blocks connected. Blockchains are synced throughout a peer-to-peer network. In this type of system, there is no central point of failure for hackers to penetrate. For a hacker to have a chance of penetrating the network, they would need to simultaneously alter at least 51% of the blockchain.

Continue reading “Quantum Computing: Is it the end of blockchain?” »

May 20, 2018

Terrorists Are Going to Use Artificial Intelligence

Posted by in categories: encryption, robotics/AI, terrorism

Machine-learning technology is growing ever more accessible. Let’s not have a 9/11-style ‘failure of imagination’ about it.

There is a general tendency among counterterrorism analysts to understate rather than hyperbolize terrorists’ technological adaptations. In 2011 and 2012, most believed that the “Arab Spring” revolutions would marginalize jihadist movements. But within four years, jihadists had attracted a record number of foreign fighters to the Syrian battlefield, in part by using the same social media mobilization techniques that protesters had employed to challenge dictators like Zine El Abidine Ben Ali, Hosni Mubarak, and Muammar Qaddafi.

Militant groups later combined easy accessibility to operatives via social media with new advances in encryption to create the “virtual planner” model of terrorism. This model allows online operatives to provide the same offerings that were once the domain of physical networks, including recruitment, coordinating the target and timing of attacks, and even providing technical assistance on topics like bomb-making.

Continue reading “Terrorists Are Going to Use Artificial Intelligence” »

May 1, 2018

If quantum computers threaten blockchains, quantum blockchains could be the defense

Posted by in categories: bitcoin, business, computing, encryption, quantum physics

Business Impact

If quantum computers threaten blockchains, quantum blockchains could be the defense.

Quantum computers could break the cryptography that conventional blockchains rely on. Now physicists say a way of entangling the present with the past could foil this type of attack.

Continue reading “If quantum computers threaten blockchains, quantum blockchains could be the defense” »

Apr 23, 2018

The Israel-linked killing of Fadi al-Batsh in Malaysia shows that drone technology is now dangerous enough to kill for

Posted by in categories: drones, encryption, military, robotics/AI

There are certain classes of technology that, by their nature, put those who possess their secrets in danger: Nuclear weapons. Ballistic missiles. Advanced encryption software.

Now, add unmanned aerial vehicles—drones—to that list.

A Palestinian electrical engineer who had published research on drones was assassinated in Malaysia, the Wall Street Journal reported (paywall). A helmeted person on a motorcycle fired 10 shots at 35 year-old Fadi al-Batsh, killing him as he walked to a mosque for morning prayers.

Continue reading “The Israel-linked killing of Fadi al-Batsh in Malaysia shows that drone technology is now dangerous enough to kill for” »

Apr 18, 2018

Artificial intelligence can scour code to find accidentally public passwords

Posted by in categories: encryption, robotics/AI, security

Sometimes sensitive data, like passwords or keys that unlock encrypted communications, are accidentally left open for anybody to see. It’s happened everywhere from the Republican National Committee to Verizon, and as long as information can be public on the internet the trend isn’t going to stop.

But researchers at software infrastructure firm Pivotal have taught AI to locate this accidentally public sensitive information in a surprising way: By looking at the code as if it were a picture. Since modern artificial intelligence is arguably better than humans at identifying minute differences in images, telling the difference between a password and normal code for a computer is just like recognizing a dog from a cat.

The best way to check whether private passwords or sensitive information has been left public today is to use hand-coded rules called “regular expressions.” These rules tell a computer to find any string of characters that meets specific criteria, like length and included characters. But passwords are all different, and this method means that the security engineer has to anticipate every kind of private data they want to guard against.

Continue reading “Artificial intelligence can scour code to find accidentally public passwords” »

Apr 14, 2018

Einstein’s ‘Dice of God’ Has Been Used to Generate Truly Random Numbers

Posted by in categories: encryption, quantum physics

Locking up super-secret information with digital encryption has become even more secure with the production of numbers that aren’t just ‘nearly random’, but are truly unpredictable in every sense of the word.

Using the data generated by a three-year-old experiment on quantum entanglement, the US National Institute of Standards and Technology (NIST) recently generated codes that are guaranteed to be one of a kind, and it could set a new landmark in communications.

On one level, randomness is an easy thing to grasp. We flip coins, roll dice, and pick cards with a basic sense that the outcome can’t be easily predicted.

Continue reading “Einstein’s ‘Dice of God’ Has Been Used to Generate Truly Random Numbers” »

Page 37 of 57First3435363738394041Last