БЛОГ

Archive for the ‘encryption’ category: Page 32

Nov 26, 2019

Pemex Still Suffers Cyberattack Fallout

Posted by in categories: cybercrime/malcode, encryption

O.o…


The communications system of Mexico’s oil giant Pemex is still suffering the lingering effects of a cyberattack that occurred earlier this month, sources from the company told Bloomberg.

A ransomware attack caused administrative operations at Pemex to grind to a halt on November 10, with the company announcing the resumption of work soon after, saying the actual attack had been prevented.

Continue reading “Pemex Still Suffers Cyberattack Fallout” »

Nov 21, 2019

Google really wants you to hack the Pixel’s Titan M security chip

Posted by in categories: cybercrime/malcode, encryption, mobile phones

Google has increased the maximum prize for its Android bug bounty program to $1 million for anyone who can compromise the Titan M security chip found in its Pixel phones. The top prize is for a “full chain remote code execution exploit with persistence” of the dedicated security chip. On top of that, there’s an additional 50 percent bonus if a security researcher is able to find an exploit on specific developer preview versions of Android, resulting in a potential prize of $1.5 million. The new rewards take effect starting today.

Introduced with 2018’s Pixel 3, Google’s Titan M security chip cordons off your smartphone’s most sensitive data from its main processor to protect against certain attacks. Google says the chip offers “on-device protection for login credentials, disk encryption, app data, and the integrity of the operating system.” Since its introduction, the chip has also been integrated with Android’s security key functionality where it’s used to store a person’s FIDO credentials. Suffice it to say, the integrity of the Titan M is an important element for the security of recent Pixel devices.

Nov 21, 2019

What Is End-to-End Encryption? Another Bull’s-Eye on Big Tech

Posted by in categories: encryption, law enforcement, security, terrorism

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

Nov 10, 2019

Komodo to lead blockchain revolution with quantum-safe cryptography

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption, quantum physics

Stadelmann said that Komodo is similar to Ethereum but it is 100% independent, free and open-sourced platform.

“As the world is getting digitised, it is all based on binary digits. Binary digits can have either 1 (on) or 0 (off). We don’t speak of bits anymore but quantum qubits or quantum bits, which can be in both 1 and 0 states at the same time. This qubit can attain so many states at the same time and they are also able to process calculations at a much faster rate than classical computers,” he said.

As a blockchain platform, Stadelmann said that Komodo is trying to solve the problem and has implemented quantum-safe cryptographic solutions for the past couple of years which will not be able to crack cryptographic signatures.

Nov 4, 2019

Ransomware Attacks Hit Everis and Spain’s Largest Radio Network

Posted by in categories: cybercrime/malcode, encryption

Everis, an NTT DATA company and one of Spain’s largest managed service providers (MSP), had its computer systems encrypted today in a ransomware attack, just as it happened to Spain’s largest radio station Cadena SER (Sociedad Española de Radiodifusión).

While the ransomware attacks were not yet publicly acknowledged by the company, the ransom note left on Everis’ encrypted computers has already leaked and BleepingComputer can confirm that the MSP’s data was infected using the BitPaymer ransomware.

Oct 25, 2019

Future Consequences of Cryptocurrency Use: Systemic Investigation of Two Scenarios

Posted by in categories: bitcoin, business, complex systems, counterterrorism, cryptocurrencies, cybercrime/malcode, disruptive technology, economics, education, employment, encryption, finance, futurism, governance, government, hacking, innovation, law enforcement, open access, policy, privacy, security, strategy, terrorism

We face complexity, ambiguity, and uncertainty about the future consequences of cryptocurrency use. There are doubts about the positive and negative impacts of the use of cryptocurrencies in the financial systems. In order to address better and deeper the contradictions and the consequences of the use of cryptocurrencies and also informing the key stakeholders about known and unknown emerging issues in new payment systems, we apply two helpful futures studies tools known as the “Future Wheel”, to identify the key factors, and “System Dynamics Conceptual Mapping”, to understand the relationships among such factors. Two key scenarios will be addressed. In on them, systemic feedback loops might be identified such as a) terrorism, the Achilles’ heel of the cryptocurrencies, b) hackers, the barrier against development, and c) information technology security professionals, a gap in the future job market. Also, in the other scenario, systemic feedback loops might be identified such as a) acceleration of technological entrepreneurship enabled by new payment systems, b) decentralization of financial ecosystem with some friction against it, c) blockchain and shift of banking business model, d) easy international payments triggering structural reforms, and e) the decline of the US and the end of dollar dominance in the global economy. In addition to the feedback loops, we can also identify chained links of consequences that impact productivity and economic growth on the one hand, and shift of energy sources and consumption on the other hand.

Watch the full length presentation at Victor V. Motti YouTube Channel

Oct 24, 2019

Quantum Physics: Ménage à Trois Photon-Style – 3 Pairs of Photons Entangled for Ultra-Strong Correlations

Posted by in categories: encryption, quantum physics

Entanglement is one of the properties specific to quantum particles. When two photons become entangled, for instance, the quantum state of the first will correlate perfectly with the quantum state of the second, even if they are at a distance from one another. But what happens when three pairs of entangled photons are placed in a network? Researchers at the University of Geneva (UNIGE), Switzerland, working in partnership with Tehran’s Institute for Research in Fundamental Sciences (IPM), have proved that this arrangement allows for a new form of quantum correlation in theory. When the scientists forced two photons from separate pairs to become entangled, the connection was also made with their twin photon present elsewhere in the network, forming a highly-correlated triangle. These results, which you can read all about in the journal Physical Review Letters, create the potential for new applications in cryptography while reviving quantum physics at its most fundamental level.

Entanglement involves two quantum particles – photons, for example – forming a single physical system in spite of the distance between them. Every action performed on one of the two photons has an impact on its “twin” photon. This principle of entanglement leads to quantum non-locality: the measurements and statistics of the properties observed on one of the photons are very closely correlated with the measurements made on the other photon. “Quantum non-locality was discovered theoretically by John Stewart Bell in 1964,” begins Nicolas Brunner, associate professor in the Department of Applied Physics in UNIGE’s Faculty of Science. “This showed that photon correlations are exclusively quantum in nature, and so can’t be explained by conventional physics. This principle could be used to generate ultra-secure encryption keys.”

Oct 22, 2019

Without encryption we will lose all privacy. This is our new battleground

Posted by in categories: computing, encryption, government, security, surveillance

And yet, in the midst of the greatest computer security crisis in history, the US government, along with the governments of the UK and Australia, is attempting to undermine the only method that currently exists for reliably protecting the world’s information: encryption. Should they succeed in their quest to undermine encryption, our public infrastructure and private lives will be rendered permanently unsafe.


The US, UK and Australia are taking on Facebook in a bid to undermine the only method that protects our personal information.

• Edward Snowden is a US surveillance whistleblower.

Continue reading “Without encryption we will lose all privacy. This is our new battleground” »

Oct 14, 2019

3D integrated metasurfaces stacking up for impressive holography

Posted by in categories: computing, encryption, engineering, holograms, nanotechnology, physics, security, transportation

Physicists and materials scientists have developed a compact optical device containing vertically stacked metasurfaces that can generate microscopic text and full-color holograms for encrypted data storage and color displays. Yueqiang Hu and a research team in Advanced Design and Manufacturing for Vehicle Body in the College of Mechanical and Vehicle Engineering in China implemented a 3D integrated metasurface device to facilitate miniaturization of the optical device. Using metasurfaces with ultrathin and compact characteristics, the research team designed optical elements by engineering the wavefront of light at the subwavelength scale. The metasurfaces possessed great potential to integrate multiple functions into the miniaturized optoelectronic systems. The work is now published on Light: Science & Applications.

Since existing research on multiplexing in the 2-D plane remains to fully incorporate capabilities of metasurfaces for multi-tasking, in the present work, the team demonstrated a 3D integrated metasurface device. For this, they stacked a hologram metasurface on a monolithic Fabry-Pérot (FP) cavity-based color filter microarray to achieve simultaneous cross-talk, polarization-independent and highly efficient full-color holography and microprint functions. The dual function of the device outlined a new scheme for data recording, security, encryption and information processing applications. The work on 3D integration can be extended to establish flat multi-tasking optical systems that include a variety of functional metasurface layers.

Metasurfaces open a new direction in optoelectronics, allowing researchers to design optical elements by shaping the wavefront of electromagnetic waves relative to size, shape and arrangement of structures at the subwavelength. Physicists have engineered a variety of metasurface-based devices including lenses, polarization converters, holograms and orbital angular momentum generators (OAM). They have demonstrated the performance of metasurface-based devices to even surpass conventional refractive elements to construct compact optical devices with multiple functions. Such devices are, however, withheld by shortcomings due to a reduced efficiency of plasmonic nanostructures, polarization requirements, large crosstalk and complexity of the readout for multiwavelength and broadband optical devices. Research teams can therefore stack 3D metasurface-based devices with different functions in the vertical direction to combine the advantages of each device.

Oct 11, 2019

Quantum Teleportation on the Nanoscale Using a Chemical Reaction

Posted by in categories: chemistry, computing, encryption, nanotechnology, quantum physics

A team of Northwestern University researchers is the first to document the role chemistry will play in next generation computing and communication. By applying their expertise to the field of Quantum Information Science (QIS), they discovered how to move quantum information on the nanoscale through quantum teleportation—an emerging topic within the field of QIS. Their findings were published in the journal, Nature Chemistry, on September 23, 2019, and have untold potential to influence future research and application.

Quantum teleportation allows for the transfer of quantum information from one location to another, in addition to a more secure delivery of that information through significantly improved encryption.

The QIS field of research has long been the domain of physicists, and only in the past decade has drawn the attention and involvement of chemists who have applied their expertise to exploit the quantum nature of molecules for QIS applications.

Page 32 of 58First2930313233343536Last