БЛОГ

Archive for the ‘security’ category: Page 28

Nov 9, 2022

Paving the Way for Satellite Quantum Communications

Posted by in categories: computing, encryption, quantum physics, satellites, security

A series of demonstrations by Micius—a low-orbit satellite with quantum capabilities—lays the groundwork for a satellite-based quantum communication network.

Few things have captured the scientific imagination quite like the vastness of space and the promise of quantum technology. Micius—the Chinese Academy of Science’s quantum communications satellite launched in 2016—has connected these two inspiring domains, producing a string of exciting first demonstrations in quantum space communications. Reviewing the efforts leading up to the satellite launch and the major outcomes of the mission, Jian-Wei Pan and colleagues at the University of Science and Technology of China provide a perspective on what the future of quantum space communications may look like [1]. The success of this quantum-satellite mission proves the viability of several space-based quantum communications protocols, providing a solid foundation for future improvements that may lead to an Earth-spanning quantum communications network (Fig. 1).

Photons, the quanta of light, are wonderful carriers of quantum information because they are easy to manipulate and travel extremely fast. They can be created in a desired quantum state or as the output of some quantum sensor or quantum computer. Quantum entanglement between multiple photons—the nonclassical correlation between their quantum states—can be amazingly useful in quantum communications protocols such as quantum key distribution (QKD), a cryptography approach that can theoretically guarantee absolute information security. QKD schemes have been demonstrated on distances of a few hundreds of kilometers—sufficient to cover communications networks between cities. But increasing their range, eventually to the global scale, is a formidable challenge.

Nov 8, 2022

Quantum materials enable next-generation photonics and mobile networks in the terahertz regime

Posted by in categories: quantum physics, security

Terahertz light, radiation in the far-infrared part of the emission spectrum, is currently not fully exploited in technology, although it shows great potential for many applications in sensing, homeland security screening, and future (sixth generation) mobile networks.

Indeed, this radiation is harmless due to its small photon energy, but it can penetrate many materials (such as skin, packaging, etc.). In the last decade, a number of research groups have focused their attention on identifying techniques and materials to efficiently generate THz electromagnetic waves: among them is the wonder material graphene, which, however, does not provide the desired results. In particular, the generated terahertz output power is limited.

Better performance has now been achieved by topological insulators (TIs)—quantum materials that behave as insulators in the bulk while exhibiting conductive properties on the surface—according to a paper recently published in Light: Science & Applications.

Nov 7, 2022

Quantum Cryptography Is Unbreakable. So Is Human Ingenuity

Posted by in categories: business, computing, encryption, government, internet, mathematics, privacy, quantum physics, security

face_with_colon_three circa 2016.


Two basic types of encryption schemes are used on the internet today. One, known as symmetric-key cryptography, follows the same pattern that people have been using to send secret messages for thousands of years. If Alice wants to send Bob a secret message, they start by getting together somewhere they can’t be overheard and agree on a secret key; later, when they are separated, they can use this key to send messages that Eve the eavesdropper can’t understand even if she overhears them. This is the sort of encryption used when you set up an online account with your neighborhood bank; you and your bank already know private information about each other, and use that information to set up a secret password to protect your messages.

The second scheme is called public-key cryptography, and it was invented only in the 1970s. As the name suggests, these are systems where Alice and Bob agree on their key, or part of it, by exchanging only public information. This is incredibly useful in modern electronic commerce: if you want to send your credit card number safely over the internet to Amazon, for instance, you don’t want to have to drive to their headquarters to have a secret meeting first. Public-key systems rely on the fact that some mathematical processes seem to be easy to do, but difficult to undo. For example, for Alice to take two large whole numbers and multiply them is relatively easy; for Eve to take the result and recover the original numbers seems much harder.

Continue reading “Quantum Cryptography Is Unbreakable. So Is Human Ingenuity” »

Nov 7, 2022

New camera system taps into terahertz wavelengths for better imaging

Posted by in categories: materials, security

A team of engineers has developed a new type of camera that can detect radiation in terahertz (THz) wavelengths. This new imaging system can see through certain materials in high detail, which could make it useful for security scanners and other sensors.

Terahertz radiation is that which has wavelengths between microwaves and visible light, and these frequencies show promise in a new class of imaging systems. They can penetrate many materials and capture new levels of detail, and importantly the radiation is non-ionizing, meaning it’s safer than X-rays when used on humans.

The problem is that detectors that pick up THz wavelengths can be bulky, slow, expensive, difficult to run under practical conditions, or some combination of these. But in a new study, researchers at MIT, Samsung and the University of Minnesota have developed a system that can detect THz pulses quickly, precisely and at regular room temperature and pressure.

Nov 7, 2022

A startup building software to encrypt messaging tools such as Slack just raised $11 million from Molten Ventures. Check out the 17-slide pitch deck Worldr used to secure the round

Posted by in categories: encryption, security

The company gives its customers full control over their data and claims to increase security, with a focus on compliance and auditing.

Nov 5, 2022

Chinese scientists turn a simple wire into laser-like light

Posted by in categories: mobile phones, security

The invention could enhance the speed of electronic devices and improve security screening technology.

Chinese scientists have conceived of a new method for generating laser-like light that could significantly enhance the communication speed of everyday electronics, according to a report by the South China Morning Post.

The new device that makes this light possible is known as a free-electron laser, and it has been developed by scientists from the Shanghai Institute of Optics and Fine Mechanics under the Chinese Academy of Sciences.

Continue reading “Chinese scientists turn a simple wire into laser-like light” »

Nov 3, 2022

Researchers discover security loophole allowing attackers to use Wi-Fi to see through walls

Posted by in categories: drones, internet, security

A research team based out of the University of Waterloo has developed a drone-powered device that can use Wi-Fi networks to see through walls.

The , nicknamed Wi-Peep, can fly near a building and then use the inhabitants’ Wi-Fi network to identify and locate all Wi-Fi-enabled devices inside in a matter of seconds.

The Wi-Peep exploits a loophole the researchers call polite Wi-Fi. Even if a network is password protected, will automatically respond to contact attempts from any device within range. The Wi-Peep sends several messages to a device as it flies and then measures the response time on each, enabling it to identify the device’s location to within a meter.

Nov 3, 2022

Malicious Android apps with 1M+ installs found on Google Play

Posted by in categories: mobile phones, security

A set of four malicious applications currently available in Google Play, the official store for the Android system, are directing users sites that steal sensitive information or generate ‘pay-per-click’ revenue for the operators.

Some of these sites offer victims to download fake security tools or updates, to trick users into installing the malicious files manually.

At the time of publishing, the apps are still present on Google Play under a developer account called Mobile apps Group, and have a total install count of more than one million.

Oct 29, 2022

Light-analyzing ‘lab on a chip’ opens door to widespread use of portable spectrometers

Posted by in categories: biotech/medical, mobile phones, robotics/AI, security

Scientists including an Oregon State University materials researcher have developed a better tool to measure light, contributing to a field known as optical spectrometry in a way that could improve everything from smartphone cameras to environmental monitoring.

The study, published today in Science, was led by Finland’s Aalto University and resulted in a powerful, ultra-tiny that fits on a microchip and is operated using artificial intelligence.

The research involved a comparatively new class of super-thin materials known as two-dimensional semiconductors, and the upshot is a proof of concept for a spectrometer that could be readily incorporated into a variety of technologies—including quality inspection platforms, security sensors, biomedical analyzers and space telescopes.

Oct 29, 2022

These Dropper Apps On Play Store Targeting Over 200 Banking and Cryptocurrency Wallets

Posted by in categories: cryptocurrencies, evolution, finance, internet, security

Five malicious dropper Android apps with over 130,000 cumulative installations have been discovered on the Google Play Store distributing banking trojans like SharkBot and Vultur, which are capable of stealing financial data and performing on-device fraud.

“These droppers continue the unstopping evolution of malicious apps sneaking to the official store,” Dutch mobile security firm ThreatFabric told The Hacker News in a statement.

“This evolution includes following newly introduced policies and masquerading as file managers and overcoming limitations by side-loading the malicious payload through the web browser.”

Page 28 of 128First2526272829303132Last