cyber security

Paving the way to secure digital communications in the post-quantum era
via Ritsumeikan University Paving the way to secure digital communications in the post-quantum era Scientists
A new ‘self-aware and self-healing’ algorithm to ward off hacking attempts could protect nuclear plants, electric grids and more
Purdue researchers have developed a novel self-cognizant and healing technology for industrial control systems against
A new type of online attack that can evade any known defense
via wgu.edu A new type of online attack that can evade any known defense Cornell
Fooling hackers into sharing keys for better cybersecurity
via UT Dallas Fooling hackers into sharing keys for better cybersecurity Instead of blocking hackers,
Cybersecurity has an analog memory hardware solution to a digital problem

UCSB researchers use emerging memory devices to develop electronic circuits for cybersecurity applications While we

How to stop cyber intrusions using Majorana particles

U.S. Army-funded researchers at the University of California in Los Angles have found a proverbial

Cybersecurity: Photos can be traced to individual smartphones

Like bullets fired from a gun, photos can be traced to individual smartphones, opening up

DARPA aims research funding at a low cost unhackable computer

By turning computer circuits into unsolvable puzzles, a University of Michigan team aims to create

A low-cost nanomaterial may be the ultimate defense against hackers

NYU Tandon Researchers Discover Big Cryptographic Potential in Nanomaterial The next generation of electronic hardware

The first product that enables automated forensics for cyber attack details

Until now, assessing the extent and impact of network or computer system attacks has been

Why we should be worried about the evolution of cyberattacks

There have been times over the last two months when Golan Ben-Oni has felt like

Voice hacking app will help thwart growing cybersecurity threat

Study describes how app, soon to be available, will help thwart growing cybersecurity threat While

Typical office scanner can be used as a cyberattack tool via laser or smartbulb

A typical office scanner can be infiltrated and a company’s network compromised using different light

Cyber-security – The internet of stings

TO A layman, the phrase “Internet of Things” (IoT) probably conjures up a half-fantastic future

Setting up a decoy network may help deflect a hacker’s hits

Computer networks may never float like a butterfly, but Penn State information scientists suggest that