Cybersecurity

Paving the way to secure digital communications in the post-quantum era
via Ritsumeikan University Paving the way to secure digital communications in the post-quantum era Scientists
Using the theory of relativity for unhackable blockchain and cryptocurrency data transfers
A graph with its 3-colouring. For each edge, we check that the two connected vertices
A real game changer in cybersecurity: Using chaos to protect devices from hackers
New technology creates digital fingerprints that may be next to impossible to hack A real
Fooling hackers into sharing keys for better cybersecurity
via UT Dallas Fooling hackers into sharing keys for better cybersecurity Instead of blocking hackers,
Using connected cars to gridlock entire cities

In the year 2026, at rush hour, your self-driving car abruptly shuts down right where

Cybersecurity has an analog memory hardware solution to a digital problem

UCSB researchers use emerging memory devices to develop electronic circuits for cybersecurity applications While we

How to stop cyber intrusions using Majorana particles

U.S. Army-funded researchers at the University of California in Los Angles have found a proverbial

Cybersecurity: Photos can be traced to individual smartphones

Like bullets fired from a gun, photos can be traced to individual smartphones, opening up

DARPA aims research funding at a low cost unhackable computer

By turning computer circuits into unsolvable puzzles, a University of Michigan team aims to create

A low-cost nanomaterial may be the ultimate defense against hackers

NYU Tandon Researchers Discover Big Cryptographic Potential in Nanomaterial The next generation of electronic hardware

The first product that enables automated forensics for cyber attack details

Until now, assessing the extent and impact of network or computer system attacks has been

Why we should be worried about the evolution of cyberattacks

There have been times over the last two months when Golan Ben-Oni has felt like

Voice hacking app will help thwart growing cybersecurity threat

Study describes how app, soon to be available, will help thwart growing cybersecurity threat While

Typical office scanner can be used as a cyberattack tool via laser or smartbulb

A typical office scanner can be infiltrated and a company’s network compromised using different light

Researchers have developed a new form of ransomware that can take over control of a simulated water treatment plant

Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware