Innovation Toronto Innovation Toronto

.

Everything starts with an idea . . .

  • About Us
    • Privacy Policy
  • List of Institutions
  • Institution Updates
  • 1MM to 3MM Visitors
    • 2MM to 3MM Visitors
    • 1MM to 2MM Visits
  • 100k to 1MM Visitors
    • 500k to 1MM Visitors
    • 300k to 500k Visitors
    • 200k to 300k Visits
    • 100k to 200k Visits
  • Up to 100k Visitors
    • 50k to 100k Visits
    • 25K to 50K Visits
    • 10k to 25k Visits
    • Under 10k Visits
Menu
  • About Us
    • Privacy Policy
  • List of Institutions
  • Institution Updates
  • 1MM to 3MM Visitors
    • 2MM to 3MM Visitors
    • 1MM to 2MM Visits
  • 100k to 1MM Visitors
    • 500k to 1MM Visitors
    • 300k to 500k Visitors
    • 200k to 300k Visits
    • 100k to 200k Visits
  • Up to 100k Visitors
    • 50k to 100k Visits
    • 25K to 50K Visits
    • 10k to 25k Visits
    • Under 10k Visits
loading...
The Latest
  • Opening and closing the blood-nerve barrier for the first time to deliver drugs
  • Producing chemicals without the harmful byproducts and large energy demands of current manufacturing techniques
  • Using a smartphone camera to detect and diagnose medical conditions with an AI-driven mobile health algorithm
  • Color-changing materials indicate when drugs or food gets too warm
  • A high-performance elastocaloric cooling system that could represent the next generation of climate friendly AC
  • Could a new superlubricity coating reduce economic losses of 1 trillion dollars from friction and wear?
  • AI clones made from user data pose uncanny risks
  • Is AI capable of predicting someone’s emotional response to events before they occur – today?
  • A smart sensor ring for health care and extended reality
  • Could Greenlandic glacial rock flour really help to stop climate change?
Home cybersecurity

Real cybersecurity using only a single quantum bit gets real

Real cybersecurity using only a single quantum bit gets real

Read more

Share 0
Tweet
Share
Share

A real game changer in cybersecurity: Using chaos to protect devices from hackers

A real game changer in cybersecurity: Using chaos to protect devices from hackers

Read more

Share 0
Tweet
Share
Share

Fooling hackers into sharing keys for better cybersecurity

Fooling hackers into sharing keys for better cybersecurity

Read more

Share 0
Tweet
Share
Share

One more step to a super-secure quantum internet

One more step to a super-secure quantum internet

Scientists have managed to send a record-breaking amount of data in quantum form, using a strange unit of quantum information called a qutrit. The news: Quantum tech promises to allow data t... Read more

Share 0
Tweet
Share
Share

Fighting deep fakes with a deep neural network

Fighting deep fakes with a deep neural network

Artificial intelligence to accurately detect altered photos is getting smarter Seeing was believing until technology reared its mighty head and gave us powerful and inexpensive photo-editing... Read more

Share 0
Tweet
Share
Share

Cybersecurity has an analog memory hardware solution to a digital problem

Cybersecurity has an analog memory hardware solution to a digital problem

UCSB researchers use emerging memory devices to develop electronic circuits for cybersecurity applications While we embrace the way the Internet of Things already is making our lives more st... Read more

Share 0
Tweet
Share
Share

DARPA aims research funding at a low cost unhackable computer

DARPA aims research funding at a low cost unhackable computer

By turning computer circuits into unsolvable puzzles, a University of Michigan team aims to create an unhackable computer with a new $3.6 million grant from the Defense Advanced Research Pro... Read more

Share 0
Tweet
Share
Share

A low-cost nanomaterial may be the ultimate defense against hackers

A low-cost nanomaterial may be the ultimate defense against hackers

NYU Tandon Researchers Discover Big Cryptographic Potential in Nanomaterial The next generation of electronic hardware security may be at hand as researchers at New York University Tandon Sc... Read more

Share 0
Tweet
Share
Share

It is possible to remotely compromise a computer using information stored in DNA

It is possible to remotely compromise a computer using information stored in DNA

Rapid improvement in DNA sequencing has sparked a proliferation of medical and genetic tests that promise to reveal everything from one’s ancestry to fitness levels to microorganisms that li... Read more

Share 0
Tweet
Share
Share

Why we should be worried about the evolution of cyberattacks

Why we should be worried about the evolution of cyberattacks

There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness. On April 29, someone hit his employer, IDT Corporation, with two cyberweapons that... Read more

Share 0
Tweet
Share
Share

Voice hacking app will help thwart growing cybersecurity threat

Voice hacking app will help thwart growing cybersecurity threat

Study describes how app, soon to be available, will help thwart growing cybersecurity threat While convenient, Siri, WeChat and other voice-based smartphone apps can expose you to a growing... Read more

Share 0
Tweet
Share
Share

Researchers have developed a new form of ransomware that can take over control of a simulated water treatment plant

Researchers have developed a new form of ransomware that can take over control of a simulated water treatment plant

Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. After gainin... Read more

Share 0
Tweet
Share
Share

Cyber-security – The internet of stings

Cyber-security - The internet of stings

TO A layman, the phrase “Internet of Things” (IoT) probably conjures up a half-fantastic future in which refrigerators monitor their own contents and send orders direct to the grocer when th... Read more

Share 0
Tweet
Share
Share

Ransomware will be going extinct shortly thanks to CryptoDrop

Ransomware will be going extinct shortly thanks to CryptoDrop

Researchers develop a way to stop ransomware Ransomware – what hackers use to encrypt your computer files and demand money in exchange for freeing those contents – is an explodin... Read more

Share 0
Tweet
Share
Share

Security thinking for the internet of things

Security thinking for the internet of things

In the nascent “internet of things”, security is the last thing on people’s minds BARBIE has come a long way since Mattel, a big American toy firm, launched the plastic doll in 1959. If chil... Read more

Share 0
Tweet
Share
Share
12

Most Visited Today

Most Visited This Week

Most Visited This Month

Featured Today . . .

Opening and closing the blood-nerve barrier for the first time to deliver drugs

Read More
on 08 June 2023

Producing chemicals without the harmful byproducts and large energy demands of current manufacturing techniques

Read More
on 08 June 2023

Using a smartphone camera to detect and diagnose medical conditions with an AI-driven mobile health algorithm

Read More
on 07 June 2023

Color-changing materials indicate when drugs or food gets too warm

Read More
on 07 June 2023
load more
The Latest University & Research Institutions Updated . . .

University College London

University of California Merced (UCM)

RWTH Aachen University

McGovern Institute for Brain Research

load more

Copyright 2023. Created by Innovation Toronto

Desktop Version Mobile Version