Advertisement
Security
Subscribe to Security

The Lead

Hamlin, left, and Webb with a book about breaking the Nazi Enigma code, which was also the subject of the recent film, The Imitation Game. Courtesy of Rebecca Phillips, WSU

Mathematicians adapt Knapsack Code to take on Quantum-level Cyber Attacks

March 27, 2015 11:24 am | by Rebecca Phillips, Washington State University | News | Comments

Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

Better Debugger: Algorithm Automatically Finds Integer-overflow Bugs

March 26, 2015 9:52 am | by Larry Hardesty, MIT | News | Comments

Integer overflows are one of the most common bugs in computer programs — not only causing...

Cryptography for Everyone: Bringing End-to-end Encryption to the Masses

March 17, 2015 2:42 pm | by Fraunhofer-Gesellschaft | News | Comments

In the wake of the revelations that intelligence agencies have been engaged in mass surveillance...

Once-in-a-Century: Celebrating 10 Digits of Pi on 3.14.15 at 9:26:53

March 12, 2015 9:42 am | by Suzanne Tracy, Editor-in-Chief, Scientific Computing and HPC Source | Blogs | Comments

An e-pi-c day is coming! On 3.14.15 at 9:26:53; the date/time will correspond to the first 10...

View Sample

FREE Email Newsletter

From April onward De-Mail, an e-mail service available to anyone in Germany, will feature end-to-end encryption based on the Pretty Good Privacy system. Courtesy of Safwat Sayed

German Government Backs End-to-End E-mail Encryption

March 10, 2015 10:29 am | by Frank Jordans, Associated Press | News | Comments

Users of an e-mail service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers, officials said on March 9, 2015. From April onward De-Mail, an e-mail service available to anyone in Germany, will feature end-to-end encryption based on the Pretty Good Privacy system.

A 3.15 mm QR code storing an encrypted and compressed image shown placed on an integrated circuit and an image of the QR code placed next to a dime. Courtesy of Adam Markman/Brhram Javidi

Ordinary QR Code Transformed into High-End Cybersecurity Application

March 2, 2015 11:21 am | by Colin Poitras, University of Connecticut | News | Comments

QR codes have been used to convey information about everything from cereals to cars and new homes. But researchers think the codes have a greater potential: protecting national security. Using advanced 3-D optical imaging and extremely low light photon counting encryption, researchers have taken the ordinary QR code and transformed it into a high-end cybersecurity application to protect the integrity of computer microchips.

Russia's defense ministry is establishing its own cyber command responsible for offensive activities, "including propaganda operations and inserting malware into enemy command and control systems." Courtesy of Contando Estrelas

Russian Cyber Threat more Severe than Previously Assessed

February 26, 2015 1:11 pm | by Ken Dilanian, AP Intelligence Writer | News | Comments

The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said February 26, 2015, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country. "While I can't go into detail here, the Russian cyber threat is more severe than we had previously assessed," James Clapper, the director of national intelligence, told the Senate Armed Services Committee.

Advertisement
Building on two decades of incremental research on data storage, IMDEA Networks launches the scientific project ATOMICDFS, with the aim to tackle the challenge of “Seeking Efficient Atomic Implementations of Distributed Data Storage.”

Achieving Efficient, Strongly Consistent Data Storage

February 18, 2015 12:15 pm | by Nicolas Nicolaou, IMDEA Networks Institute | Blogs | Comments

One of the fundamental and open problems in computer science is effective data storage. Unfortunately, magnetic and flash storage devices alone have proven to be unreliable to guarantee data availability and survivability, due to their frequent and unpredictable failures. ATOMICDFS aims to investigate the existence of highly efficient DFS able to provide atomic guarantees in harsh environments.

id the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world?  A new report from Russian cybersecurity firm Kaspersky Lab said its resear

Cyber Espionage: Seagate, Western Digital, Toshiba, IBM Products Reported Compromised

February 18, 2015 9:36 am | by Brandon Bailey, AP Technology Writer | News | Comments

Did the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world? A new report from Russian cybersecurity firm Kaspersky Lab said its researchers identified a new family of malicious programs or worms that infected computers in multiple countries, primarily overseas.

Apple CEO Tim Cook, right, watches as President Barack Obama speaks during a summit on cybersecurity and consumer protection at Stanford University in Palo Alto, CA. (AP Photo/Evan Vucci)

Obama calls on Silicon Valley to help thwart Cyber Attacks

February 17, 2015 2:15 pm | by Darlene Superville and Martha Mendoza, Associated Press | News | Comments

Cyberspace is the new "Wild West," President Barack Obama said, with everyone looking to the government to be the sheriff. But he told the private sector it must do more to stop cyber attacks aimed at the U.S. every day. Obama signed an executive order aimed at making it easier for private firms to have access to classified information about cyber attacks.

Cybersecurity students Kai Greshake, Eric Petryka and Jens Heyens have discovered 39,890 unprotected Internet databases.

Security Gaps Discovered in 39,890 Online Databases

February 11, 2015 12:24 pm | by University Saarland | News | Comments

Due to a misconfigured open source database upon which millions of online stores and platforms from all over the world base their services, anyone had the ability to call up or modify several million pieces of customer data online including names, addresses and e-mails. According to the Center for IT-Security, Privacy and Accountability, this vulnerability was demonstrated for 40,000 online databases.

Map generated by more than 250 million public tweets Courtesy of Salathé et al.

Digital Disease Detection: Using Big Data to Detect Outbreaks

February 10, 2015 11:42 am | by PLOS | News | Comments

Personal information taken from social media, blogs, page views and so on is used to detect disease outbreaks, but does this violate our privacy, consent and trust? Dr. Effy Vayena from the University of Zurich and colleagues have mapped the numerous ethical challenges confronting digital disease detection and propose a framework to address the questions.

Advertisement
The Alan Turing Institute will promote the development and use of advanced mathematics, computer science, algorithms and big data for human benefit.

Alan Turing Institute Positioned to Break New Big Data, Online Security Boundaries

January 30, 2015 11:41 am | by Engineering and Physical Sciences Research Council | News | Comments

The five universities have been selected to lead the new Alan Turing Institute. The Institute will build on the UK's existing academic strengths and help position the country as a world leader in the analysis and application of big data and algorithm research. Its headquarters will be based at the British Library at the center of London’s Knowledge Quarter.

Dr. Jan Camenisch, cryptographer and data privacy scientist at IBM Research holds a piece of the IBM identity Mixer algorithm.

Sophisticated Cryptographic Algorithm Prevents Unwanted Sharing of Personal Data

January 29, 2015 9:23 am | by IBM | News | Comments

IBM researchers have announced a cloud-based technology that holds potential to help consumers better protect online personal data, including date of birth, home address and credit card numbers. The technology, called Identity Mixer, uses a cryptographic algorithm to encrypt the certified identity attributes of a user in a way that allows the user to reveal only selected pieces to third parties.

The Biosurveillance Gateway site offers a variety of Los Alamos-developed biosurveillance tools that can be used for decision support in disease surveillance.

Biosurveillance Gateway Supports Centralized Global Disease Response

January 28, 2015 2:21 pm | by Los Alamos National Laboratory | News | Comments

A new online resource, called the Biosurveillance Gateway, is in place at Los Alamos National Laboratory, providing a centralized portal for all news, information, resources and research related to biosurveillance at the laboratory. The goal of the site is to support global disease surveillance, providing useful tools for professionals around the world to reference from a single location.

The intelligent keyboard records each letter touched, but also captures information about the amount of force applied to the key and the length of time between one keystroke and the next. Such typing style is unique to individuals, and so could provide a

Self-powered Intelligent Keyboard could Provide New Layer of Biometric Security

January 27, 2015 10:12 am | by John Toon, Georgia Institute of Technology | News | Comments

By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users. The self-powered device generates electricity when a user’s fingertips contact the multi-layer plastic materials that make up the device.

Einstein-Podolsky-Rosen (EPR) quantum mechanics paradox

Extending Einstein's Spooky Actions for Use in Quantum Networks

January 26, 2015 4:18 pm | by Swinburne University of Technology | News | Comments

Researchers have demonstrated that the 1935 Einstein-Podolsky-Rosen quantum mechanics paradox may be extended to more than two optical systems, paving the way for exploration of larger quantum networks. The experiment also identified properties that may be useful in establishing secure quantum communication networks where shared sequences of numbers created between two parties need to be kept secret from a third party.

Advertisement
A notebook by Alan Turing, the World War II code-breaking genius depicted by Benedict Cumberbatch in the Oscar-nominated "The Imitation Game," is shown in a special preview at Bonhams auctioneers. The 56-page manuscript, containing Turing's complex mathem

British Code Breaker Alan Turing's Notebook Goes to Auction

January 26, 2015 1:33 pm | by AP | News | Comments

A handwritten notebook by Alan Turing, the World War II code-breaking genius depicted by Benedict Cumberbatch in the Oscar-nominated The Imitation Game, is going on the auction block. The 56-page manuscript was written at the time the British mathematician and computer science pioneer was working to break the seemingly unbreakable Enigma codes used by the Germans throughout World War II. It is expected to bring at least $1 million.

The Repository of Industrial Security Incidents is a database of incidents of a cybersecurity nature that have (or could have) affected process control, industrial automation or Supervisory Control and Data Acquisition (SCADA) systems.

Cybersecurity Expert Warns Not Enough Being Done to Prevent Highly Destructive Cyberattacks on Critical Infrastructure

January 21, 2015 1:13 pm | by International Society of Automation | News | Comments

Inadequate training and a culture of complacency among many owners and operators of critical infrastructure are significantly raising the risks of highly damaging cyberattack throughout the world. That’s the viewpoint expressed by Steve Mustard, an industrial cybersecurity subject-matter expert and consultant with extensive development and management experience in real-time embedded equipment and automation systems.

President Barack Obama, right, walks with British Prime Minister David Cameron on the West Wing Colonnade of the White House, on Thursday, January 15, 2015, in Washington. (AP Photo/Evan Vucci)

US, Britain to Stage Cyber War Games

January 16, 2015 12:02 pm | by Josh Lederman, Associated Press | News | Comments

The U.S. and U.K. will stage cyber "war games" together, starting this year, to boost both countries' resistance to cyberattacks, Britain's government said. The two Western powers have also agreed to launch a joint cyber cell to share information on cyberthreats, as both countries seek to ramp up their cyberdefenses in the wake of alarming attacks. The FBI and National Security Agency will be involved, along with Britain's GCHQ and MI5...

Automated systems for isolating collected data, restricting queries that can be made against those data, and auditing usage of the data can help to enforce privacy protections and allay some civil liberty concerns.

Surveillance: NRC finds No Alternative to Bulk Data Collection

January 15, 2015 12:10 pm | by The National Academies | News | Comments

No software-based technique can fully replace bulk collection of signals intelligence, but methods can be developed to more effectively conduct targeted collection and to control usage of collected data, says the NRC. Automated systems for isolating collected data, restricting queries that can be made against those data, and auditing usage of the data can help to enforce privacy protections and allay some civil liberty concerns.

President Barack Obama speaks at the National Cybersecurity and Communications Integration Center in Arlington, VA, January 13, 2015. Obama renewed his call for Congress to pass cybersecurity legislation, including a proposal that encourages companies to

Obama Unveils Cybersecurity Proposals in Advance of State of the Union Address

January 14, 2015 11:46 am | by Jack Gillum, Associated Press | News | Comments

President Barack Obama has said that recent cyberthreats to Sony and the military's U.S. Central Command are reminders of the serious threats facing the nation. Obama laid out plans on January 13, 2015, as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats.

Measuring side-channel signals2: Georgia Tech researcher Alenka Zajic measures electromagnetic emissions from various components of a desktop computer. The researchers have studied emissions from desktop and laptop computers, as well as cellphones.

Countering Side-channel Hacker Attacks

January 14, 2015 11:35 am | by Georgia Institute of Technology | News | Comments

If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s Wi-Fi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits, even when it’s not connected to the Internet. Side-channel signals could provide hackers with another way to see what the devices are doing.

IBM broke the U.S. patent record in 2014, becoming the first company to exceed 7,000 patents in a single year. More than 8,500 IBM inventors around the world, including researcher Stacy Hobson (pictured), produced 7,534 patents for IBM in 2014.

IBM Breaks U.S. Patent Record

January 13, 2015 10:35 am | by IBM | News | Comments

IBM has announced that it received a record 7,534 patents in 2014 — marking the 22nd consecutive year that the company topped the annual list of U.S. patent recipients. IBM inventors earned an average of more than 20 patents per day in 2014, propelling the company to become the first to surpass more than 7,000 patents in a single year.

IEEE Computer Society has announced the top 10 most important technology trends for 2015 and explores how these technologies will be integrated into daily life.

IEEE Unveils Top 10 Technology Trends for 2015

January 12, 2015 12:10 pm | by IEEE | News | Comments

In the coming year, while consumers will be treated to a dizzying array of augmented reality, wearables, and low-cost 3-D printers, computer researchers will be tackling the underlying technology issues that make such cutting-edge consumer electronics products possible. IEEE Computer Society has announced the top 10 most important technology trends for 2015 and explores how these technologies will be integrated into daily life.

Hole cards in a game of Texas Hold 'em. A computer program that taught itself to play poker has created nearly the best possible strategy for one version of the game, showing the value of techniques that may prove useful for real-world challenges Courtesy

Game Theory: Self-taught Program Finds Ideal Poker Strategy

January 9, 2015 10:14 am | by Malcolm Ritter, AP Science Writer | News | Comments

A computer program that taught itself to play poker has created nearly the best possible strategy for one version of the game, showing the value of techniques that may prove useful to help decision-making in medicine and other areas. The program considered 24 trillion simulated poker hands per second for two months, probably playing more poker than all humanity has ever experienced.

Geoff Pryde from Griffith's Centre for Quantum Dynamics led a team that showed the quantum-refereed steering protocol can match tests for strong entanglement in not requiring trust in the measuring devices, and has the further advantage of being robust to

Quantum Steering Enhances Internet Data Security

January 8, 2015 12:26 pm | by Griffith University | News | Comments

Research conducted at Griffith University may lead to greatly improved security of information transfer over the Internet. Physicists from the Centre for Quantum Dynamics demonstrate the potential for "quantum steering" to be used to enhance data security over long distances, discourage hackers and eavesdroppers and resolve issues of trust with communication devices.

A smart home can be controlled remotely, inviting hacking.

Smart Homes: Working to Prevent a Cybersecurity Nightmare

January 7, 2015 12:59 pm | by Jennifer Donovan, Michigan Technological University | News | Comments

Imagine the smart home of the future. Thanks to a central controller and Wi-Fi, not only does the thermostat power up and warm or cool the house as you are heading home, smart light bulbs come on low at dusk and brighten up as the sky gets darker; and your washing machine starts a load of clothes when the electricity is cheapest. But what if a hacker gained access to your central controller? Your heat has been on full blast all day ...

The FBI is recruiting new cyber special agents, along with computer scientists, digital forensic examiners, and cyber-skilled interns.

FBI Seeking Tech Experts to Become Cyber Special Agents

January 2, 2015 12:22 pm | by FBI | News | Comments

Since its earliest days, the FBI has looked for recruits with specialized skills to fill its special agent ranks. Today, the most sought-after candidates possess a uniquely 21st century quality: cyber expertise. To keep pace with the evolving threat, the Bureau is appealing to experienced and certified cyber experts to consider joining the FBI to apply their well-honed tradecraft as cyber special agents.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading