Tuesday, September 17, 2019
Home Tags Security

Tag: security

quantum chipsvideo

Delft Scientists Make First ‘on Demand’ Entanglement Link

Researchers at QuTech in Delft have succeeded in generating quantum entanglement between two quantum chips faster than the entanglement is lost. Entanglement - once...
food as medicine

Food as Medicine: Fixing Health with a Fork

The idea that food has medicinal properties dates to Antiquity but has seen a revival in recent times with an abundance of research, journals,...
quantum networks

Developing a Secure, Un-Hackable Net

To date, communicating via quantum networks has only been possible between two devices of known provenance that have been built securely. With the EU and...
infrasound sensor

New Sandia Balloon-Borne Infrasound Sensor Array Detects Explosions

Sheets of plastic similar to that used for garbage bags, packing tape, some string, a little charcoal dust and a white shoebox-size box are...
quantum

Quantum “Spooky Action at a Distance” Becoming Practical

Scientists from Griffith University have overcome a major challenge in applying a strange quantum effect to real applications.The team from the Centre for Quantum Dynamics have...
patent listvideo

IBM Breaks Records to Top U.S. Patent List for 25th Consecutive...

IBM inventors received a record 9,043 patents in 2017, marking the company’s 25th consecutive year of U.S. patent leadership and crossing the 100,000-patent milestone....
sensor data

​NTU Study Finds That Hackers Could Guess Your Phone Pin Using...

Instruments in smart phones such as the accelerometer, gyroscope and proximity sensors represent a potential security vulnerability, according to researchers from Nanyang Technological University,...
digital security

Proof of Randomness Builds Future of Digital Security

Nearly all secure online traffic — from shopping to banking to communications — relies on a technique of randomly generating a number that serves...
Smart alarm

Smart Alarm System Recognizes Attempted Break-Ins

There is a huge selection of glass break detectors on the market. Although these detectors reliably trigger an alarm when window panes break, they...
nanomaterial

The Ultimate Defense Against Hackers May Be Just a Few Atoms...

The next generation of electronic hardware security may be at hand as researchers at New York University Tandon School of Engineering introduce a new...
quantum encryption

High-Speed Quantum Encryption May Help Secure the Future Internet

Recent advances in quantum computers may soon give hackers access to machines powerful enough to crack even the toughest of standard internet security codes....
navigation

DARPA Digging for Ideas to Revolutionize Subterranean Mapping and Navigation

Subterranean warfare—whether involving human-made tunnels, underground urban infrastructure, or natural cave networks—has been an element of U.S. military operations from World War II and...
3D microprinting

3D Microprinting: Security for Products, Passports, and Money

Security features are to protect bank notes, documents, and branded products against counterfeiting. Losses caused by product forgery and counterfeiting may be enormous. According...
bioenergyvideo

Bioenergy Will Be Strategic for a Sustainable Economy

Experts forecast that initiatives in different sectors will be required to reduce greenhouse gas emissions, keep global warming below 2 °C until the end...
invisible ink

【Shine】The Invisible Ink that can be Made Visible, then Invisible, and...

A team from Shanghai Jiao Tong University has developed an ink that can be made visible and invisible repeatedly.The university announced on Thursday that...
Cancer cells, cilia development, air pollution, photonic devices, Micro-lens, mosquito-borne infections, Microbiota, bone repair, 3D printing, neurodegenerative disease, cancer treatments, biological research, sepsis, foot and mouth disease, cytometry, batteries, Influenza A virus, vascular diseases, New Cancer Drugs, RNA molecules, polymers, antimicrobial resistance, Aging White Blood Cells, microviscosity, Transplant Drug, Nanophotonics, photonics, Built-In Nanobulbs, cerebral cortex, cancer cells, nanowires, optoelectronic, solar energy, gold nanowires, Chikungunya virus, concrete, glaucoma, light-emitting diode, Proteomics, nanostructures, nickel catalyst, Ultrafast lasers, liver capsular macrophages, obesity, cancer, lignin polymer, liver capsular macrophages, Ultrafast lasers, monocyte cells, cancer treatments, antibody drug, gene mutations, quantum-entangled photons, gut microbes, skin aging, stroke, machine learning, Cloned tumors, cancer, Rare Skin Disease, terahertz lasers, silicon-nanostructure pixels, oral cancer, heart muscle cells, cancer, cancer stem cells, gastric cancer, microelectromechanical systems, data storage, silicon nanostructures, Drug delivery, cancer, muscle nuclei, Lithography, silicon nanostructures, Quantum matter, robust lattice structures, potassium ions, Photothermal therapy, Photonic devices, Optical Components, retina, allergy, immune cells, catalyst, Nanopositioning devices, mold templates, lung cancer, cytoskeletons, hepatitis b, cardiovascular disease, memory deficits, Photonics, pre-eclampsia treatment, hair loss, nanoparticles, mobile security, Fluid dynamics, MXene, Metal-assisted chemical etching, nanomedicine, Colorectal cancer, cancer therapy, liver inflammation, cancer treatment, Semiconductor lasers, zika virus, catalysts, stem cells, fetal immune system, genetic disease, liver cancer, cancer, liver cancer, RNA editing, obesity, Microcapsules, genetic disease, Piezoelectrics, cancer, magnesium alloy, Quantum materials, therapeutic antibodies, diabetes, 2D materials, lithium-ion batteries, obesity, lupus, surfactants, Sterilization, skin on chip, Magnetic Skyrmions, cyber-security, wound infections, human genetics, immune system, eczema, solar cells, Antimicrobials, joint disorder, genetics, cancer

Seeing the Big Picture

The majority of cyber-security solutions that stand between us and increasingly sophisticated malware, target only specific attacks or subsets of attacks, meaning that users...
Critical Infrastructure

A Framework for Protecting Our Critical Infrastructure

There’s no disputing the importance of a reliable and well-functioning critical infrastructure when it comes to our daily lives—in fact, our national and economic...
Combosquatting

“Combosquatting” Attack Hides in Plain Sight to Trick Computer Users

To guard against unknowingly visiting malicious websites, computer users have been taught to double-check website URLs before they click on a link. But attackers...
cyber security

Professors Develop Model to Strengthen Wireless Networks for Natural Disasters

Protecting and strengthening the security of wireless networks used by law enforcement, firefighters and emergency responders during natural disasters and minimizing damage to networks...
Memristors

UMass Amherst Engineers Design New Hardware Security Device Using Memristors for...

Engineers at the University of Massachusetts Amherst and their colleagues have developed a new type of hardware security device using memristors that can be...