- Smart electrical grids more vulnerable to cyber attacks August 16, 2017
Electricity distribution systems in the USA are gradually being modernized and transposed to smart grids, which make use of two-way communication and computer processing. This is making them increasingly vulnerable to cyber attacks.
- DNA sequencing tools lack robust protections against cybersecurity risks August 10, 2017
A new study analyzing the security hygiene of common, open-source DNA processing programs finds evidence of poor computer security practices used throughout the field. In a scientific first, the team also demonstrated it is possible to compromise a computer system with a malicious computer code stored in synthetic DNA.
- USB connections make snooping easy August 10, 2017
USB connections, the most common interface used globally to connect external devices to computers, are vulnerable to information 'leakage,' making them even less secure than has been thought, research has shown.
- Clarifiying complex chemical processes with quantum computers August 2, 2017
Science and the IT industry have high hopes for quantum computing, but descriptions of possible applications tend to be vague. Researchers have now come up with a concrete example that demonstrates what quantum computers will actually be able to achieve in the future.
- Two methods to de-identify large patient datasets greatly reduced risk of re-identification July 28, 2017
Two de-identification methods, k-anonymization and adding a 'fuzzy factor,' significantly reduced the risk of re-identification of patients in a dataset of 5 million patient records from a large cervical cancer screening program in Norway.
- Ultracold molecules hold promise for quantum computing July 27, 2017
A study by MIT researchers shows that collections of ultracold molecules can retain the information stored in them for hundreds of times longer than previously achieved in these materials. These clusters might thus serve as 'qubits,' the basic building blocks of quantum computers.
- Shh! Proven security for your secrets July 14, 2017
Researchers show the security of their cipher based on chaos theory. The research highlights that their Vector Stream Cipher is not only secure, but structurally simple and low on memory usage compared with existing technology, making it useful for high-density data transmission applications such as in 5G mobile networks and 4K television broadcasts.
- Why you might trust a quantum computer with secrets, even over the internet July 12, 2017
Researchers have proposed a way you could use a quantum computer securely, even over the internet, explains a new report.
- Who is responsible if a brain-controlled robot drops a baby? June 29, 2017
As brain-controlled robots enter everyday life, researchers say that now is the time to take action and put in place guidelines that ensure the safe and beneficial use of direct brain-machine interaction.
- New firewall protects cellphones from security threat June 29, 2017
Some 400 million people change their phone's components, such as touchscreens, chargers, and battery or sensor assemblies, which are all susceptible to significant security breaches and attacks. These components, referred to as 'field replaceable units (FRUs),' communicate with the phone CPU over simple interfaces with no authentication mechanisms or error detection capabilities. Cyber security researchers […]