CALL TODAY (757) 663-7662


  • Shortcut to satellite-based quantum encryption network June 15, 2017
    Researchers demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 kilometers above Earth.
  • Security and privacy in electronic healthcare systems June 15, 2017
    All over the world, digital tools are increasingly being used to improve and streamline healthcare services. This does not only lead to positive results, but also creates opportunities for new types of threats regarding information security and privacy, say authors of a new report.
  • 7 in 10 smartphone apps share your data with third-party services June 9, 2017
    Our mobile phones can reveal a lot about ourselves: where we live and work; who our family, friends and acquaintances are; how (and even what) we communicate with them; and our personal habits. With all the information stored on them, it isn’t surprising that mobile device users take steps to protect their privacy. However, more […]
  • App uses smartphone compass to stop voice hacking June 5, 2017
    Engineers are creating an app to stop voice hacking. The app uses existing smartphone components, including the magnetometer for the phone's compass, to detect when someone's voice is being broadcast on a speaker.
  • Random numbers: Hard times ahead for hackers May 31, 2017
    Whenever we need to communicate in secret, a cryptographic key is needed. For this key to work, it must consist of numbers chosen at random without any structure – just the opposite of using the birthdate of our favorite pet. But, for a human, it is extremely difficult to choose without creating any bias, even […]
  • Taking control back from the cloud May 29, 2017
    A user-controlled file security scheme makes it possible to instantly revoke access to files hosted on Internet cloud servers.
  • System piggybacks on Bitcoin to prevent identity theft May 24, 2017
    Researchers have developed a new system that uses Bitcoin's security machinery to defend against online identity theft.
  • Under cyber attack: Researchers look at how to catch a 'phisher' May 16, 2017
    As cybersecurity experts scramble to stop another wave of ransomware and malware scams that have infected computers around the world, computer science experts are 'phishing' for reasons why these types of attacks are so successful.
  • Kids, parents alike worried about privacy with internet-connected toys May 10, 2017
    Researchers have conducted a new study that explores the attitudes and concerns of both parents and children who play with internet-connected toys. Through a series of in-depth interviews and observations, the researchers found that kids didn't know their toys were recording their conversations, and parents generally worried about their children's privacy when they played with […]
  • Unpolarized single-photon generation with true randomness from diamond May 8, 2017
    Scientists have demonstrated dynamically and statically unpolarized single-photon generation using diamond.