Innovation and Research

South Korea: SKT Builds New Quantum Repeater

South Korea: SKT Builds New Quantum Repeater

SK Telecom succeeded in long-range telecommunication based on quantum cryptography. SKT said it has developed a trusted repeater for quantum crypto telecom and demonstrated round-trip transmission of cryptographic key data over an 110-kilometer distance in Gyeonggi Province. The quantum cryptography-based telecom technology uses encryption keys, which experts say is impossible to duplicate, to...

Research: A Shorter Route to Satellite-based Quantum Encryption Network

Research: A Shorter Route to Satellite-based Quantum Encryption Network

In a new study, researchers demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 kilometers above Earth. This is the first time that quantum states have been measured so carefully from so far away. "The paper demonstrates that technology on satellites, already space-proof against severe environmental tests, can be used to achieve quantum-limited...

How Bad Data Modifies Machine Learning Results

How Bad Data Modifies Machine Learning Results

The effectiveness of machine learning models may vary between the test phase and their use "in the wild" on actual consumer data. Many research papers claim high rates of malware detection and false positives with machine learning, and often deep learning, models. However, nearly all of these rates are within the context of a single source of data, which authors use to train and test their...

Deep Learning's Growing Effect on Security

Deep Learning's Growing Effect on Security

Some of Deep learning applications include the following: 1) Spotting inappropriate behavior: With deep learning, companies can automatically spot prohibited content instead of employing people to manually review images reported from users; 2) Photo verification: Deep neural networks can be trained to identify manipulated or duplicate images; 3) Spam detection: Deep learning can root out all...

Quantum-Powered Random Numbers Could Provide Key to Improve Cryptography

Quantum-Powered Random Numbers Could Provide Key to Improve Cryptography

During the Infosecurity Europe 2017 show, one company launched a quantum technology derived product that's very much here and now: Entropy-as-a-Service. Whitewood, which is developing crypto-security solutions based on advanced quantum technology, says that the cloud-based service "delivers pure quantum entropy, the foundation of randomness, to generate truly random numbers for creating...

The Growth of Machine Learning Means that Computer No Longer Says “No”

The Growth of Machine Learning Means that Computer No Longer Says “No”

One important aspect of Artificial Intelligence is Machine Learning (ML), which pretty much does what it says on the tin - allows one machine to learn from another’s behavior. Machine Learning promises to offer us huge advantages in the war against evolving security threats. Bitdefender spokespeople said that criminals leveraging machine learning for illegal purposes are "not an option for...

  • More at PCMag
  • |
  • |
Researchers Claim Each Network Router at Risk of Secretly Leaking Data

Researchers Claim Each Network Router at Risk of Secretly Leaking Data

It is possible for any common network router to secretly leak sensitive information such as employee passwords or company data, according to recent research from experts at Ben-Gurion University of the Negev (BGU) Cyber Security Research Center (CSRC). In a research paper published by the university, researchers explained how they used the LED light on a network router to covertly send data....

App Uses Tools like Compass Available in Smartphones to Stop Voice Hacking

App Uses Tools like Compass Available in Smartphones to Stop Voice Hacking

Siri, WeChat and other voice-based smartphone apps can expose you to a growing security threat: voice hacking. With just a few minutes of audio samples, attackers can replay your voice convincingly enough to trick people as well as top digital security systems. Using only tools already on smartphones, including the compass, a University at Buffalo-led team of engineers is creating an app to stop...

Cybersecurity and Cryptography in the Post-Quantum Era

Cybersecurity and Cryptography in the Post-Quantum Era

A quantum computer can solve certain computational problems in fewer steps than a classical computer. While this efficiency presents opportunities in areas such as machine learning and data analytics, it also poses certain risks in cryptography and cybersecurity. The U.S. government is currently researching solutions to potential challenges posed by quantum computers. For organizations that...

  • More at B Gov
  • |
  • |
SeaGlass Brings Transparency to Cell Phone Surveillance: Catching IMSI-catchers

SeaGlass Brings Transparency to Cell Phone Surveillance: Catching IMSI-catchers

Modern cell phones are vulnerable to attacks from rogue cellular transmitters called IMSI-catchers -- surveillance devices that can precisely locate mobile phones, eavesdrop on conversations or send spam. University of Washington security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when these surveillance...

Got a Face-Recognition Algorithm? If So, Uncle Sam Wants to Review It

Got a Face-Recognition Algorithm? If So, Uncle Sam Wants to Review It

The nation's top-level intelligence office, the Director of National Intelligence, wants to find "the most accurate unconstrained face recognition algorithm." A branch of the office, which oversees the nation's spy agencies, is holding a contest toward that end, with submissions due no later than 2pm ET June 15. "Have you developed software to identity faces in general web photographs? Can your...

Random Numbers: Difficult Times Ahead for Hackers

Random Numbers: Difficult Times Ahead for Hackers

Whenever we need to communicate in secret, a cryptographic key is needed. For this key to work, it must consist of numbers chosen at random without any structure. But, for a human, it is extremely difficult to choose without creating any bias, even by hitting the keyboard chaotically. To solve this problem, researchers from the University of Geneva (UNIGE), Switzerland, have developed a new...

Ensuring Digital Information Is Secure

Ensuring Digital Information Is Secure

Research groups at A*STAR are using their technical expertise to monitor online services, identify vulnerable areas of data management, and develop software and hardware that keep data secure. Jiqiang Lu and co-workers at the A*STAR Institute for Infocomm Research decided to investigate whether a detailed and fast-acting attack on the Global System for Mobile Communications A5/1 cipher could...

  • More at Phys
  • |
  • |
Blockchains are Not the New Internet, But the New Linux

Blockchains are Not the New Internet, But the New Linux

Some people argue that the blockchain is so amazing, so revolutionary, that if enough money is invested, the killer apps and protocols will come. That could hardly be more backwards. But they should follow “If you build something good enough, investors will flock to you,” not “If enough investors flock to us, we will build something good enough.” Maybe the belief that blockchains today...

Contactless Security Chip Gets First Post-Quantum Cryptography

Contactless Security Chip Gets First Post-Quantum Cryptography

Various internet standards like Transport Layer Security (TLS), S/MIME or PGP/ GPG use cryptography based on RSA or ECC to protect data communication with smart cards, computers, servers or industrial control systems. Infineon security experts and the Center of Excellence for contactless technologies in Graz, Austria, implemented a post-quantum key exchange scheme on a commercially available...

After Cloud, Now Artificial Intelligence Takes on the Scientific Method

After Cloud, Now Artificial Intelligence Takes on the Scientific Method

10 years ago, Chris Anderson, then Editor-in-Chief at Wired, published a piece in which he claimed that cloud computing was making the scientific method irrelevant. Yet a quote from Chris Anderson's article led off a new column last month that essentially says Anderson was right, he just had the wrong reason. It's not cloud computing that's going to make theory irrelevant—it's AI, the piece...

Know about the latest research and innovation in cyber and IT security.

This category provides expertly curated news on the cutting-edge research and the latest innovation taking place in the cyber security research labs. Change is the law of nature and progressive change is of utmost importance to any industry to adopt new standards, technologies, laws and policies. Cyber security industry is no exception to this. In fact, it is extremely important for all companies and firms to consistently look out for the innovation and research that can be adopted to improve security strategy and standard against cyber threats and threat actors. It is well known that first step towards change is awareness. The second step is acceptance. The news feed provided under this category aims to make our users aware of the latest innovation and research and provide them with meaningful data that helps them in decision making for accepting, adopting and implementing them in their security paradigm. The pace and quantum of research in cyber security industry is very fast and high. Therefore, Cyware helps you by providing the most interesting pieces on latest findings in IT security research and innovations having high return on investment for our users.