Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Researchers flip magnetic memory cell with light pulse at record speed

Researchers flip magnetic memory cell with light pulse at record speed
University of Minnesota electrical and computer engineering researchers have created a magnetic tunnel junction that can be switched by a pulse of light lasting one trillionth of a second -- a new record. The magnetic tunnel junction is critical to information technology advances with the termination of Moore's law, a principle that has ruled the microelectronics industry for five decades. This advancement holds promise for the development of new, optically controlled, ultrafast magnetic devices…
Rate this blog entry:
Continue reading
425 Hits
0 Comments

Single atom memory: The world's smallest storage medium

Single atom memory: The world
One bit of digital information can now be successfully stored in an individual atom, according to a study just published in Nature. Current commercially-available magnetic memory devices require approximately one million atoms to do the same. Andreas Heinrich, newly appointed Director of the Center for Quantum Nanoscience, within the Institute of Basic Science (IBS, South Korea), led the research effort that made this discovery at IBM Almaden Research Center (USA). This result is a breakthrough …
Rate this blog entry:
Continue reading
487 Hits
0 Comments

New Apache Struts Zero-Day Vulnerability Being Exploited in the Wild

New Apache Struts Zero-Day Vulnerability Being Exploited in the Wild
Security researchers have discovered a Zero-Day vulnerability in the popular Apache Struts web application framework, which is being actively exploited in the wild.Apache Struts is a free, open-source, Model-View-Controller (MVC) framework for creating elegant, modern Java web applications, which supports REST, AJAX, and JSON.In a blog post published Monday, Cisco's Threat intelligence firm Talos announced the team observed a number of active attacks against the zero-day vulnerability (CVE-20…
Rate this blog entry:
Continue reading
146 Hits
0 Comments

Secure Messaging App 'Confide' Used by White House Staffers Found Vulnerable

Secure Messaging App
The secure messaging app used by staffers in the White House and on Capitol Hill is not as secure as the company claims.Confide, the secure messaging app reportedly employed by President Donald Trump's aides to speak to each other in secret, promises "military-grade end-to-end encryption" to its users and claims that nobody can intercept and read chats that disappear after they are read.However, two separate research have raised a red flag about the claims made by the company.Security researc…
Rate this blog entry:
Continue reading
129 Hits
0 Comments

10 Things You Need To Know About 'Wikileaks CIA Leak'

10 Things You Need To Know About
Yesterday WikiLeaks published thousands of documents revealing top CIA hacking secrets, including the agency's ability to break into iPhones, Android phones, smart TVs, and Microsoft, Mac and Linux operating systems.It dubbed the first release as Vault 7.Vault 7 is just the first part of leak series “Year Zero” that WikiLeaks will be releasing in coming days. Vault 7 is all about a covert global hacking operation being run by the US Central Intelligence Agency (CIA).According to the whistleblowe…
Rate this blog entry:
Continue reading
147 Hits
0 Comments

Technique proposed for measuring weak or nonexistent magnetic fields

Technique proposed for measuring weak or nonexistent magnetic fields
Physicists at the University of Iowa have proposed a new technique to detect and measure materials that give off weak magnetic signals or have no magnetic field at all. Their solution would use a noninvasive probe to induce a magnetic response in the material being studied and then detect how that response changes the probe's own magnetic field. The technique has many potential real-world applications, including yielding more sensitive magnetic resonance imaging (MRI) machines, developing high-s…
Rate this blog entry:
Continue reading
429 Hits
0 Comments

Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back

Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back
Is it wrong to hack back in order to counter hacking attack when you have become a victim? — this has been a long time debate.While many countries, including the United States, consider hacking back practices as illegal, many security firms and experts believe it as "a terrible idea" and officially "cautions" victims against it, even if they use it as a part of an active defense strategy.Accessing a system that does not belong to you or distributing code designed to enable unauthorized access…
Rate this blog entry:
Continue reading
167 Hits
0 Comments

WikiLeaks Exposed CIA's Hacking Tools And Capabilities Details

WikiLeaks Exposed CIA
WikiLeaks has published a massive trove of confidential documents in what appear to be the biggest ever leak involving the US Central Intelligence Agency (CIA).WikiLeaks announced series Year Zero, under which the whistleblower organization will reveal details of the CIA's global covert hacking program.As part of Year Zero, Wikileaks published its first archive, dubbed Vault 7, which includes a total of 8,761 documents of 513 MB (torrent | password) on Tuesday, exposing information about nume…
Rate this blog entry:
Continue reading
140 Hits
0 Comments

Writing programs for random circuitry in quantum computers

Writing programs for random circuitry in quantum computers
Researchers from the University of Bristol and Université Libre de Bruxelles have theoretically shown how to write programs for random circuitry in quantum computers. The breakthrough, published in the New Journal of Physics, is based on the work of first author, Dr Nick Russell, who tragically lost his life in a climbing accident last year. "One of the many applications for random quantum circuits is the realisation of a rudimentary version of a quantum computer, known as a "boson sampler." A b…
Rate this blog entry:
Continue reading
435 Hits
0 Comments

Secdo Automates End-to-End Incident Response with Preemptive IR

Secdo Automates End-to-End Incident Response with Preemptive IR
As vast volumes of digital data are created, consumed and shared by companies, customers, employees, patients, financial institutions, governments and so many other bodies, information protection becomes a growing risk for everyone.Who wants to see personal customer purchasing data flying into the hands of strangers? What company can tolerate the pilfering of its intellectual property by competitors? What government can stand idly by while its military secrets are made public?To protect their va…
Rate this blog entry:
Continue reading
150 Hits
0 Comments