Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

'Lurking malice' in cloud hosting services, study finds

itech-dude-161018193559_1_540x36_20170316-062044_1 iTech Dude - The Technology Blog - Page 47
A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised -- with several hundred of the "buckets" actively providing malware. Such bad content could be challenging to find, however, because it can be rapidly assembled from stored components that individually may not appear to be malicious. To identify the bad content, researchers created a scanning tool that looks for features unique to the bad repositories, known as …
Rate this blog entry:
Continue reading
0 Hits
0 Comments

Typing while Skyping could compromise privacy

Typing while Skyping could compromise privacy
If you type on your desktop or laptop computer's keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at the University of California, Irvine and in Italy. In a new study published online at arXiv, they describe a security breach whereby keystroke sounds, or acoustic emanations, can be recorded during a Skype voice or video call and later reassembled as text. "Skype is used by a huge number of people worldwide," said co-autho…
Rate this blog entry:
Continue reading
144 Hits
0 Comments

Encrypting medical photos with chaos

Chaos and confusion could be used to encrypt colour photos and protect them from prying eyes, according to computer scientists in Algeria. Writing in the International Journal of Information and Computer Security, the team describe a new algorithm that generates pseudo-random sequences that change a plain image into a ciphered image in a single step leading to a file that cannot be cracked. Assia Beloucif, Oussama Noui and Lemnouar Noui of the University of Batna, explain how increasing concerns…
Rate this blog entry:
Continue reading
133 Hits
0 Comments

Brain waves can be used to detect potentially harmful personal information

Brain waves can be used to detect potentially harmful personal information
Cyber security and authentication have been under attack in recent months as, seemingly every other day, a new report of hackers gaining access to private or sensitive information comes to light. Just recently, more than 500 million passwords were stolen when Yahoo revealed its security was compromised. Securing systems has gone beyond simply coming up with a clever password that could prevent nefarious computer experts from hacking into your Facebook account. The more sophisticated the system, …
Rate this blog entry:
Continue reading
72 Hits
0 Comments

Solution for secure processing of patient data revealed

Thanks to a technique developed by Radboud University large-scale research involving patient data can be done without threat to either the security of the information or the privacy of the patients. This technique will be used for a new, large-scale study of Parkinson's disease. Collecting and analysing medical data on a large scale is an increasingly important research tool in understanding illnesses. To quickly arrive at new insights and avoid double work, it is important that international re…
Rate this blog entry:
Continue reading
101 Hits
0 Comments

Encryption method takes authentication to a new level, improves privacy protection

VTT Technical Research Centre of Finland has developed new kinds of encryption methods for improving the privacy protection of consumers to enable safer, more reliable and easier-to-use user authentication than current systems allow. The method combines safety, usability and privacy protection, when, until now, implementing all three at the same time has been a challenge. "Our method protects, for example, the user's biometric data or typing style," says Senior Scientist Kimmo Halunen. In biomet…
Rate this blog entry:
Continue reading
0 Hits
0 Comments

Secure passwords can be sent through your body, instead of air

Secure passwords can be sent through your body, instead of air
Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code. Now, University of Washington computer scientists and electrical engineers have devised a way to send secure passwords through the human body -- using benign, low-frequency transmissions generated by fingerprint sensors and touchpads on consumer devices. "Fingerprint sensors have so far been us…
Rate this blog entry:
Continue reading
0 Hits
0 Comments

First quantum photonic circuit with an electrically driven light source

First quantum photonic circuit with an electrically driven light source
Whether for use in safe data encryption, ultrafast calculation of huge data volumes or so-called quantum simulation of highly complex systems: Optical quantum computers are a source of hope for tomorrow's computer technology. For the first time, scientists now have succeeded in placing a complete quantum optical structure on a chip, as outlined in the Nature Photonics journal. This fulfills one condition for the use of photonic circuits in optical quantum computers. "Experiments investigating th…
Rate this blog entry:
Continue reading
99 Hits
0 Comments

Beam me up Scotty! Quantum teleportation of a particle of light six kilometers

Beam me up Scotty! Quantum teleportation of a particle of light six kilometers
What if you could behave like the crew on the Starship Enterprise and teleport yourself home or anywhere else in the world? As a human, you're probably not going to realize this any time soon; if you're a photon, you might want to keep reading. Through a collaboration between the University of Calgary, The City of Calgary and researchers in the United States, a group of physicists led by Wolfgang Tittel, professor in the Department of Physics and Astronomy at the University of Calgary have succe…
Rate this blog entry:
Continue reading
97 Hits
0 Comments

When hackers turn out the lights

The development of the smart power grid and the smart meter in our homes to accompany it brings several benefits, such as improved delivery and more efficient billing. Conversely, any digital, connected technology also represents a security risk. Writing in the International Journal of Smart Grid and Green Communications, UK researchers explain how a malicious third party that hacked into the metering system could manipulate en masse the data being sent back to the smart grid and perhaps trigger…
Rate this blog entry:
Continue reading
108 Hits
0 Comments