• Why and how people forget passwords

    Do you frequently forget passwords to a baffling array of accounts and websites? Much depends on a password’s importance and how often you use it, according researchers. Their study could spur improved password technology and use.

  • Qrypt licenses ORNL’s quantum random number generator to bolster encryption methods

    Qrypt, Inc. has licensed a novel cyber security technology from ORNL, promising a stronger defense against cyberattacks including those posed by quantum computing. Qrypt will incorporate ORNL’s quantum random number generator, or QRNG, into the company’s existing encryption platform, using inherent quantum randomness to create unique and unpredictable encryption keys enabling virtually impenetrable communications.

  • Closing security hole in popular encryption software

    Cybersecurity researchers have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended “side channel” signals from smartphones.

  • Making phrase-based passwords more user friendly for better online security

    Although passphrases, or phrase-based passwords, have been found to be more secure than traditional passwords, human factors issues such as typographical errors and memorability have slowed their wider adoption. Researchers have developed and tested two new passphrase systems that seek to address these shortcomings and improve the usability and security of existing passphrase authentication systems.

  • Quantum encryption to protect communications from hackers

    Securing highly sensitive information, such as hospital records and bank details, is a major challenge faced by companies and organization throughout the world. Researchers have shown that a new quantum-based procedure for distributing secure information along communication lines could be successful in preventing serious security breaches.

  • The ENCRYPT Act protects encryption from U.S. state prying

    It’s not just the DOJ and the FBI that want to compromise your right to private communications and secure devices—some state lawmakers want to weaken encryption, too. In recent years, a couple of state legislatures introduced bills to restrict or outright ban encryption on smartphones and other devices. Fortunately, several Congress members recently introduced their own bill to stop this dangerous trend before it goes any further.

  • Russia asks Apple to help it enforce ban on Telegram

    Russia’s communications regulator says it has asked U.S. technology giant Apple to help it block the popular messaging service Telegram in Russia. The regulator sent a letter to Apple asking it to block push notifications for Telegram users in Russia, ensuring that Apple phone and tablet users do not receive alerts about new messages and rendering the application less useful.

  • FBI: The number of unhackable devices lower than that reported to Congress

    The FBI has been telling lawmakers that it was facing a serious problem in accessing the encrypted devices seized from criminals and terrorists. For months, the Bureau has claimed that encryption prevented the bureau from legally searching the contents of nearly 7,800 devices in 2017, but on Monday the Washington Post reported that the actual number is far lower due to “programming errors” by the FBI.

  • Bring in the nerds: EFF introduces actual encryption experts to U.S. Senate staff

    Policymakers hear frequently from the FBI and the Department of Justice about the dangers of encryption and the so-called Going Dark problem, but they very rarely hear from actual engineers, cryptographers, and computer scientists. Last week in the U.S. Capitol Visitor Center, the Electronic Frontier Fundation (EFF) convened a closed-door briefing for Senate staff about the realities of device encryption.

  • Women in cybersecurity are making a difference

    Women in the cybersecurity industry may not make an impact in terms of numbers, but their work speaks for itself. Shimrit Tzur-David, Ph.D., is the co-founder and chief technology officer of Secret Double Octopus, a cybersecurity company which uses secret sharing, which is used to protect nuclear codes, to enable companies to do away with passwords all together. She was recently interviewed by Information Age.

  • Webhose takes aim at the Dark Web

    Fans of the popular TV show “Mr. Robot,” which dives deep into the world of shady hackers and the Dark Web that lurks beyond its better-known counterpart, take note: An Israeli startup is serving notice that the hidden is now visible and even your bitcoins won’t shield you from the long arm of the law.

  • Russian court to hear request to block Telegram

    A Russian court says it will begin considering this week a request by state media regulator Roskomnadzor to block the messaging app Telegram. Roskomnadzor has asked the court to block Telegram following the company’s refusal to give the Federal Security Service (FSB) access to users’ messaging data.

  • Leveraging emerging brain-like computers for cracking codes

    Scientists have discovered a way to leverage emerging brain-like computer architectures for an age-old number-theoretic problem known as integer factorization. By mimicking the brain functions of mammals in computing, Army scientists are opening up a new solution space that moves away from traditional computing architectures and towards devices that are able to operate within extreme size-, weight-, and power-constrained environments.

  • Framework for policymakers to address debate over encryption

    A new report by the National Academies of Sciences, Engineering, and Medicine proposes a framework for evaluating proposals to provide authorized government agencies with access to unencrypted versions of encrypted communications and other data.  The framework is the product of an 18-month study led by a diverse array of leaders from law enforcement, computer science, civil liberties, law, and other disciplines.

  • A quantum leap for quantum communication

    Quantum communication, which ensures absolute data security, is one of the most advanced branches of the “second quantum revolution.” In quantum communication, the participating parties can detect any attempt at eavesdropping by resorting to the fundamental principle of quantum mechanics — a measurement affects the measured quantity. Thus, the mere existence of an eavesdropper can be detected by identifying the traces that his measurements of the communication channel leave behind. The major drawback of quantum communication today is the slow speed of data transfer, which is limited by the speed at which the parties can perform quantum measurements. Researchers have devised a method that overcomes this speed limit, and enables an increase in the rate of data transfer by more than 5 orders of magnitude.