create

now browsing by tag

 
 

How #quantum #computing could create #unbreakable #encryption and save the #future of #cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

A new breakthrough in quantum computing may mean quantum key distribution (QKD) is on its way toward being a practical cybersecurity protocol.

Researchers at Duke University, The Ohio State University, and Oak Ridge National Laboratory have announced in the latest issue of Science Advances that they’ve increased the speed of QKD transmission by between five and 10 times the current rates.

Up until this latest breakthrough, which is delivering megabit/second rates, speeds were restricted to between tens to hundreds of kilobits a second.

What is quantum key distribution?

It sounds like something straight out of science fiction, but quantum key distribution is reality, and it could be protecting your data before you know it.

QKD uses photons—particles of light—to encode data in qubits, or quantum bits. The qubits are transmitted to a sender and recipient as an encryption key, and here’s where things get crazy: The transmission channels don’t need to be secure.

QKD’s whole purpose rests on quantum indeterminacy, which states that measuring something affects its original state. In the case of QKD, measuring photonic qubits affects their encoding, which allows the sender and recipient to immediately know if a hacker is trying to crack their quantum encryption key.

That means, theoretically at least, that QKD would be a perfect encryption: Any attempts to crack it would immediately be noticed and keys could be changed.

Making QKD practical for cybersecurity

The breakthrough made by the Duke research team came from being able to pack more data onto a single photon. The trick was learning to adjust the time at which the photon was released, along with adjusting the phase of the photon, causing it to be able to hold two bits of information instead of just one.

What makes the new system developed by the researchers even more amazing is that they were able to do it with nothing but commercially available telecommunication hardware, save the single-photon detector.

“With some engineering,” said Duke graduate student Nurul Taimur Islam, “we could probably fit the entire transmitter and receiver in a box as big as a computer CPU.”

Islam and his research partners say that hardware imperfections render their QKD system less than hack-proof, but their research continues to incorporate hardware shortcomings to make up for them.

“We wanted to identify every experimental flaw in the system, and include these flaws in the theory so that we could ensure our system is secure and there is no potential side-channel attack,” Islam said.

While it’s likely to take some time to emerge from the research phase and become a practical tool, this latest QKD breakthrough gives cybersecurity a leg up on cybercriminals.

As quantum computing becomes accessible, the likelihood of it being used to obliterate current forms of encryption increases, making the development of practical QKD essential. This should come as good news to anyone concerned about the current, and future, state of cybersecurity.

The post How #quantum #computing could create #unbreakable #encryption and save the #future of #cybersecurity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Severe flaws in DNS app create hacking risk for routers, smartphones, computers, IoT

Source: National Cyber Security – Produced By Gregory Evans

Google researchers found seven severe security flaws in the open-source DNS software package Dnsmasq. The flaws put a huge number of devices at risk of being hacked. Google researchers disclosed seven serious flaws in an open-source DNS software package Dnsmasq, which is is commonly preinstalled on routers, servers, smartphones, IoT…

The post Severe flaws in DNS app create hacking risk for routers, smartphones, computers, IoT appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Could voting fraud panel create an easy target for hackers?

Source: National Cyber Security – Produced By Gregory Evans

Officials from both parties had a consistent answer last year when asked about the security of voting systems: U.S. elections are so decentralized that it would be impossible for hackers to manipulate ballot counts or voter rolls on a wide scale. But the voter fraud commission established by President Donald…

The post Could voting fraud panel create an easy target for hackers? appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

HOW EMPLOYEES CREATE CYBERSECURITY RISKS

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans A new report shows that business leaders aren’t just worried about employees causing cybersecurity attacks, but hiding them as well. Also: Facebook now allows Groups within Pages. By now, we all know that all employees—not just IT staff—are responsible for preventing cybersecurity attacks. But prevention isn’t […] View full post on AmIHackerProof.com | Can You Be Hacked?

Protect Four Key Areas To Create A Balanced Cybersecurity Portfolio

Source: National Cyber Security – Produced By Gregory Evans

For this article, I had the chance to speak with Jay Chaudhry, the CEO and Founder of Zscaler. Zscaler bills itself as a cloud cybersecurity solution, or “Security as a Service.” Zscaler has a unique approach to cybersecurity, one that fits into my balanced cybersecurity framework, but that also dispels…

The post Protect Four Key Areas To Create A Balanced Cybersecurity Portfolio appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Webcams, cameras create suspicion, paranoia

Source: National Cyber Security – Produced By Gregory Evans

Surveillance cameras and webcams are becoming increasingly prevalent, making it possible to frequently record a person’s actions. Many times these cameras are visible, but other times they’re hidden or used in ways the recorded people are not aware of. Consciousness of cameras may affect behavior and mental health. Marina Lowe,…

The post Webcams, cameras create suspicion, paranoia appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hack Back law would create cyber vigilantes

Source: National Cyber Security – Produced By Gregory Evans

Hack Back law would create cyber vigilantes

The Active Cyber Defense Certainty Act revision demonstrates what happens when you rely upon limited information and a cowboy mentality. Tom Graves (R-GA) released an update to the initial Active Cyber Defense Certainty Act (ACDC) that intends to exempt victims of cyber attacks from being prosecuted for attempting to hack…

The post Hack Back law would create cyber vigilantes appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

EU wants to create backdoors to encrypted social media apps

The proposals would force companies like WhatsApp to hand over user data The European Commission is planning to introduce new measures that will provide a backdoor to application encryption, making it easier for security agencies to access data on services … View full post on National Cyber Security Ventures

Video Self-Modeling: The Power of Image to Create Behavior Change

[…]

The post Video Self-Modeling: The Power of Image to Create Behavior Change appeared first on EducationCloset.

View full post on EducationCloset







#pso #htcs #b4inc

Read More

The post Video Self-Modeling: The Power of Image to Create Behavior Change appeared first on Parent Security Online.

View full post on Parent Security Online

NBU to create center for cyber security incidents

original-800x520

Source: National Cyber Security – Produced By Gregory Evans

NBU to create center for cyber security incidents

The National Bank of Ukraine (NBU) will create a center to respond to cyber security incidents in the banking system and the payment space of Ukraine, the National Bank’s website said.
“Previously, our efforts were focused on individual transactions such

The post NBU to create center for cyber security incidents appeared first on National Cyber Security.

View full post on National Cyber Security