Hacking News
June 29, 2023

Top Headlines

Evaluating Cybersecurity Methods

Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information by observing the behavior of a victim computer ...

How Secure Are Voice Authentication Systems Really?

Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six ...

Quantum Computers Are Better at Guessing, New Study Demonstrates

Researchers have demonstrated a quantum speedup over the most efficient classical computer algorithm possible for what is believed to be the first time. The accomplishment was performed on an IBM Montreal Quantum Falcon r4 27-qubit ...

Two Qudits Fully Entangled

Recently quantum computers started to work with more than just the zeros and ones we know from classical computers. Now a team demonstrates a way to efficiently create entanglement of such high-dimensional systems to enable more powerful ...

Latest Headlines
updated 6:07pm EDT

Earlier Headlines

Are Our Pets Leaking Information About Us?

Pet and animal-related apps are creating cybersecurity risks to their owners, new research has ...

New AI Model Can Help Prevent Damaging and Costly Data Breaches

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data ...

New Form of Universal Quantum Computers

Computing power of quantum machines is currently still very low. Increasing it is still proving to be a major challenge. Physicists now present a new architecture for a universal quantum computer ...

New Method to Systematically Find Optimal Quantum Operation Sequences for Quantum Computers Developed

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that ...

Why 'Erasure' Could Be Key to Practical Quantum Computing

A new method for correcting errors in the calculations of quantum computers potentially clears a major obstacle to a powerful new realm of ...

From Bits to P-Bits: One Step Closer to Probabilistic Computing

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could ...

Thinking Like a Cyber-Attacker to Protect User Data

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can ...

A Key Role for Quantum Entanglement

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated ...

Quantum Cryptography: Hacking Is Futile

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more ...

Quantum Digits Unlock More Computational Power With Fewer Quantum Particles

For decades computers have been synonymous with binary information -- zeros and ones. Now a team has realized a quantum computer that breaks out of this paradigm and unlocks additional computational ...

'Pulling Back the Curtain' to Reveal a Molecular Key to The Wizard of Oz

Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption ...


Radio Waves for the Detection of Hardware Tampering

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the ...

Toward Error-Free Quantum Computing

量子计算机是有用的在实践中,errors must be detected and corrected. A team of experimental physicists has now implemented a universal set of computational operations on ...

Secure Communication With Light Particles

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called ...

Emulating Impossible 'Unipolar' Laser Pulses Paves the Way for Processing Quantum Information

A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum ...

Eavesdroppers Can Hack 6G Frequency With DIY Metasurface

Crafty hackers can make a tool to eavesdrop on some 6G wireless signals in as little as five minutes using office paper, an inkjet printer, a metallic foil transfer and a ...

Self-Propelled, Endlessly Programmable Artificial Cilia

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of ...

Scientific Advance Leads to a New Tool in the Fight Against Hackers

A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that ...

New Technique Offers Faster Security for Non-Volatile Memory Tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new ...

Single-Photon Source Paves the Way for Practical Quantum Encryption

Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly ...

Monday, February 27, 2023
Wednesday, November 9, 2022
Friday, October 28, 2022
Friday, September 2, 2022
Wednesday, August 31, 2022
Monday, August 29, 2022
Monday, August 15, 2022
Wednesday, July 27, 2022
Thursday, July 21, 2022
Wednesday, July 20, 2022
Wednesday, June 8, 2022
Wednesday, May 25, 2022
Tuesday, May 24, 2022
Monday, May 16, 2022
Thursday, May 5, 2022
Thursday, April 28, 2022
Tuesday, April 5, 2022
Wednesday, March 23, 2022
Tuesday, March 22, 2022
Monday, March 21, 2022
Monday, March 14, 2022
Tuesday, March 1, 2022
Thursday, February 24, 2022
Friday, February 25, 2022
Tuesday, February 1, 2022
Tuesday, January 25, 2022
Wednesday, January 12, 2022
Tuesday, December 21, 2021
Monday, December 20, 2021
Friday, December 10, 2021
Tuesday, November 23, 2021
Tuesday, November 16, 2021
Thursday, November 4, 2021
Wednesday, November 3, 2021
Thursday, October 21, 2021
Friday, October 15, 2021
Tuesday, August 31, 2021
Monday, August 23, 2021
Thursday, August 12, 2021
Wednesday, August 11, 2021
Thursday, August 5, 2021
Wednesday, July 21, 2021
Wednesday, June 23, 2021
Friday, June 18, 2021
Wednesday, June 9, 2021
Tuesday, June 8, 2021
Wednesday, June 2, 2021
Monday, May 10, 2021
Wednesday, May 5, 2021
Tuesday, May 4, 2021
Friday, April 30, 2021
Monday, April 19, 2021
Wednesday, April 7, 2021
Thursday, March 18, 2021
Wednesday, March 3, 2021
Monday, March 1, 2021
Thursday, February 25, 2021
Wednesday, February 24, 2021
Thursday, February 18, 2021
Thursday, February 11, 2021
Tuesday, February 2, 2021
Thursday, January 21, 2021
Wednesday, January 6, 2021
Monday, December 7, 2020
Monday, November 23, 2020
Friday, November 20, 2020
Monday, November 16, 2020
Thursday, October 22, 2020
Monday, October 12, 2020
Monday, October 5, 2020
Thursday, September 24, 2020
Thursday, September 10, 2020
Wednesday, September 2, 2020
Monday, August 24, 2020
Wednesday, August 12, 2020
Tuesday, August 11, 2020
Tuesday, August 4, 2020
Friday, July 31, 2020
Monday, July 27, 2020
Thursday, July 16, 2020
Tuesday, July 14, 2020
Thursday, July 2, 2020