Patent data analysis highlights the leading companies in cybersecurity innovations At a time when public trust has been undermined by strings of cyberattacks and cyber spying, IFI CLAIMS Patent Services – the industry’s most trusted patent data provider – has…
Tag: Cryptography
Novel method for controlling light polarization
Researchers have developed a new method for controlling the polarization of light that could lead to advances in cryptography, imaging, and other fields. This method uses liquid crystals to create holograms enabling the manipulation of vectorial field at different points.
Unreliable neurons improve brain functionalities
Neuronal silencing periods facilitate an advantageous mechanism for temporal sequence identification and demonstrate a useful new AI mechanism for ATM’s equipped with secure handwriting recognition.
Johns Hopkins Expert Can Discuss Apple’s Plan to Monitor iPhones for Child Sexual Abuse
Apple has announced plans to scan iPhones and other Apple devices for images of child sexual abuse and report them to the National Center for Missing and Exploited Children. A Johns Hopkins University expert is available to discuss how the…
New Tool Detects Unsafe Security Practices in Android Apps
Computer scientists at Columbia Engineering have shown for the first time that it is possible to analyze how thousands of Android apps use cryptography without needing to have the apps’ actual codes. The team’s new tool, CRYLOGGER, can tell when an Android app uses cryptography incorrectly—it detects the so-called “cryptographic misuses” in Android apps. When given a list of rules that should be followed for secure cryptography, CRYLOGGER detects violations of these rules.
APL and the Intelligence Community Tackle Malware in the Age of AI
APL scientists are working with the intelligence community to develop fundamentally new methods to inspect artificial intelligence for Trojans — vulnerabilities that deep networks are exposed to during the AI training process.
Randomness theory could hold key to internet security
In a new paper, Cornell Tech researchers identified a problem that holds the key to whether all encryption can be broken – as well as a surprising connection to a mathematical concept that aims to define and measure randomness.
Researchers Hack One of the World’s Most Secure Industrial Programmable Logic Controllers (PLC)
Israeli researchers have managed to take control of a Siemens programmable logic controller (PLC), considered to be one of the safest controllers in the world. PLCs are used in a wide spectrum of operations including power stations, water pumps, vehicles, and smart homes.
Researchers Hack One of the World’s Most Secure Industrial Programmable Logic Controllers (PLC)
Israeli researchers have managed to take control of a Siemens programmable logic controller (PLC), considered to be one of the safest controllers in the world. PLCs are used in a wide spectrum of operations including power stations, water pumps, vehicles, and smart homes.