Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Computer Sciences

Is quantum computing a cybersecurity threat?

Cybersecurity researchers and analysts are rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. The effect would be to render communications ...

Security

Internet to TLS 1.3: Where have you been all my life

The Internet Engineering Task Force (IETF), which is the premier Internet standards body, has given its nod of approval for something that will make the Web more secure. It is called Transport Layer Security version 1.3.

Security

Energy-efficient encryption for the internet of things

Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key.

Computer Sciences

How a wall of lamps in an office lobby supports randomness

(Tech Xplore)—Lava lamps are well known for mood-enhancing functions in living rooms, after-hours cubicles, or anywhere else where humans prefer to dream while wide awake. For a security company with headquarters in San ...

page 6 from 8