Google Play icon
Can you keep a secret?

August 28, 2019

Researchers everywhere race to create systems for secure communication with the power of quantum physics. These ideas describe…
Researchers develop method to hide images and information in plain sight

December 31, 2018

What is real is not always as it appears. UCF researchers have found a way to hide information…
Researchers link realism to blockchain’s promise

December 28, 2018

Depending on who you ask, blockchain technology is poised to revolutionize the world — from creating a universal…
Networking goes quantum

December 13, 2018

A scientist involved in expanding quantum communication to a network of users, is continuing his work at the…
Spin-out makes data immune

October 17, 2018

If a king wants to keep his crown jewels safe, he builds a moat around his castle to…
Researchers Help Close Security Hole in Popular Encryption Software

August 14, 2018

Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed…
Your Wi-Fi Can Be Hacked Due to WPA2 Protocol Vulnerability Called KRACK

February 15, 2018

The group of cybersecurity experts has recently found the greatest and unprecedented vulnerability in the security of Wi-Fi…
Quantum computers demand new encryption

October 5, 2017

Banks, intelligence agencies, hospitals, and industrial companies transmit lots of sensitive data in encrypted form. This encryption is…
Is end-to-end email encryption relevant these days? Secure Swiss Data’s implemenataion is!

May 30, 2017

All data flows through the internet from point to point and if not. Hackers and governments usually get…
New System Makes It Harder to Track Bitcoin Transactions

February 14, 2017

Researchers from North Carolina State University, Boston University and George Mason University have developed a Bitcoin-compatible system that…
The quantum computers of the future will work equally well with encrypted and unencrypted input

December 16, 2016

When future users of quantum computers need to analyze their data or run quantum algorithms, they will often…
The Enigma Machine takes a quantum leap

September 7, 2016

Researchers at the University of Rochester have moved beyond the theoretical in demonstrating that an unbreakable encrypted message…
Laser technique promises super-fast and super-secure quantum cryptography

April 7, 2016

Researchers have developed a new method to overcome one of the main issues in implementing a quantum cryptography…
The beginning of the end for encryption schemes?

March 10, 2016

What are the prime factors, or multipliers, for the number 15? Most grade school students know the answer…
Encrypted Messaging App Introduces Group Video & Conference Calls

November 24, 2015

SOMA Messenger has been the fastest growing mobile app  ­- 10 million people signed up within the 30…
Invention of forge-proof ID to revolutionise security

November 12, 2015

Scientists have discovered a way to authenticate or identify any object by generating an unbreakable ID based on…
A basis for all cryptography

October 29, 2015

“Indistinguishability obfuscation” is a powerful concept that would yield provably secure versions of every cryptographic system we’ve ever…
The future of encryption

October 27, 2015

If you want to protect valuable information, wouldn’t you keep it under lock and key? Today, modern encryption…
Universal Fingerprint-Protected Autofill

August 11, 2015

Crypta is a fingerprint-protected USB device that allows you to log into your account on any computer with your fingerprint. Plug…
One step closer to secure Internet communication

June 4, 2015

Every day, most of us transmit personal data over the Internet. Secure communication is thus an absolute necessity.…
Encrypted Messaging Between iOS and Android Devices For Free

March 4, 2015

Open Whisper Systems announced the launch of Signal 2.0, with support for TextSecure private messaging. The free app…
Wristband that replaces keys and passwords

November 26, 2014

Everykey is the wristband that replaces keys and passwords. Wristband is a Bluetooth enabled that allows immediate access…
ZenMate protected privacy

October 1, 2014

ZenMate is Berlin-based company providing a Virtual Private Network (VPN)-style service that encrypts your browsing and hides your IP address from anyone. Available for desktop…
Bleep Alpha Goes Public

September 18, 2014

Bittorent announced P2P messaging platform Bleep is available as public alpha. Mac and Android apps also are released.…
Chrome to start sunsetting SHA-1 hash algorithm

September 10, 2014

Modern cryptography amounts to nothing without authentication. That is, if an eavesdropper can alter the ciphertext in such…
Quantum key distribution technology: Secure computing for the ‘Everyman’

September 4, 2014

The largest information technology agreement ever signed by Los Alamos National Laboratory brings the potential for truly secure…
Google’s E2E developers propose a new way to share crypto keys

August 29, 2014

In June, Google released an alpha version of its End-to-End (E2E) e-mail encryption extension for Chrome browser. E2E…
Should PGP cryptography die?

August 19, 2014

Just as Google built end-to-end, an e-mail encryption extension, and Yahoo announced their plans to support end-to-end encryption…
Extracting secret crypto keys by human touch

August 13, 2014

As it was noted by a known infosec expert Thomas Ptacek, the truth about modern real-world cryptography is…
Google to give better search ranking for websites supporting HTTPS connection

August 8, 2014

Google aims to foster better security on the Web by encouraging the use of website encryption protocol HTTPS.…
Technology Org App
Google Play icon
84,754 science & technology articles

Most Popular Articles

  1. Real Artificial Gravity for SpaceX Starship (September 17, 2019)
  2. Top NASA Manager Says the 2024 Moon Landing by Astronauts might not Happen (September 19, 2019)
  3. How social media altered the good parenting ideal (September 4, 2019)
  4. What's the difference between offensive and defensive hand grenades? (September 26, 2019)
  5. Just How Feasible is a Warp Drive? (September 25, 2019)

Follow us

Facebook   Twitter   Pinterest   Tumblr   RSS   Newsletter via Email