Tech and Computer

Tech and Computer news

 

 

Thu04042013

Last update06:42:42 PM GMT

Back Computer Science Encryption

Encryption

Voice phishing: System to trace telephone call paths across multiple networks developed

  • PDF
TechAndComputer (Oct. 9, 2010) — Phishing scams are making the leap from email to the world's voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to tag fraudulent calls with a digital "fingerprint" that will help separate legitimate calls from phone scams.

Voice phishing (or "vishing") has become much more prevalent with the advent of cellular and voice IP (VoIP) networks, which enable criminals both...

TechAndComputer (Oct. 9, 2010) — Phishing scams are making the leap from email to the world's voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to tag fraudulent calls with a digital "fingerprint" that will help separate legitimate calls...

Quantum error correcting code discovered

  • PDF
TechAndComputer (Oct. 5, 2010) — The journal Nature Photonics recently published an article about the successful demonstration of a quantum error correcting code by the laboratory of Ulrik Andersen at the Technical University of Copenhagen, Denmark. This work, resulting from an international collaboration with the teams of Gerd Leuchs at the Max Planck Institute for the Science of Light in Erlangen, Germany, and of Nicolas Cerf at Université...

TechAndComputer (Oct. 5, 2010) — The journal...

Single electron reader opens path for quantum computing

  • PDF
TechAndComputer (Sep. 29, 2010) — A team led by engineers and physicists at the University of New South Wales (UNSW) in Sydney, Australia, have developed one of the key building blocks needed to make a quantum computer using silicon: a "single electron reader."

Their work was published in the journal Nature.

Quantum computers promise exponential increases in processing speed over today's computers through their use of the "spin," or magnetic...

TechAndComputer (Sep. 29, 2010) — A team...

How safe is your swipe? Thinking like hackers, programmers find security loopholes in 'secure' microchips

  • PDF
TechAndComputer (Sep. 27, 2010) — Used in a variety of products from credit cards to satellite televisions, secure chips are designed to keep encoded data safe. But hackers continue to develop methods to crack the chips' security codes and access the information within.

Thinking like hackers, Prof. Avishai Wool and his Ph.D. student Yossi Oren of Tel Aviv University's School of Electrical Engineering have developed an innovative way of extracting...

TechAndComputer (Sep. 27, 2010) — Used...

Smart grid cyber security: Initial set of guidelines finalized

  • PDF
TechAndComputer (Sep. 15, 2010) — The National Institute of Standards and Technology (NIST) has issued its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious...

TechAndComputer (Sep. 15, 2010) — The...