News & Articles By Edsel Cook
11/07/2018
/
By Edsel Cook
Computer experts warn that hackers can learn what’s on your computer screen just by listening to your webcam’s microphone
Your computer emits all kinds of noise, including ultrasonic sounds that cannot be picked up by the human ear. Hackers can record that noise through your microphone and convert it into a rather accurate copy of the information flashing on your monitor, an article in Wired reported. Researchers from several different universities demonstrated the hacking […]
11/03/2018
/
By Edsel Cook
MIT researchers design a novel encryption method that secures data used in online neural networks
A combination of two encryption techniques may one day allow neural networks to have their computing cake and eat it, too. An article in Science Daily stated that the new technique improves the security of cloud-based machine learning without incurring any penalties in speed. Machine learning requires a lot of computational power. Convolutional neural networks, for […]
09/24/2018
/
By Edsel Cook
What’s the best way to protect cars from theft? Wrap key fob signals in aluminum foil
Even as cyber thieves come up with high-tech ways to steal your car, old-fashioned materials can stop them from succeeding. Security experts recommend wrapping your car fob in aluminum foil to prevent hackers from copying its wireless signal, an article in the Detroit Free Press reports. Cybersecurity expert Holly Hubert recommends that people should buy a […]
08/04/2018
/
By Edsel Cook
The Russian military is building a giant online computing cloud that could disconnect entirely from the global internet during wartime
Electronic clouds of war are being drawn over Russia. The Eastern European country’s military is building a giant online cloud that will allow its important systems to keep running even if it loses its connection to the global internet through hacking – or because it decided to destroy the internet as part of the first […]
07/28/2018
/
By Edsel Cook
How to protect your information and remain anonymous online
Protecting your identity in the lawless wild of the Internet is considered to be a lost cause. But an article on Survival Blog.com tackled how you can set up a secure virtual machine for browsing online. Start by getting a gaming laptop with Windows 10 Professional. To make sure the purchase can’t be traced back to […]
07/27/2018
/
By Edsel Cook
University of Utah engineer received $2M grant to develop smarter tech to tackle power outages
A new research laboratory is being constructed in Utah. Funded by the U.S. Navy, it will develop microgrid technologies that can help communities maintain or restore their supply of electricity after a natural disaster or a cyber attack takes out the main power grid, an article in News Wise states. When Hurricane Maria slammed into Puerto […]
05/05/2018
/
By Edsel Cook
Scientists use Einstein’s theory of relativity to generate random numbers that can never be hacked
Hackers are now finding it easy to crack encryption systems that rely on random number generators, according to a LiveScience article. In response, Colorado-based mathematicians combined quantum mechanics with Albert Einstein’s theory of relativity to create absolutely arbitrary numbers that cannot be predicted or hacked. Random numbers are the backbone of encryption systems. Computers use them […]
05/02/2018
/
By Edsel Cook
Smart devices straight off the shelf have horrible security
Every smart device you buy straight from the shelves and add to your local internet of things (IoT) is an additional opening for hackers to compromise your home and your safety, according to an article on ScienceDaily. Cyber researchers from the Ben-Gurion University of the Negev (BGU) have been investigating devices and networks in the smart home and IoT […]
05/01/2018
/
By Edsel Cook
The “information speed limit” just got doubled by quantum physicists
Quantum physicists have once more managed to bend the laws of nature. They found out how to send twice the amount of information using a single particle, effectively doubling the so-called bandwidth of the universe even though the speed of the message hasn’t increased, according to an article on Space.com. We can only transfer so […]
04/25/2018
/
By Edsel Cook
Army scientists leverage brain-like computer to crack codes, solve battlefield problems quicker
Military researchers have come across a terrifying use for brain-like computer architectures. They’re using these powerful neuromorphic computers to break the tried-and-tested public key encryption that protects most modern-day internet communications, according to a ScienceDaily article. Neuromorphic computers are so powerful that they can be built to small specifications that require less electricity. They’re also able to perform large […]
« Return Home
1 of 2
Next Page »
Popular Articles
COPYRIGHT © 2017 CYBER WAR NEWS
Privacy Policy