The Future of Cybersecurity Is the Quantum Random Number Generator

In 1882, a banker in Sacramento, Calif., named Frank Miller developed an absolutely unbreakable encryption method. Nearly 140 years later, cryptographers have yet to come up with something better. Miller had learned about cryptography while serving as a military investigator during the U.S. … Read More

Tomorrow’s Quantum Computers Are Already Threatening Today’s Data

Large-scale quantum computing could be just five years away. It may seem like the plot of a new Terminator movie, but quantum computers from the future are threatening government data today. But before you accuse me of wearing my tinfoil hat … Read More

Hackers find new way of stealing passwords through body heat

Hackers have found a new way to sneak into computers and it’s through our own body heat. Researchers at University of California found a new way of hacking, which is through a person’s own heat left by their fingers. When … Read More

Targeting power grid is too easy, Energy Department says

Energy Secretary Rick Perry warned Monday that the electric grid is easier to attack than ever as he issued a comprehensive cybersecurity strategy. “The frequency, scale and sophistication of cyber threats have increased, and attacks have become easier to launch,” … Read More

Hackers take veterinary office’s phone system hostage

CONCORD, N.H. — Investigators are trying to track down whoever has taken a Concord business’ phone lines hostage. The owner of AVC Emergency Veterinary of Manchester and Concord said she is refusing to give in to the hackers, saying that … Read More

Proposed ENCRYPT Bill to Create National Data Encryption Rules

NEWS ANALYSIS: U.S. Rep. Ted Lieu reintroduces a bill that would prohibit states and localities from creating their own rules about encryption as well as preventing them from banning encryption. Explaining that he’s concerned about a patchwork of diverse and … Read More

Is Quantum Computing Ushering in an Era of No More Secrets?

In one of my favorite movies of all time, a brilliant mathematician creates a device capable of breaking the encryption used for air traffic control, global banking, and other critical applications. His company Setec Astronomy (an anagram for Too Many Secrets) has … Read More

Cyberattack Shows Vulnerability of Gas Pipeline Network

HOUSTON — A cyberattack on a shared data network forced four of the nation’s natural-gas pipeline operators to temporarily shut down computer communications with their customers over the last week. No gas service was interrupted, the companies said, and the … Read More

Critical Flaw Hits Popular Windows Apps Built With Electron JS Framework

A critical remote code execution vulnerability has been reported in Electron—a popular web application framework that powers thousands of widely-used desktop applications including Skype, Signal, WordPress and Slack—that allows for remote code execution. Electron is an open-source framework that is based … Read More

Critical Flaw in All Blizzard Games Could Let Hackers Hijack Millions of PCs

A Google security researcher has discovered a severe vulnerability in Blizzard games that could allow remote attackers to run malicious code on gamers’ computers. Played every month by half a billion users—World of Warcraft, Overwatch, Diablo III, Hearthstone and Starcraft … Read More