Tuesday, December 18, 2012

Your Daily digest for Server, ISP and Host News Service

Server, ISP and Host News Service
Simply Sly`s Server Services News and Information Outlet Feed Pipe
TV and the internet: a marriage made in entertainment heaven
Dec 18th 2012, 16:16

If you have bought a new television lately, the chances are it is a lot smarter than your old one. Smart TVs, also known as connected or hybrid televisions, featuring integrated internet connectivity, currently account for around a third of TV sales in Europe. They are the end point in a huge and rapidly expanding value chain driven by the intensifying convergence of television and the internet.

Cream of the crop: Sandwich chips combining the best of two technologies
Dec 18th 2012, 13:17

Two Leibniz institutes broke new technological ground and successfully combined their -- up to now separate -- technology worlds. Due to their high performance, the novel chips developed within the HiTeK project promise to open up new applications.

Swiss scientist prove durability of quantum network
Dec 2nd 2011, 01:02

Scientists and engineers have proven the worth of quantum cryptography in telecommunication networks by demonstrating its long-term effectiveness in a real-time network. Their international network, created in collaboration with ID Quantique and installed in the Geneva metropolitan area and crossing over to the site of CERN in France, ran for more than one-and-a-half years from the end of March 2009 to the beginning of January 2011.

Not one, not two, not three, but four clones: First quantum cloning machine to produce four copies
Nov 6th 2011, 20:07

Scientists in China have produced a theory for a quantum cloning machine able to produce several copies of the state of a particle at atomic or sub-atomic scale, or quantum state. The advance could have implications for quantum information processing methods used, for example, in message encryption systems.

The perfect clone: Researchers hack RFID smartcards
Nov 3rd 2011, 12:13

Professional safecrackers use a stethoscope to find the correct combination by listening to the clicks of the lock. Researchers have now demonstrated how to bypass the security mechanisms of a widely used contactless smartcard in a similar way. Employing so-called "Side-Channel Analysis" the researchers can break the cryptography of millions of cards that are used all around the world.

Using photons to manage data
Oct 27th 2011, 20:31

Managing light to carry computer data, such as text, audio and video, is possible today with laser light beams that are guided along a fiber-optic cable. These waves consist of countless billions of photons, which carry information down the fiber across continents. A research team wants to refine the optical transmission of information by using a single photon, the fundamental building block of light that can allow unprecedented applications in optical information transfer.

Internet security: Researchers break W3C standard
Oct 19th 2011, 14:49

Standards are supposed to guarantee security, especially in the WWW. The World Wide Web Consortium (W3C) is the main force behind standards like HTML, XML, and XML Encryption. But implementing a W3C standard does not mean that a system is secure. Researchers from the chair of network and data security have found a serious attack against XML Encryption. "Everything is insecure", is the uncomfortable message from the researchers.

iPhone turned into spiPhone: Smartphone senses nearby keyboard vibrations and deciphers sentences
Oct 18th 2011, 17:13

Engineers have discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent accuracy.

The future of airport passport control
Oct 14th 2011, 14:44

Digital security specialists, major European electronics makers, and experts in biometrics worked together to make passport control at airports faster. The technology also could have broader applications on the way our identity documents are design and on the way we access public services.

Professor uncovers potential issues with apps built for Android systems
Oct 13th 2011, 20:29

Experts are concerned with potential issues with mobile applications (commonly referred to as apps) written for the Android system using the WebView platform.

Cyber threats forecast for 2012 released
Oct 11th 2011, 17:20

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy, according to computer security experts.

Smart phones: Keeping business data secure while allowing installation of personal apps
Oct 7th 2011, 14:32

More and more companies are providing their employees with smartphones. While companies seek the best security available for their data, employees would also like to install apps of their own. Security experts have now developed equipment software with two separate areas: the business area and the personal area.

Secure updates for navigation systems
Oct 5th 2011, 15:02

At the push of a button by the driver, control units download the car manufacturer's new software -- such as enhanced map material for the navigation system. To ensure that this data channel is protected from hacker attack, the system needs the right cryptographic key. To date, these keys have been stored in each one of a vehicle's electronic control units. Thanks to a new form of trust anchor, this will be simpler and more economical in the future.

Cyber security report identifies key research priorities
Sep 13th 2011, 14:32

Developing self-learning, self aware cyber security technologies, protecting smart utility grids and enhancing the security of mobile networks are among the top research priorities needed to safeguard the internet of tomorrow, according to a new report.

Physicists demonstrate quantum integrated circuit that implements quantum von Neumann architecture
Sep 1st 2011, 19:52

A new paradigm in quantum information processing has been demonstrated. Physicists have developed a quantum integrated circuit that implements the quantum von Neumann architecture. In this architecture, a long-lived quantum random access memory can be programmed using a quantum central processing unit, all constructed on a single chip, providing the key components for a quantum version of a classical computer.

Simple security for wireless
Aug 22nd 2011, 15:17

Researchers have demonstrated the first wireless security scheme that can protect against "man-in-the-middle" attacks -- but doesn't require a password.

First flaws in the Advanced Encryption Standard used for internet banking identified
Aug 17th 2011, 11:54

Researchers have found a weakness in the AES algorithm used worldwide to protect internet banking, wireless communications, and data on hard disks. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. However the attack has no practical implications on the security of user data due to various complexities.

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions