Northeastern researchers wanted to find out how free web browsers and apps compare with respect to protecting user’s privacy. The team investigated the degree to which each platform leaks personal information (things like passwords, locations, birthdates, genders, etc) to data analytics companies and advertisers. Not surprisingly, they found that overall apps leak more identifiers, as …
Author Archives: cwlee20
New Chip Detects for Sabotage
Designing and fabricating microchips worldwide is a serious, $350 billion business. But because it is such a huge industry, there are many opportunities for attacks: certain employees along the supply the chain can easily install malicious circuitry in chips if they want to. These harmful circuitries can sabotage various electronics, public infrastructure, health-care devices, etc. …
Chaos Can Enhance Wireless Communications
A team of researchers from the University of Aberdeen and the Xian University of Technology has found and demonstrated that chaos can be used to transmit information over a wireless physical channel with increased efficiency and security. Chaos has unpredictable behavior that can provide wide-range advantages in wireless communications. This is because the physical restraints …
Continue reading “Chaos Can Enhance Wireless Communications”
We Ignore Computer Security Warnings Most of the Time
A new study finds that people ignore computer security warnings up to 90% of the time, due to poor timing of the pop up (software security) messages. Google Chrome engineers and Brigham Young University researchers conducted a study that showed that the time security messages pop up is incredibly important: a security message that appears …
Continue reading “We Ignore Computer Security Warnings Most of the Time”
About Quantum Computers
Since 1960, the potential of world development has kept growing exponentially, which allow computers to get smaller and more powerful at the same time. However, this process is about to meet physical limits, and it is time to invent a new type of computer. The ultimate solution for this problem is Quantum Computers. People, nowadays, …
Internet is Changing Human Memory
You don’t have to be an internet expert in order to know we’re increasingly relying on the Internet when it comes to… well, pretty much everything. However, recent studies suggest that this ease of access to the vast resource of information is affecting our memory and thought processes for problem-solving and learning. A thing called …
Security Threat in Linux Systems
Here’s an important update: a new study shows serious security threat to many Internet users, as communications involving Linux systems can be easily and quickly compromised remotely. There is a serious weakness in the Transmission Control Protocol, or TCP, of all Linux operating systems that enables hackers to hijack users’ internet communications from anywhere. Here’s …
About Crococryptfile
Cryptography has many areas. However, for the 5 most famous topics, there are Symmetric Encryption, Asymmetric Encryption, Hybrid Encryption, Password-based Encryption – which is also called PBE- and Clocked Encryption. To give further information about those types of encryption with wise known examples, for symmetric, there are AES, Twofish, Triple-DES; for asymmetric, there are RSA, …
Your Device’s Battery Can Be Used To Track Your Online Activity
New research shows that a feature of HTML5 that allows websites to find out how much battery power a visitor has left on their device (smartphone or a laptop) can be used to track their presence online. If you’re wondering why HTML5 has a feature like that in the first place, it’s because it allows …
Continue reading “Your Device’s Battery Can Be Used To Track Your Online Activity”
Can We Destroy Our Digital Fingerprints?
Your online browser has a unique fingerprint, which means that, in extension, you have a digital fingerprint that you can (and usually do) leave behind at each location you visit on your internet browser. Digital fingerprints are similar to regular fingerprints – they are often unique to the individual and can be monitored and abused. …