RefBan

Referral Banners

Yashi

Friday, June 6, 2014

ScienceDaily: Computers and Internet News

ScienceDaily: Computers and Internet News


Are squiggly lines the future of password security?

Posted: 04 Jun 2014 05:32 PM PDT

As more people use smart phones and tablets to store personal information and perform financial transactions, the need for robust password security is more critical than ever. A new study shows that free-form gestures -- sweeping fingers in shapes across the screen -- can be used to unlock phones and grant access to apps. These gestures are less likely to be observed and reproduced by 'shoulder surfers' who spy on users to gain unauthorized access.

Passwords No More? Mechanisms Enables Users to Log in Securely Without Passwords

Posted: 04 Jun 2014 05:29 PM PDT

Passwords are a common security measure to protect personal information, but they don't always prevent hackers from finding a way into devices. Researchers are working to perfect an easy-to-use, secure login protection that eliminates the need to use a password -- known as zero-interaction authentication. An innovative solution for safeguarding personal information relies on your proximity instead of your memory.

Shaken, not stirred: Control over complex systems consisting of many quantum particles

Posted: 04 Jun 2014 06:41 AM PDT

Superpositions of different quantum states are often used for high precision measurements. Usually, states of single particles are used, but scientists have found a way to control superpositions of the collective motion of a Bose Einstein condensate. Hundreds of atoms form a single matter wave, the superposition of different waves is controlled by tailored electromagnetic pulses.

60-year-old prediction of atomic behavior confirmed: New experimental path to superfast quantum computing

Posted: 04 Jun 2014 06:39 AM PDT

Researchers have used a super-cold cloud of atoms that behaves like a single atom to see a phenomenon predicted 60 years ago and witnessed only once since. The phenomenon takes place in the seemingly otherworldly realm of quantum physics and opens a new experimental path to potentially powerful quantum computing.

New proactive approach unveiled to detect malicious software in networked computers and data

Posted: 04 Jun 2014 06:27 AM PDT

Cybercrime comes in all forms these days. One recent headline told of the creepware or silent computer snooping that resulted in the arrest of some 90 people in 19 countries. Miss Teen USA was among the victims. Her computer had been turned into a camera and used to spy on her in her own bedroom. Computer scientists have now developed a unique anomaly protection security approach for the detection of malicious activities on networked computers.

No comments:

Yashi

Chitika