Toggle light / dark theme

A researcher has released a tool to bypass Google’s new App-Bound encryption cookie-theft defenses and extract saved credentials from the Chrome web browser.

The tool, named ‘Chrome-App-Bound-Encryption-Decryption,’ was released by cybersecurity researcher Alexander Hagenah after he noticed that others were already figuring out similar bypasses.

Although the tool achieves what multiple infostealer operations have already added to their malware, its public availability raises the risk for Chrome users who continue to store sensitive data in their browsers.

PRESS RELEASE — After over a year of evaluation, NIST has selected 14 candidates for the second round of the Additional Digital Signatures for the NIST PQC Standardization Process. The advancing digital signature algorithms are:

NIST Internal Report (IR) 8528 describes the evaluation criteria and selection process. Questions may be directed to [email protected]. NIST thanks all of the candidate submission teams for their efforts in this standardization process as well as the cryptographic community at large, which helped analyze the signature schemes.

Moving forward, the second-round candidates have the option of submitting updated specifications and implementations (i.e., “tweaks”). NIST will provide more details to the submission teams in a separate message. This second phase of evaluation and review is estimated to last 12–18 months.

A team of Chinese researchers, led by Wang Chao from Shanghai University, has demonstrated that D-Wave’s quantum annealing computers can crack encryption methods that safeguard sensitive global data.

This breakthrough, published in the Chinese Journal of Computers, emphasizes that quantum machines are closer than expected to threatening widely used cryptographic systems, including RSA and Advanced Encryption Standard (AES).

The research team’s experiments focused on leveraging D-Wave’s quantum technology to solve cryptographic problems. In their paper, titled “Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage,” the researchers explained how quantum annealing could transform cryptographic attacks into combinatorial optimization problems, making them more manageable for quantum systems.

#ibm #heron #quantumcomputer #quantumphysics #softwareengineering #developers #programming #artificialintelligence #ai #neuralnetworks #machinelearning #explorepage #financialmarkets #cryptography #business #productdevelopment #researchanddevelopment #computerscience #qubit #engineering #technology #startups #science #mathematics #innovation #invention

(NEXSTAR) — The Internet Archive, a popular digital library known for its Wayback Machine, was hacked and suffered a data breach that reportedly exposed 31 million user accounts.

Founder Brewster Kahle confirmed in a post on the social media platform X that a cyberattack on Tuesday knocked the website offline. He also said that usernames, emails, and encrypted passwords had been compromised.

“Services are currently stopped to upgrade internal systems,” Kahle wrote in a Thursday update. “We are working to restore services as quickly and safely as possible. Sorry for this disruption.”

Quantum entanglement is a fascinating feature of quantum physics—the theory of the very small. If two particles are quantum-entangled, the state of one particle is tied to that of the other, no matter how far apart the particles are. This mind-bending phenomenon, which has no analog in classical physics, has been observed in a wide variety of systems and has found several important applications, such as quantum cryptography and quantum computing.

Researchers Propose a #Smaller, more #Noise-#Tolerant #Quantum #Circuit for #Cryptography.

MIT researchers new algorithm is as fast as Regev’s, requires fewer qubits, and has a higher tolerance to quantum noise, making it more feasible to implement…


The most recent email you sent was likely encrypted using a tried-and-true method that relies on the idea that even the fastest computer would be unable to efficiently break a gigantic number into factors.

Quantum computers, on the other hand, promise to rapidly crack complex cryptographic systems that a classical computer might never be able to unravel. This promise is based on a quantum factoring algorithm proposed in 1994 by Peter Shor, who is now a professor at MIT.

A flexible screen inspired in part by squid can store and display encrypted images like a computer—using magnetic fields rather than electronics. The research is reported in Advanced Materials by University of Michigan engineers.

“It’s one of the first times where mechanical materials use magnetic fields for system-level encryption, information processing and computing. And unlike some earlier mechanical computers, this device can wrap around your wrist,” said Joerg Lahann, the Wolfgang Pauli Collegiate Professor of Chemical Engineering and co-corresponding author of the study.

The researchers’ screen could be used wherever light and power sources are cumbersome or undesirable, including clothing, stickers, ID badges, barcodes and e-book readers. A single screen can reveal an image for everyone to see when placed near a standard magnet or a private encrypted image when placed over a complex array of magnets that acts like an encryption key.