Toggle light / dark theme

Researchers develop secure method for sending sensitive personal data from wearable tech

Smart watches. Pacemakers. Internet-connected glasses. These are devices designed to make life easier. And yet, all this wearable technology can be hacked. The devices send personal health information to your smartphone over the airways, so anyone with the know-how could scoop it up and steal it. But now, researchers at Northeastern have a better, more secure idea: Send data through your body.

Associate professor Kaushik Chowdhury worked with a team of researchers from the Draper Laboratory in Cambridge, Massachusetts, and the Federal University of Paraná in Brazil to develop a safe, hacker-proof method to transmit sensitive data.

“The truth is, no matter what I do when it comes to wireless devices, I’m radiating the signal through the air,” Chowdhury says. “There is the danger that the signal can be jammed, or analyzed by someone else. Our method secures this so it can’t be leaked.”

Read more

New cancer ‘vaccine’ helps immune system find, kill disease

The recent clinical trial was only conducted on patients with lymphoma, but the researchers suggested their approach could be potentially used to treat other types of cancer — and that it could improve the efficacy of other immunotherapies, including checkpoint blockade.

“The in situ vaccine approach has broad implications for multiple types of cancer,” said Brody, the study’s lead author and the director of the Lymphoma Immunotherapy Program at The Tisch Cancer Institute at the Icahn School of Medicine at Mount Sinai. “This method could also increase the success of other immunotherapies such as checkpoint blockade.”

Related Articles Around the Web.

Read more

New technique uses power anomalies to ID malware in embedded systems

Researchers from North Carolina State University and the University of Texas at Austin have developed a technique for detecting types of malware that use a system’s architecture to thwart traditional security measures. The new detection approach works by tracking power fluctuations in embedded systems.

“Embedded systems are basically any computer that doesn’t have a physical keyboard – from smartphones to Internet of Things devices,” says Aydin Aysu, co-author of a paper on the work and an assistant professor of electrical and computer engineering at NC State. “Embedded systems are used in everything from the voice-activated virtual assistants in our homes to industrial control systems like those used in . And that targets those systems can be used to seize control of these systems or to steal information.”

At issue are so-called micro-architectural attacks. This form of malware makes use of a system’s , effectively hijacking the hardware in a way that gives outside users control of the system and access to its data. Spectre and Meltdown are high-profile examples of micro-architectural malware.

Read more

Researchers transmit data via a semiconductor laser, opening the door to ultra-high-speed Wi-Fi

You’ve never heard Dean Martin like this.

Researchers from the Harvard John A. Paulson School of Engineering and Applied Sciences transmitted a recording of Martin’s classic “Volare” wirelessly via a semiconductor laser—the first time a laser has been used as a radio transmitter.

In a paper published in the Proceedings of the National Academy of Sciences, the researchers demonstrated a laser that can emit microwaves wirelessly, modulate them, and receive external radio frequency signals.

Read more

Australian Strategic Policy Institute

Chinese technology companies are increasingly important and dynamic international actors. They are making critical contributions in a range of areas, from cutting edge research to enabling connectivity for developing countries. Yet, their rapid expansion and growing influence also bring a range of strategic and policy challenges. The Australian Strategic Policy Institute’s International Cyber Policy Centre has created a public database to map the global expansion of 12 key Chinese tech companies working across the telecommunications, internet & biotech sectors. It’s a tool for journalists, researchers, NGOs, policymakers and the interested public to better understand the enormous scale, complexity and increasing reach of some of China’s tech giants. On this website you’ll find:

Read more

Nanocomponent is a quantum leap for Danish physicists

University of Copenhagen researchers have developed a nanocomponent that emits light particles carrying quantum information. Less than one-tenth the width of a human hair, the miniscule component makes it possible to scale up and could ultimately reach the capabilities required for a quantum computer or quantum internet. The research result puts Denmark at the head of the pack in the quantum race.

Teams around the world are working to develop quantum technologies. The focus of researchers based at the Center for Hybrid Quantum Networks (Hy-Q) at the University of Copenhagen’s Niels Bohr Institute is on developing quantum communication technology based on light circuits, known as nanophotonic circuits. The UCPH researchers have now achieved a major advancement.

“It is a truly major result, despite the component being so tiny,” says Assistant Professor Leonardo Midolo, who has been working towards this breakthrough for the past five years.

Read more