Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Posts Tagged ‘Quantum’
Most Recent
Read More
September 30, 2015

Acronis and ID Quantique to Bring Quantum-Safe Encryption to Cloud Data Protection

Acronis, a company specialized in new generation data protection, and ID Quantique, a company specialized in quantum-safe crypto solutions, announced a collaboration to help protect companies from future security threats related to advances in decryption techniques and the arrival of quantum computing.

Read More
September 25, 2015

Physicists Crack Quantum Teleportation of Data

Scientists at Boulder’s National Institute of Standards and Technology published a paper in the scientific journal Optica this week describing how they had recently been able to “perform highly efficient multifold coincidence measurements, resulting in the successful quantum teleportation over 100 km of fiber.”

According to some publications, such as the Christian Science Monitor, this amounts to “breaking the quantum teleportation record.” In a sense, this claim rings true – the previous record using a similar technique was 25 kilometers. However, the researchers are not talking about teleportation in the sense that most readers will think of it. They are not talking [...]

Read More
September 15, 2015

Is Quantum Space-Time a Scale-Free Network Like Facebook?

Researchers from Queen Mary University of London and Karlsruhe Institute of Technology have developed a model that applies ideas from the theory of complex networks, such as the brain or the Internet, to the fundamental quantum geometry of space-time.

Read More
September 8, 2015

Quantum Defense – The Race to Military Applications of Fundamental Science

The first superpower to harnesses quantum science will achieve military super-powers, Defense One reports: unbreakable communication security, and quantum supercomputers much more powerful than today’s machines. As usual, the race is between the US and China.

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University