Search by tag «Information Security» 52 results

  • CODA: The New Approach to Virus Protection

    The never-ending confrontation between viruses and antiviruses is a lot like a game of tag: for every threat a new security system upgrade is developed, and then new malware is developed to overcome the security. Yet, what if one eliminates the very possibility of malware entering the system? Artur Hanov, CEO of the CODA Project and tutor from the Department of Secure Information Technologies, shared how to do that.

    03.02.2017

  • How to Hack into Something That Cannot be Hacked?

    Quantum technologies is one of the main trends of modern IT. Though scientists have yet to develop a full-fledged quantum computer that can solve tasks impossible for silicon ones, quantum cryptography systems are already here. Their main advantage is that it’s impossible to intercept information transferred by such systems (for details, read here). Still, one can't exclude the possibility of successful hacking of a quantum cryptography system. In an interview to our portal, Vadim Makarov, Head of the Quantum Hacking Laboratory of the Institute for Quantum Computing at the University of Waterloo in Canada, shared about who and why attempt to hack such systems.

    28.12.2016