Skip to content
ScienceBlog.com
  • Featured Blogs
    • EU Horizon Blog
    • ESA Tracker
    • Experimental Frontiers
    • Josh Mitteldorf’s Aging Matters
    • Dr. Lu Zhang’s Gondwanaland
    • NeuroEdge
    • NIAAA
    • SciChi
    • The Poetry of Science
    • Wild Science
  • Topics
    • Brain & Behavior
    • Earth, Energy & Environment
    • Health
    • Life & Non-humans
    • Physics & Mathematics
    • Social Sciences
    • Space
    • Technology
  • Our Substack
  • Follow Us!
    • Bluesky
    • Threads
    • FaceBook
    • Google News
    • Twitter/X
  • Contribute/Contact

data security

The proposed vortex beam can carry vast amounts of information, making them ideal for dense data communication systems.

Novel Light-Bending Technology Could Transform Data Security and Transmission

This new algorithm requires fewer quantum building blocks, and has a higher tolerance to quantum noise, which could make it more feasible to implement in practice.

MIT Scientists Unveil Quantum Leap Towards Cracking Unbreakable Codes

A 3D rendered image of a smartphone with a period-tracking app open, surrounded by a group of concerned-looking women.

Study Reveals Unease Over Period-Tracking App Privacy in Post-Roe Era

A machine-learning technique developed by researchers from MIT and elsewhere enables deep learning models, like those that underlie AI chatbots or smart keyboards, to efficiently and continuously learn from new user data directly on an edge device like a smartphone. Credits:Image: MIT News

Technique enables AI on edge devices to keep learning over time

This app launcher on an Androip phone displays app icons: the Spyhuman app installed itself as the innocous-seeming WiFi icon. What are spyware apps? Spyware apps surreptitiously run on a device, most often without the device owner’s awareness. They collect a range of sensitive information such as location, texts and calls, as well as audio and video. Some apps can even stream live audio and video. All this information is delivered to an abuser via an online spyware portal.

This is what happens when your phone is spying on you

Ominous looking computer servers

Oxford breakthrough enables perfectly secure digital communications

Substack subscription form sign up

Comments

  • Norwood johnson on Electrons in New Crystals Behave as If They Live in Four Dimensions
  • ScienceBlog.com on Hidden Geometry Could Finally Fix Quantum Computers
  • Theo Prinse on America Is Going Back to the Moon. This Time, It Plans to Stay
  • george w on Hidden Geometry Could Finally Fix Quantum Computers
  • Tom Hughes on Years of Exercise, Blood Pressure Drugs Failed to Slow Cognitive Decline in Seniors at Dementia Risk
© 2026 ScienceBlog.com | Follow our RSS / XML feed