6G cellular doesn’t exist, but it can be hacked

6G cellular doesn’t exist, but it can be hacked

Academic researchers have found a way to eavesdrop on 6G wireless transmissions using common, inexpensive, off-the-shelf components.

When quantum computers forget: Overcoming decoherence

When quantum computers forget: Overcoming decoherence

Quantum computing faces many technology challenges, but some researchers say they’ll be solved soon to usher in the Quantum Decade.

LoRa takes a trip to the moon and back, chirping all the way

LoRa takes a trip to the moon and back, chirping all the way

LoRa wireless that's used in IoT networks is known as a low-power, long-range technology—long-range enough to carry a message between Earth and the moon.

Drone demo shows it’s possible to protect 5G-managed devices from DDoS, exfiltration attacks

Drone demo shows it’s possible to protect 5G-managed devices from DDoS, exfiltration attacks

Using software developed by the Open Networking Foundation, Stanford researchers thwart wireless attacks in less than a second.

For networking pros, every month is Cybersecurity Awareness Month

For networking pros, every month is Cybersecurity Awareness Month

Network security shouldn't be just a set of routine tactical chores to maintain safeguards already in place, but a constant strategizing to anticipate the next threat.

The new internet speed record twice as fast as the old one

The new internet speed record twice as fast as the old one

Researchers in Japan hit long-haul data-transmission rates of 319Tbps.

Are Tesla’s Dojo supercomputer claims valid?

Are Tesla’s Dojo supercomputer claims valid?

If accurate, the performance of Tesla’s homegrown supercomputer as measured in FLOPS outperforms the recognized world’s fastest supercomputer by a factor of two.

Wi-Fi 7 is coming, and Intel makes it sound great

The next generation of Wi-Fi is at least three years off, but Intel predicts it will be up to five times faster

Don’t let subdomains sink your security

Don’t let subdomains sink your security

Subdomain takeover is a DNS problem that can hurt the credibility of your organization, and too many enterprises let it continue.

Experimental Morpheus CPU is ‘mind-bogglingly terrible’ to crack

Experimental Morpheus CPU is ‘mind-bogglingly terrible’ to crack

Researchers say their Morpheus processor changes its underlying implementation hundreds of times per second, giving attackers a very small time window to create and execute exploits.

Could antiferromagnetic chips replace silicon?

Could antiferromagnetic chips replace silicon?

Attractive properties of antiferromagnetic memory would include greater density of transistors than silicon provides and be immune to magnets erasing data.

The timeline for quantum computing is getting shorter

The timeline for quantum computing is getting shorter

New financial-trading algorithms promise quantum-computer performance improvements over classical computers within 5-10 years rather than 10-20.

Next-gen networks: Feds have cash for good ideas

Next-gen networks: Feds have cash for good ideas

The National Science foundation will be doling out research dollars for innovations in software-defined networking, network function virtualization, cloud computing, analytics, more.

5G research by DARPA will lead to commercial applications

5G research by DARPA will lead to commercial applications

5G has a wealth of features suitable for Department of Defense uses, but its vulnerability to cyber attack calls for bulletproof security.

Researchers: Quantum computers can reason

Researchers: Quantum computers can reason

Like humans, quantum computers can make decisions even in the face of incomplete data and uncertainty.

6G: Vast and mysterious promises

6G: Vast and mysterious promises

6G wireless may be a decade away, but it’s already expected to support terabit speeds, power mobile devices, and enable mobile holograms.

Scientists work to lower costs of using quantum computers

Scientists work to lower costs of using quantum computers

Superconductor researchers at MIT are working on the nano-cryotron, a computer switch that could reduce the cost of making and running quantum computers.

IoT security tips and a cautionary tale

IoT security tips and a cautionary tale

The US government is working toward establishing IoT security guidelines, and a very public dispute about a particular IoT device demonstrates why they are necessary.

Lessons that insurrection selfies hold for legitimate enterprises

Lessons that insurrection selfies hold for legitimate enterprises

While electronic metadata is helping law enforcement track those who assaulted Congress, existence of that data should be noted by businesses concerned about privacy.