Menu

Blog

Archive for the ‘security’ category

Jul 24, 2024

Event-driven optical encryption advances information security through neuromorphic imaging

Posted by in categories: computing, encryption, internet, security

In an era where the internet connects virtually every aspect of our lives, the security of information systems has become paramount. Safeguarding critical databases containing private and commercial information presents a formidable challenge, driving researchers to explore advanced encryption techniques for enhanced protection.

Data encryption, a cornerstone of modern practices, transforms readable plaintext into encoded ciphertext, ensuring that only authorized recipients can decipher the data using a decryption key or password. Optical techniques have emerged as promising tools for encryption due to their capabilities for parallel, high-speed transmission, and low-power consumption. However, traditional optical encryption systems often suffer from vulnerabilities where plaintext-ciphertext forms remain identical, potentially compromising security.

Reporting in Advanced Photonics Nexus, scientists have unveiled an approach inspired by bio-inspired neuromorphic imaging and speckle correlography. Their innovative technique leverages computational neuromorphic imaging (CNI) to encrypt images into event-stream ciphertexts, marking a significant departure from conventional methods. This method introduces a new paradigm in optical encryption by converting data into event-driven formats, thereby significantly enhancing security and complexity.

Jul 20, 2024

Infleqtion Installs First Quantum Computer at NQCC

Posted by in categories: computing, particle physics, quantum physics, security

Infleqtion, the world’s leading quantum information company, announced the installation of a cutting-edge neutral atom quantum computer at the National Quantum Computing Centre (NQCC).


PRESS RELEASE — Infleqtion, the world’s leading quantum information company, is proud to announce the installation of a cutting-edge neutral atom quantum computer at the National Quantum Computing Centre (NQCC). This marks a significant milestone as Infleqtion becomes the first company to deploy hardware at the NQCC under their quantum computing testbed programme. The news comes on the heels of Infleqtion’s rapid advancement in quantum gate fidelity.

Tim Ballance, President of Infleqtion UK, said, “Our recent installation is part of Infleqtion’s dedication to leading facility logistics in partnership with our colleagues at the NQCC. Together, we are establishing crucial infrastructure components such as network infrastructure, safety protocols, and security measures. Infleqtion has completed our second milestone, which includes the installation and in-situ characterisation of primary lasers, optical, vacuum, and electronic subsystems necessary for the quantum computer to function. This accomplishment demonstrates our advanced technology and expertise in the field.”

Continue reading “Infleqtion Installs First Quantum Computer at NQCC” »

Jul 20, 2024

AI-powered optical detection to thwart counterfeit chips

Posted by in categories: finance, quantum physics, robotics/AI, security, surveillance

The semiconductor industry has grown into a $500 billion global market over the last 60 years. However, it is grappling with dual challenges: a profound shortage of new chips and a surge of counterfeit chips, introducing substantial risks of malfunction and unwanted surveillance. In particular, the latter inadvertently gives rise to a $75 billion counterfeit chip market that jeopardizes safety and security across multiple sectors dependent on semiconductor technologies, such as aviation, communications, quantum, artificial intelligence, and personal finance.

Jul 13, 2024

Microsoft Issues Update Warning For All Outlook Users As ‘Dangerous’ New Threat Confirmed

Posted by in categories: business, security

The range of threats, they say, include “attackers exploit[ing] this vulnerability to gain unauthorized access, execute arbitrary code, and cause substantial damage without any user interaction. The absence of authentication requirements makes it particularly dangerous, as it opens the door to widespread exploitation.”

The repeated reference to “trusted senders” in this warning is important. This vulnerability only carries a zero click threat when an email is received from a trusted source. If the sender is unknown, then the user would need to click to execute. That said, if the problem for an attacker is now spoofing emails from trusted sources that’s a very low bar in today’s world of industrial scale business email compromise.

Jul 9, 2024

New technique offers unprecedented control over light at terahertz frequencies

Posted by in categories: biotech/medical, security

Researchers have developed a novel method for generating structured terahertz light beams using programmable spintronic emitters. This breakthrough offers a significant leap forward in terahertz technology, enabling the generation and manipulation of light with both spin and orbital angular momentum at these frequencies for the first time.

Terahertz radiation lies between microwaves and on the electromagnetic spectrum. It holds great promise for various applications, including security scanners, medical imaging, and ultrafast communication. However, generating and controlling terahertz light effectively has proven challenging.

This new research, published in eLight and led by Prof. Zhensheng Tao, Prof. Yizheng Wu from Fudan University and Prof. Yan Zhang from Capital Normal University, overcomes these limitations by employing programmable spintronic emitters based on exchange-biased magnetic multilayers. These devices consist of thin layers of magnetic and non-magnetic materials that convert laser-induced spin-polarized currents into broadband terahertz radiation.

Jul 8, 2024

How Quantum Computing Is Already Changing the World

Posted by in categories: computing, encryption, quantum physics, security

The power of quantum computing drives a desperate need for quantum encryption. This megatrend is creating a multi-billion-dollar security market.

Jul 8, 2024

Engineers develop advanced optical computing method for multiplexed data processing and encryption

Posted by in categories: computing, encryption, security

Engineers at the University of California, Los Angeles (UCLA) have unveiled a major advancement in optical computing technology that promises to enhance data processing and encryption. The work is published in the journal Laser & Photonics Reviews.

This innovative work, led by Professor Aydogan Ozcan and his team, showcases a reconfigurable diffractive optical network capable of executing high-dimensional permutation operations, offering a significant leap forward in telecommunications and data security applications.

Permutation operations, essential for various applications, including telecommunications and encryption, have traditionally relied on electronic hardware. However, the UCLA team’s advancement uses all-optical diffractive computing to perform these operations in a multiplexed manner, significantly improving efficiency and scalability.

Jul 8, 2024

Flying Qudits: Unlocking New Dimensions of Quantum Communication

Posted by in categories: computing, encryption, internet, quantum physics, security

Researchers have developed a breakthrough method for quantum information transmission using light particles called qudits, which utilize the spatial mode and polarization properties to enable faster, more secure data transfer and increased resistance to errors.

This technology could greatly enhance the capabilities of a quantum internet, providing long-distance, secure communication, and leading to the development of powerful quantum computers and unbreakable encryption.

Scientists have made a significant breakthrough in creating a new method for transmitting quantum information using particles of light called qudits. These qudits promise a future quantum internet that is both secure and powerful.

Jul 7, 2024

China’s Laws of Robotics: Shanghai publishes first humanoid robot guidelines

Posted by in categories: robotics/AI, security

Makers of humanoid robots should guarantee that their products “do not threaten human security” and “effectively safeguard human dignity”, according to a new set of guidelines published in Shanghai during the World Artificial Intelligence Conference (WAIC) on Saturday.

They should also take measures that include setting up risk warning procedures and emergency response systems, as well as give users training on the ethical and lawful use of these machines, according to the guidelines.

Jul 6, 2024

The Mathematics of Reliable Artificial Intelligence

Posted by in categories: mathematics, robotics/AI, security, transportation

By Gitta Kutyniok

The recent unprecedented success of foundation models like GPT-4 has heightened the general public’s awareness of artificial intelligence (AI) and inspired vivid discussion about its associated possibilities and threats. In March 2023, a group of technology leaders published an open letter that called for a public pause in AI development to allow time for the creation and implementation of shared safety protocols. Policymakers around the world have also responded to rapid advancements in AI technology with various regulatory efforts, including the European Union (EU) AI Act and the Hiroshima AI Process.

One of the current problems—and consequential dangers—of AI technology is its unreliability and subsequent lack of trustworthiness. In recent years, AI-based technologies have often encountered severe issues in terms of safety, security, privacy, and responsibility with respect to fairness and interpretability. Privacy violations, unfair decisions, unexplainable results, and accidents involving self-driving cars are all examples of concerning outcomes.

Page 1 of 13912345678Last