Menu

Blog

Archive for the ‘security’ category: Page 17

Apr 3, 2023

Graphene key for novel hardware security

Posted by in categories: encryption, robotics/AI, security

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, Penn State researchers have designed a way to make the encrypted keys harder to crack.

Led by Saptarshi Das, assistant professor of engineering science and mechanics, the researchers used graphene — a layer of carbon one atom thick — to develop a novel low-power, scalable, reconfigurable hardware security device with significant resilience to AI attacks. They published their findings in Nature Electronics today (May 10).

“There has been more and more breaching of private data recently,” Das said. “We developed a new hardware security device that could eventually be implemented to protect these data across industries and sectors.”

Mar 29, 2023

Google Duplex Will Change EVERYTHING… Here’s Why!

Posted by in categories: robotics/AI, security

In case you’re wondering how Google duplex actually works. Goodnight!


Google Duplex Will Change EVERYTHING… Here’s Why!Welcome back to Tech Craze, today on the channel we are going to catch sight of Everything you need to know about the google duplex. Google Duplex is a project launched in 1998 that is currently live in the majority of the US, along with some other parts of the world. At first, it allowed users to access an AI assistant to help make restaurant reservations. However, its use has since expanded to other functions as well.

Continue reading “Google Duplex Will Change EVERYTHING… Here’s Why!” »

Mar 28, 2023

Twitter’s source code leaked on GitHub, revealing proprietary information and security flaws

Posted by in category: security

The social media behemoth Twitter was recently dealt a significant setback when significant portions of its source code were published online and made public. The corporation proceeded promptly to notify GitHub, an online collaboration platform for software engineers, of a copyright violation in order to get the stolen code removed from the site. It is not known how long the code had been available online, although it seems to have been accessible to the public for a number of months.

Twitter has filed a petition with the United States District Court for the Northern District of California requesting that the court require GitHub to disclose the identity of the individual who is responsible for spreading the code as well as any other users that downloaded it.

Continue reading “Twitter’s source code leaked on GitHub, revealing proprietary information and security flaws” »

Mar 27, 2023

Android app from China executed 0-day exploit on millions of devices

Posted by in categories: computing, mobile phones, neuroscience, security

Can you imagine if we had computer/brain interfaces what would happen? We’ll need brain firewalls and antivirus.


Android apps digitally signed by China’s third-biggest e-commerce company exploited a zero-day vulnerability that allowed them to surreptitiously take control of millions of end-user devices to steal personal data and install malicious apps, researchers from security firm Lookout have confirmed.

The malicious versions of the Pinduoduo app were available in third-party markets, which users in China and elsewhere rely on because the official Google Play market is off-limits or not easy to access. No malicious versions were found in Play or Apple’s App Store. Last Monday, TechCrunch reported that Pinduoduo was pulled from Play after Google discovered a malicious version of the app available elsewhere. TechCrunch reported the malicious apps available in third-party markets exploited several zero-days, vulnerabilities that are known or exploited before a vendor has a patch available.

Continue reading “Android app from China executed 0-day exploit on millions of devices” »

Mar 25, 2023

The end of text-based passwords? ‘Transparent image moving’ provides a new solution

Posted by in categories: computing, mobile phones, security

It’s past time the world moves away from text-based passwords and verifications for mobile phones and starts embracing more secure image-based solutions, say computer scientists from the University of Surrey.

In a new study, Surrey scientists demonstrate an image-based authentication system called TIM (Transparent Image Moving) for mobile phones to help reduce the risk of shoulder surfing attacks. TIM requires users to select and move predefined images to a designated position for passing authentication checks, similar to those required for .

The proof-of-concept study found that 85% of TIM users believed it could help them to prevent password guessing and shoulder surfing attacks. The study also found that 71% of participants think TIM is a more usable image-based solution than others on the market. The research has been published in the Journal of Information Security and Applications.

Mar 25, 2023

Team devises crystal-clear solution to quantum computing puzzle

Posted by in categories: computing, quantum physics, security

University of Texas at Dallas researchers have developed a new approach that addresses challenges in the field of quantum computing and has the potential to revolutionize computing, communications and electronic security.

To make solid-state qubits, the basic information unit for quantum computers, a defect must be inserted into the to control the spin states of electrons. Creating and positioning the defect, however, especially in the most commonly used solid material——poses a major challenge.

UT Dallas researchers found that making qubits from thin, two-dimensional sheets of crystals called (TMDs) instead of diamond can solve this problem. Led by Dr. Kyeongjae Cho, professor of materials science and engineering in the Erik Jonsson School of Engineering and Computer Science, the researchers published their findings online Dec. 6 in Nature Communications.

Mar 24, 2023

JP Morgan to pilot payment services using palm or face recognition in the US

Posted by in categories: privacy, security

Following this trial, the bank will offer this service to its larger base of US merchant clients.

JP Morgan has announced plans to pilot biometric-based payments at select US retailers. It is one of the world’s largest payment-processing companies.

Pilot program roll-out.

Continue reading “JP Morgan to pilot payment services using palm or face recognition in the US” »

Mar 22, 2023

Nvidia builds quantum-classical computing system with Israel’s Quantum Machines

Posted by in categories: computing, economics, engineering, quantum physics, security

US gaming and computer graphics giant Nvidia has joined forces with an Israeli startup to roll out a new hardware system to connect the quantum computer with classical computers.

The new system, Nvidia DGX Quantum, built together with Israel’s Quantum Machines, a developer of a standard universal language for quantum computers, is expected to be first deployed at Israel’s quantum computing research center at the end of this year.

The quantum computing R&D center funded by the Israel Innovation Authority at an investment of NIS 100 million ($27 million), which is headed by Quantum Machines, was established to help Israel build a quantum computer and advance research in the field that would lead to future developments in economics, technology, security, engineering, and science.

Mar 22, 2023

Penultimate Delta rocket to launch next month on ULA’s first mission of 2023

Posted by in categories: government, satellites, security, surveillance

United Launch Alliance’s second-to-last Delta 4-Heavy rocket is scheduled to blast off from Cape Canaveral April 20 with a classified cargo for the U.S. government’s spy satellite agency, a mission that will mark ULA’s first flight of the year, officials announced this week.

ULA and the National Reconnaissance Office, the customer for the national security mission, announced the target launch date Tuesday.

The mission is known as NROL-68, and is expected to loft a large surveillance satellite into geosynchronous orbit, joining a fleet of government-owned spacecraft designed to eavesdrop on the communications of adversaries and foreign powers. But the NRO does not disclose details about its missions, and independent analysts use information about the rocket’s lift capability, trajectory, and similar past launches to predict the purpose of spy satellite missions.

Mar 19, 2023

Nvidia GTC Highlights The Physical Side Of AI

Posted by in categories: biotech/medical, food, mobile phones, robotics/AI, security

ChatGPT launched a tide wave of interest in AI. For many consumers, AI is finally living up to long overdue expectations. The accomplishments of ChatGPT in a short period of time are phenomenal. But what is yet to come when AI is combined with robotics will change everything.

I have been promoting the advances in robotics for several years. I even called 2022 the year of robotics, partially because of the growing need to overcome shortages in labor and to handle tasks beyond the physical or mental capability of humans, and partially because of the continued advances that AI, accelerated processing, semiconductor, sensors, wireless connectivity, and software technologies are enabling to develop advanced, autonomous machines. Robots are no longer just for the manufacturing floor. They are hazardous material handlers, janitors, personal assistants, food preparers, food deliverers, security guards, and even surgeons that are increasingly autonomous. Essentially, they are AI in the physical world. As a result, robot competitions are heating up from middle schools to Las Vegas.

As seen at CES, robotics technology is advancing rapidly with advances in technology. My favorite examples were the multi-configurable Yarbo outdoor robot and the John Deere See & Spray. Yarbo can be a mower, a leaf blower, or a snow blower. If it could dispose of animal excrement and the annoying neighbor, it would be perfect yard tool. On the other end of the spectrum was the John Deere See & Spray Ultimate, a tractor with up to a 120-foot (36.6m) reach that uses AI/ML to detect weeds smaller than the size of a smart phone camera and spray herbicide accordingly. John Deere also offers self-drive tractors.

Page 17 of 128First1415161718192021Last