Menu

Blog

Archive for the ‘security’ category: Page 31

Jun 5, 2023

The rise of AI: ‘AI doomsday’ or the best thing since sliced bread?

Posted by in categories: existential risks, robotics/AI, security

A raft of industry experts have given their views on the likely impact of artificial intelligence on humanity in the future. The responses are unsurprisingly mixed.

The Guardian has released an interesting article regarding the potential socioeconomic and political impact of the ever-increasing rollout of artificial intelligence (AI) on society. By asking various experts in the field on the subject, the responses were, not surprisingly, a mixed bag of doom, gloom, and hope.

Continue reading “The rise of AI: ‘AI doomsday’ or the best thing since sliced bread?” »

Jun 3, 2023

‘Hot pixels’ attack steals data through CPU readings

Posted by in categories: computing, security

A team of security researchers at Georgia Tech, the University of Michigan and Ruhr University Bochum in Germany has reported a new form of side-channel attack that capitalizes on power and speed management methods used by graphics processing units and systems on a chip (SoCs).

The researchers demonstrated how they could steal by targeting data released by the Dynamic Voltage and Frequency Scaling (DVFS) mechanisms found on most modern chips.

As manufacturers race to develop thinner and more energy-efficient devices, they must train their sights on constructing SoCs that balance power consumption, heat generation and processing speed.

Jun 2, 2023

Hackers use flaw in popular file transfer tool to steal data, researchers say

Posted by in categories: business, security

SAN FRANCISCO, June 1 (Reuters) — Hackers have stolen data from the systems of a number of users of the popular file transfer tool MOVEit Transfer, U.S. security researchers said on Thursday, one day after the maker of the software disclosed that a security flaw had been discovered.

Software maker Progress Software Corp (PRGS.O), after disclosing the vulnerability on Wednesday, said it could lead to potential unauthorized access into users’ systems.

The managed file transfer software made by the Burlington, Massachusetts-based company allows organizations to transfer files and data between business partners and customers.

May 30, 2023

What Could a Centibillionaire Do Today?

Posted by in categories: drones, robotics/AI, security

Fun thought experiment today:


What if today’s ultra-wealthy— the Musks, Bezoses, and Zuckerbergs of the world— decided to demonstrate the true extent of what AI can do today? What if money were no object? Let’s think about some ambitious, albeit costly, applications of current AI technologies that are already within our grasp.

Personal Protection Army

Continue reading “What Could a Centibillionaire Do Today?” »

May 30, 2023

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

Posted by in categories: mobile phones, security

BrutePrint: A new attack technique targeting smartphone fingerprint authentication.

May 28, 2023

This two-wheeled robot is Switzerland’s latest security guard

Posted by in categories: robotics/AI, security

Security guards are extremely useful, some would say necessary. But they can be quite expensive and there simply aren’t enough of them to put them everywhere they need to be.

In Europe, people living in Switzerland have been privy to witnessing a patrol bot, developed by a robotics start-up from ETH Zurich called Ascento, that could soon take the place of human security guards. The machine has thus far been successfully acting as a guard for Swiss security firm Securitas AG.

Continue reading “This two-wheeled robot is Switzerland’s latest security guard” »

May 28, 2023

Chip-based quantum key distribution achieves higher transmission speeds

Posted by in categories: computing, quantum physics, security

Researchers have developed a quantum key distribution (QKD) system based on integrated photonics that can transmit secure keys at unprecedented speeds. The proof-of-principle experiments represent an important step toward real-world application of this highly secure communication method.

QKD is a well-established method of providing secret keys for secure communication between distant parties. By using the quantum properties of light to generate secure random keys for encrypting and decrypting data, its security is based on the laws of physics, rather than computational complexity like today’s communication protocols.

“A key goal for QKD technology is the ability to simply integrate it into a real-world communications network,” said research team member Rebecka Sax from the University of Geneva in Switzerland. “An important and necessary step toward this goal is the use of integrated photonics, which allows to be manufactured using the same semiconductor technology used to make silicon computer chips.”

May 28, 2023

Exclusive: Chandrayaan-3 spacecraft arrives at India’s spaceport in preparation for July launch

Posted by in categories: satellites, security

The spacecraft that the Indian Space Research Organization (ISRO) hopes to land on the moon later this year, has been wheeled into the country’s spaceport, Satish Dhawan Space Centre, WION has learnt.

Named as Chandrayaan-3 (Sanskrit for Moon Vehicle-3), this will be India’s third lunar mission and will attempt both controlled soft-landing on the lunar surface and in-situ analysis by the means of a rover.

In the evening hours on Friday, the slow-moving, specialised truck ferrying the spacecraft from UR Rao Satellite Centre in Bengaluru arrived at India’s spaceport, under a security blanket.

May 20, 2023

Generative AI Shakes Global Diplomacy At G7 Summit In Japan

Posted by in categories: economics, ethics, policy, robotics/AI, security

Our technological age is witnessing a breakthrough that has existential implications and risks. The innovative behemoth, ChatGPT, created by OpenAI, is ushering us inexorably into an AI economy where machines can spin human-like text, spark deep conversations and unleash unparalleled potential. However, this bold new frontier has its challenges. Security, privacy, data ownership and ethical considerations are complex issues that we must address, as they are no longer just hypothetical but a reality knocking at our door.

The G7, composed of the world’s seven most advanced economies, has recognized the urgency of addressing the impact of AI.


To understand how countries may approach AI, we need to examine a few critical aspects.

Continue reading “Generative AI Shakes Global Diplomacy At G7 Summit In Japan” »

May 19, 2023

Airport Security Is About to Get Way Faster Thanks to New Technology Being Used by TSA

Posted by in categories: security, transportation

New TSA screening methods will allow passengers through security without showing their boarding passes or by simply taking a picture.

Page 31 of 145First2829303132333435Last