Menu

Blog

Archive for the ‘security’ category: Page 41

Jan 28, 2023

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

Posted by in category: security

ISC has released patches for multiple vulnerabilities in the BIND DNS software suite that could lead to a DoS condition and system failures.

Jan 27, 2023

Where Is Tech Going in 2023?

Posted by in categories: business, robotics/AI, security

A group of McKinsey’s technology practice leaders have taken a look at what 2023 might hold, and offer a few new year’s tech resolutions to consider: 1) Look for combinatorial trends, in which the sum impact of new technologies create new opportunities. 2) Prep boards for tipping point technologies. 3) Relieve the bureaucratic burden on your engineers to increase their productivity. 4) Look for new opportunities in the cloud. 5) Take advantage of how the cloud is changing security. 6) Take advantage of decentralized AI capabilities — and what this technology might mean for your business model.

Page-utils class= article-utils—vertical hide-for-print data-js-target= page-utils data-id= tag: blogs.harvardbusiness.org, 2007/03/31:999.346784 data-title= Where Is Tech Going in 2023? data-url=/2023/01/where-is-tech-going-in-2023 data-topic= AI and machine learning data-authors= Aamer Baig; Jan Shelly Brown; William Forrest; Vinayak HV; Klemens Hjartar; Lareina Yee data-content-type= Digital Article data-content-image=/resources/images/article_assets/2023/01/Jan23_06_1405011898-383x215.jpg data-summary=

Six trends that will define the next year, according to McKinsey experts.

Jan 27, 2023

Chrome for Android now lets you lock your incognito session

Posted by in categories: privacy, robotics/AI, security

Chrome is rolling out an update for Android users that lets them lock their incognito sessions with a password code or biometric info when they exit the app. The feature has been available for iOS users for some time, but now it’s being made available to folks using Chrome on Android.

Users can activate this feature by going to Chrome Settings Privacy & Security and turning on the “Lock incognito tabs when you close Chrome” toggle. So next time when a user exits Chrome, their incognito session will automatically be locked. To unlock the incognito tabs, you can use the biometric unlock on the phone such as a fingerprint unlock or lock code.

Jan 27, 2023

Researchers find ways to improve the storage time of quantum information in a spin rich material

Posted by in categories: chemistry, computing, quantum physics, security

An international team of scientists have demonstrated a leap in preserving the quantum coherence of quantum dot spin qubits as part of the global push for practical quantum networks and quantum computers.

These technologies will be transformative to a broad range of industries and research efforts: from the security of information transfer, through the search for materials and chemicals with novel properties, to measurements of fundamental physical phenomena requiring precise time synchronization among the sensors.

Spin-photon interfaces are elementary building blocks for that allow converting stationary quantum information (such as the quantum state of an ion or a solid-state spin qubit) into light, namely photons, that can be distributed over large distances. A major challenge is to find an interface that is both good at storing quantum information and efficient at converting it into light.

Jan 26, 2023

Quantum Safe Cryptography — A Quantum Leap Needed Now

Posted by in categories: biotech/medical, computing, encryption, finance, information science, internet, mathematics, quantum physics, security

Whether we realize it or not, cryptography is the fundamental building block on which our digital lives are based. Without sufficient cryptography and the inherent trust that it engenders, every aspect of the digital human condition we know and rely on today would never have come to fruition much less continue to evolve at its current staggering pace. The internet, digital signatures, critical infrastructure, financial systems and even the remote work that helped the world limp along during the recent global pandemic all rely on one critical assumption – that the current encryption employed today is unbreakable by even the most powerful computers in existence. But what if that assumption was not only challenged but realistically compromised?

This is exactly what happened when Peter Shor proposed his algorithm in 1995, dubbed Shor’s Algorithm. The key to unlocking the encryption on which today’s digital security relies is in finding the prime factors of large integers. While factoring is relatively simple with small integers that have only a few digits, factoring integers that have thousands of digits or more is another matter altogether. Shor proposed a polynomial-time quantum algorithm to solve this factoring problem. I’ll leave it to the more qualified mathematicians to explain the theory behind this algorithm but suffice it to say that when coupled with a quantum computer, Shor’s Algorithm drastically reduces the time it would take to factor these larger integers by multiple orders of magnitude.

Prior to Shor’s Algorithm, for example, the most powerful computer today would take millions of years to find the prime factors of a 2048-bit composite integer. Without Shor’s algorithm, even quantum computers would take such an inordinate amount of time to accomplish the task as to render it unusable by bad actors. With Shor’s Algorithm, this same factoring can potentially be accomplished in a matter of hours.

Jan 24, 2023

Joelle Elbez-Uzan — Head, Nuclear Safety Office — DEMO Fusion Reactor — EUROfusion

Posted by in categories: nuclear energy, physics, security

Is the Head, Nuclear Safety Office, overseeing the development of the DEMO Fusion Reactor (https://euro-fusion.org/programme/demo/), at EUROfusion.

DEMO (DEMOnstration Power Plant) refers to a proposed class of nuclear fusion experimental reactors that are intended to demonstrate the net production of electric power from nuclear fusion.

Continue reading “Joelle Elbez-Uzan — Head, Nuclear Safety Office — DEMO Fusion Reactor — EUROfusion” »

Jan 19, 2023

New nanoparticles deliver therapy throughout the brain and edit Alzheimer’s gene in mice

Posted by in categories: biotech/medical, engineering, genetics, nanotechnology, neuroscience, security

Gene therapies have the potential to treat neurological disorders like Alzheimer’s and Parkinson’s diseases, but they face a common barrier—the blood-brain barrier. Now, researchers at the University of Wisconsin-Madison have developed a way to move therapies across the brain’s protective membrane to deliver brain-wide therapy with a range of biological medications and treatments.

“There is no cure yet for many devastating disorders,” says Shaoqin “Sarah” Gong, UW-Madison professor of ophthalmology and visual sciences and biomedical engineering and researcher at the Wisconsin Institute for Discovery. “Innovative brain-targeted delivery strategies may change that by enabling noninvasive, safe and efficient delivery of CRISPR genome editors that could, in turn, lead to genome-editing therapies for these diseases.”

CRISPR is a molecular toolkit for editing (for example, to correct mutations that may cause disease), but the toolkit is only useful if it can get through security to the job site. The is a membrane that selectively controls access to the brain, screening out toxins and pathogens that may be present in the bloodstream. Unfortunately, the bars some beneficial treatments, like certain vaccines and gene therapy packages, from reaching their targets because in lumps them in with hostile invaders.

Jan 18, 2023

IBM: Quantum computing poses an ‘existential threat’ to data encryption

Posted by in categories: business, computing, encryption, existential risks, quantum physics, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

For years, encryption has played a core role in securing enterprise data. However, as quantum computers become more advanced, traditional encryption solutions and public-key cryptography (PKC) standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption.

Today, IBM Institute for Business Value issued a new report titled Security in the Quantum Era, examining the reality of quantum risk and the need for enterprise adoption of quantum-safe capabilities to safeguard the integrity of critical applications and infrastructure as the risk of decryption increases.

Jan 18, 2023

Copenhagen Atomics submits molten salt SMR design

Posted by in categories: business, nuclear energy, security

UK Atomics, a subsidiary of the company applied to the UK Department for Business, Energy and Industrial Strategy (BEIS) for a GDA by the Office for Nuclear Regulation (ONR) and the Environment Agency (EA). This assessment aims to assess the safety, security, and environmental protection aspects of any nuclear power plant design that is intended to be deployed in the UK.

In May 2021, BEIS opened the GDA process to advanced nuclear technologies, including small modular reactors (SMRs). Successful completion of the GDA culminates in the issue of a Design Acceptance Confirmation from the ONR and a Statement of Design Acceptability from the EA. Rolls-Royce SMR was the first vendor to submit an application for a GDA of an SMR design. Its 470 MWe pressurised water reactor design was accepted for review in March 2022. In December, GE Hitachi Nuclear Energy submitted a GDA entry application for its BWRX-300 SMR, and Holtec International has stated its intention to submit an application for its SMR-160 design.

UK Atomics molten salt reactor design uses unpressurised heavy water as a moderator, while the reactor is intended to burn nuclear waste while breeding new fuel from thorium. The company says, with an output of 100 MWt, it is small enough to allow for mass manufacturing and assembly line production.

Jan 17, 2023

CISA Warns of Flaws Affecting Industrial Control Systems from Major Manufacturers

Posted by in category: security

CISA has issued a warning about significant security weaknesses found in products from Industrial Control Systems (ICS) manufacturers.

Page 41 of 148First3839404142434445Last