Menu

Blog

Archive for the ‘security’ category: Page 6

Jan 17, 2024

Major security flaw in Apple, AMD, and Qualcomm GPUs puts AI data at risk

Posted by in categories: robotics/AI, security

A Trail of Bits blog recently exposed this vulnerability.


Today’s revelations unveil a creative chink in various GPUs (Apple, Qualcomm, AMD), enabling substantial data pilfering from graphics card memory.

Jan 11, 2024

Innovative meta-optical devices enhance thermal imaging applications

Posted by in categories: biotech/medical, robotics/AI, security

New method captures better thermal details, helpful for self-driving, identifying materials, and enhancing security measures.


Scientists have created a novel technology using meta-optical devices to conduct thermal imaging. Like a pair of glasses, this device does thermal imaging and can also identify the objects being imaged.

This expands the potential applications of thermal imaging in various fields, including security, thermography, medical imaging, and remote sensing.

Continue reading “Innovative meta-optical devices enhance thermal imaging applications” »

Jan 11, 2024

Electric Light Transmits Data 100 times Faster than WiFi

Posted by in categories: chemistry, engineering, internet, security

Li-fi, a communication technology harnessing visible light for data transmission, has a potential to surpass Wi-Fi’s speed by more than 100 times and boasts a high bandwidth, facilitating the simultaneous transmission of copious information. Notably, Li-fi ensures robust security by exclusively transmitting data to areas illuminated by light.

Most important, it capitalizes on existing indoor lighting infrastructure, such as LEDs, eliminating the need for separate installations. However, implementing visible light communication (VLC) in practical lighting systems poses an issue of diminished stability and accuracy in data transmission.

Recently, a collaborative team led by Professor Dae Sung Chung, from the Department of Chemical Engineering at Pohang University of Science and Technology (POSTECH), with researcher Dowan Kim, Professor Dong-Woo Jee and Hyung-Jun Park from the Department of Intelligence Semiconductor Engineering at Ajou University, and Professor Jeong-Hwan Lee from the Department of Materials Science and Engineering at Inha University, succeeded in utilizing indoor lighting for wireless communication by reducing light interference with a novel light source. Their findings were published in Advanced Materials.

Jan 10, 2024

AI danger has reached ‘whole new level’ — millions must follow ‘four rules’ every day to avoid bank-emptying nightmare

Posted by in categories: internet, robotics/AI, security

ARTIFICIAL intelligence is being used by crooks to part you from your cash – but there are ways to stay safe.

Security experts are warning internet users to be on high alert as criminals use AI to target their victims.

AI has plenty of great uses, from giving you cooking advice to generating funny “stickers” inside WhatsApp.

Jan 5, 2024

South Dakota Proposes Center for Quantum Information Science & Technology

Posted by in categories: computing, quantum physics, science, security

Governor Kristi Noem has proposed a $6 million investment in a new Center for Quantum Information Science & Technology (C-QIST) in her recommended budget for the upcoming fiscal year.

According to details from the proposed budget, the center, a collaborative effort between Dakota State University, South Dakota School of Mines & Technology, South Dakota State University, and the University of South Dakota, aims to position the state as a leader in this emerging field with the potential to revolutionize everything from national security to healthcare.

The governor mentioned the potential of quantum computers to solve intractable problems as a reason for pursuing a quantum computing center, according to South Dakota Searchlight.

Jan 5, 2024

Nanostructured flat lens uses machine learning to ‘see’ more clearly, while using less power

Posted by in categories: biotech/medical, government, nanotechnology, robotics/AI, security

From surveillance to defense to AI/ML virtualization, and it’s more compact and energy efficient. Oh and let’s not forget the medical imaging applications. I just wonder how long until it’s put into effect.


A front-end lens, or meta-imager, created at Vanderbilt University can potentially replace traditional imaging optics in machine-vision applications, producing images at higher speed and using less power.

The nanostructuring of lens material into a meta-imager filter reduces the typically thick optical lens and enables front-end processing that encodes information more efficiently. The imagers are designed to work in concert with a digital backend to offload computationally expensive operations into high-speed and low-power optics. The images that are produced have potentially wide applications in , , and government and defense industries.

Continue reading “Nanostructured flat lens uses machine learning to ‘see’ more clearly, while using less power” »

Jan 5, 2024

Breaking the 10-petawatt limit with a new laser amplification

Posted by in categories: health, particle physics, quantum physics, security

Ultra-intense ultrashort lasers have a wide-ranging scope of applications, encompassing basic physics, national security, industrial service, and health care. In basic physics, such lasers have become a powerful tool for researching strong-field laser physics, especially for laser-driven radiation sources, laser particle acceleration, vacuum quantum electrodynamics, and more.

A dramatic increase in peak power, from the 1996 1-petawatt “Nova” to the 2017 10-petawatt “Shanghai Super-intense Ultrafast Laser Facility” (SULF) and the 2019 10-petawatt “Extreme Light Infrastructure—Nuclear Physics” (ELI-NP), is due to a shift in gain medium for large-aperture lasers (from neodymium-doped glass to titanium: crystal). That shift reduced the pulse duration of high-energy lasers from around 500 femtoseconds (fs) to around 25 fs.

However, the for titanium: sapphire ultra-intense ultrashort lasers appears to be 10-petawatt. Presently, for 10-petawatt to 100-petawatt development planning, researchers generally abandon the titanium: sapphire chirped pulse technology, and turn to optical parametric chirped pulse amplification technology, based on deuterated potassium dihydrogen phosphate nonlinear crystals. That technology, due to its low pump-to-signal conversion efficiency and poor spatiotemporal-spectral-energy stability, will pose a great challenge for the realization and application of the future 10–100 petawatt lasers.

Jan 4, 2024

Risk Management of the Emerging Tech and Security Landscapes for 2024

Posted by in category: security

Please see the latest edition of the Security & Tech Insights Newsletter.


Risk mitigation in the cyber and emerging tech landscapes in 2024 will be a challenge as technologies become more sophisticated and interconnectivity grows. This edition of the newsletter explores some of those trends.

Jan 3, 2024

Nikon, Sony and Canon fight AI fakes with new camera tech

Posted by in categories: robotics/AI, security

TOKYO — Nikon, Sony Group and Canon are developing camera technology that embeds digital signatures in images so that they can be distinguished from increasingly sophisticated fakes.

Nikon will offer mirrorless cameras with authentication technology for photojournalists and other professionals. The tamper-resistant digital signatures will include such information as date, time, location and photographer.

Jan 2, 2024

Quantum Key Distribution for Secure Optical Communication

Posted by in categories: encryption, quantum physics, security

In the modern digital age, where data flows freely and sensitive information is constantly in transit, secure communication has become essential. Traditional encryption methods, while effective, are not immune to the evolving threat landscape. This is where quantum key distribution (QKD) emerges as a revolutionary solution, offering unmatched security for transmitting sensitive data.

Image Credit: asharkyu/Shutterstock.com

The idea of quantum key distribution (QKD) dates back to Stephen Wiesner’s concept of quantum conjugate coding at Columbia University in the 1970s. Charles H. Bennett later built on this idea, introducing the first QKD protocol, BB84, in the 1980s, using nonorthogonal states. Since then, it has matured into one of the most established quantum technologies, commercially available for over 15 years.

Page 6 of 134First345678910Last