Menu

Blog

Archive for the ‘security’ category: Page 70

Jun 9, 2021

Quantum computing is inevitable, cryptography prepares for the future

Posted by in categories: chemistry, encryption, mathematics, quantum physics, robotics/AI, security

Quantum computing began in the early 1980s. It operates on principles of quantum physics rather than the limitations of circuits and electricity which is why it is capable of processing highly complex mathematical problems so efficiently. Quantum computing could one day achieve things that classical computing simply cannot. The evolution of quantum computers has been slow, but things are accelerating, thanks to the efforts of academic institutions such as Oxford, MIT, and the University of Waterloo, as well as companies like IBM, Microsoft, Google, and Honeywell.

IBM has held a leadership role in this innovation push and has named optimization as the most likely application for consumers and organizations alike.

Honeywell expects to release what it calls the “world’s most powerful quantum computer” for applications like fraud detection, optimization for trading strategies, security, machine learning, and chemistry and materials science.

Jun 9, 2021

Hackers can mess with HTTPS connections

Posted by in categories: encryption, security

Typically abbreviated as TLS, Transport Layer Security uses strong encryption to prove that an end user is connected to an authentic server belonging to a specific service (such as Google or Bank of America) and not an impostor masquerading as that service. TLS also encrypts data as it travels between an end user and a server to ensure that people who can monitor the connection can’t read or tamper with the contents. With millions of servers relying on it, TLS is a cornerstone of online security.

In a research paper published on Wednesday, Brinkmann and seven other researchers investigated the feasibility of using what they call cross-protocol attacks to bypass TLS protections. The technique involves an MitM attacker redirecting cross-origin HTTP requests to servers that communicate over SMTP, IMAP, POP3, or FTP, or another communication protocol.

The main components of the attack are the client application used by the targeted end user, denoted as C; the server the target intended to visit, denoted as Sint; and the substitute server, a machine that connects using SMTP, FTP, or another protocol that’s different from the one serverint uses but with the same domain listed in its TLS certificate.

Jun 7, 2021

New tech cheaply produces lithium and H2, while desalinating seawater

Posted by in categories: chemistry, security, sustainability

With the rise of the lithium-based battery, demand for this soft, silvery-white metal – the lightest solid element in the periodic table – has exploded. With the race to zero carbon by 2050 gathering steam, forcing the electrification of transport, lithium will be an even more valuable asset in the next 30 years.

The supply of raw materials for batteries could even end up being a national security issue, too; China’s global leadership on high-volume EV production has put it ahead of the game, and while the majority of ground-based lithium reserves are in the “lithium triangle” of Chile, Bolivia and Argentina, China controls more than half’s the world’s supply simply through investments and ownership. It has shown in the past that it’s not afraid to wield commodity supplies as a weapon.

But as with other metals like uranium, land-based lithium reserves pale in comparison to what’s out there in the sea. According to researchers at Saudi Arabia’s King Abdullah University of Science and Technology (KAUST), there’s about 5000 times as much lithium in the oceans as there is in land deposits, and a newly developed technology could start extracting it cheaply enough to make the big time – while producing hydrogen gas, chorine gas and desalinated water as a bonus.

Jun 1, 2021

Siva Balu — VP / Chief Information Officer — YMCA of the U.S.A. — People, Potential, & Purpose

Posted by in categories: biotech/medical, business, food, information science, life extension, robotics/AI, security

With 2700 locations across 10000 U.S. communities, YMCA is becoming a major hub for healthy living — From vaccinations and diabetes prevention programs, to healthy aging and wellness — Siva Balu, VP/Chief Information Officer — The Y of the U.S.A.


Mr. Siva Balu is Vice President and Chief Information Officer of YMCA of the U.S. (Y-USA), where he is working to rethink and reorganize the work of the organization’s information technology strategy to meet the changing needs of Y-USA and Ys throughout the country.

Continue reading “Siva Balu — VP / Chief Information Officer — YMCA of the U.S.A. — People, Potential, & Purpose” »

May 27, 2021

Scientists recognize intruders in noise

Posted by in categories: biological, economics, mathematics, security

## MATHEMATICS • MAY 24, 2021

# *Noise is commonly discarded, but identifying patterns in noise can be very useful.*

*Generalize the Hearst exponent by adding more coefficients in order to get a more complete description of the changing data. This makes it possible to find patterns in the data that are usually considered noise and were previously impossible to analyze.*

Continue reading “Scientists recognize intruders in noise” »

May 26, 2021

Nora Super — Milken Institute — Center for the Future of Aging — Alliance to Improve Dementia Care

Posted by in categories: education, finance, life extension, neuroscience, policy, security

Senior director, milken institute center for the future of aging, milken institute; executive director, alliance to improve dementia care.


Nora Super is the Senior Director of the Milken Institute Center for the Future of Aging (CFA) (https://milkeninstitute.org/centers/center-for-the-future-of-aging) and the Executive Director of the Milken Institute Alliance to Improve Dementia Care (https://milkeninstitute.org/centers/center-for-the-future-of…tia-care).

Continue reading “Nora Super — Milken Institute — Center for the Future of Aging — Alliance to Improve Dementia Care” »

May 25, 2021

Rich people are spending millions on underground bunkers equipped with robot security and movie theaters after a year of man-made and natural threats

Posted by in categories: robotics/AI, security

Interest in such plush panic rooms is skyrocketing, he said. His firm started offering high-end shelters and the like a decade ago — of the 232 it’s built so far, 200 were commissioned in the last five years.


One $14 million panic-room project built in the San Jose Valley includes a bowling alley and indoor pool.

May 22, 2021

Misconfiguration of third party mobile apps exposes the data of 100 million users

Posted by in category: security

Despite the obvious benefits of contemporary cloud-based, mobile application development solutions—such as cloud storage, notification management, real-time databases, and analytics—many developers of these solutions fail to properly take into account the potential security risks involved when these apps are misconfigured.

Most recently, Check Point Research has discovered misconfigurations and implementation issues that have exposed the data of 100 million mobile application users. This kind of exposure places both the users as well as the at risk of reputation threats and security damage. In this instance, the developers left open notification managers, storage locations and real-time databases to access by attackers, thus leaving 100 million users vulnerable.

In terms of real-time databases, can help mobile app users sync their data to the cloud in real time. However, when developers do not correctly implement this service with authentication, any user can theoretically access that database, including all mobile customer data. In fact, researchers expressed surprise at facing no obstacles to accessing these open databases for certain apps on Google Play. Some of the aspects obtainable in this case were device locations, email addresses, passwords, private chats and user identifiers, among other attack vectors. Such vulnerabilities leave all of these users at risk for fraud and identity theft.

May 21, 2021

China showcases artificial intelligence advances

Posted by in categories: robotics/AI, security

Thank you to China for trying to surpass the USA in Ai, otherwise they’d never open the wallet to fund this AI research. AGI 2025!!


China is showcasing its advances in the field of artificial intelligence — at an annual tech-themed forum.
It is being held in the port city of Tianjin.
Super computers, rockets and robots are among the innovations on display.
The event comes just months after the United States National Security Commission said that China is on track to overtake the US as the world’s AI superpower.
Al Jazeera’s Katrina Yu reports.

Continue reading “China showcases artificial intelligence advances” »

May 17, 2021

New NTAS Bulletin Warns of ‘Broader’ Terror Targets as COVID Restrictions Ease

Posted by in categories: security, terrorism

Warning that the homeland is facing threats that have evolved significantly and become increasingly complex and volatile in 2021, the Department of Homeland Security issued a new National Terrorism Advisory System (NTAS) Bulletin.

Page 70 of 145First6768697071727374Last