Menu

Blog

Archive for the ‘security’ category: Page 71

Jul 17, 2021

China Wants a Chip Machine From the Dutch. The U.S. Said No

Posted by in categories: government, mobile phones, robotics/AI, security

The chip world’s most important machines are made near corn fields in the Netherlands. The U.S. is trying to block China from buying them.


The one-of-a-kind, 180-ton machines are used by companies including Intel Corp., South Korea’s Samsung Electronics Co. and leading Apple Inc. supplier Taiwan Semiconductor Manufacturing Co. to make the chips in everything from cutting-edge smartphones and 5G cellular equipment to computers used for artificial intelligence.

China wants the $150-million machines for domestic chip makers, so smartphone giant Huawei Technologies Co. and other Chinese tech companies can be less reliant on foreign suppliers. But ASML hasn’t sent a single one because the Netherlands—under pressure from the U.S.—is withholding an export license to China.

Continue reading “China Wants a Chip Machine From the Dutch. The U.S. Said No” »

Jul 16, 2021

Quantum random number generator sets benchmark for size, performance

Posted by in categories: computing, encryption, quantum physics, security

As pervasive as they are in everyday uses, like encryption and security, randomly generated digital numbers are seldom truly random.

So far, only bulky, relatively slow quantum random generators (QRNGs) can achieve levels of randomness on par with the basic laws of quantum physics, but researchers are looking to make these devices faster and more portable.

In Applied Physics Letters, scientists from China present the fastest real-time QRNG to date to make the devices quicker and more portable. The device combines a state-of-the-art photonic integrated with optimized real-time postprocessing for extracting randomness from quantum entropy source of vacuum states.

Jul 11, 2021

3,800 PS4s found and seized from a cryptocurrency farm in Ukraine

Posted by in categories: computing, cryptocurrencies, security, sustainability

WTF?! On Thursday the Security Service of Ukraine (SSU) reported that they had shut down a cryptomining operation in the city of Vinnytsia, seizing over 500 GPUs and 50 processors — and a bunch of Playstation 4s. Consoles built on 2013-era technology might not be great at mining, but they don’t need to be when you have 3800 of them.

Although the market for GPUs is starting to improve, and dedicated ASICs might be on the way to relieve demand, it seems that one group of enterprising cryptocurrency miners have turned to last-gen console hardware to get things done.

Continue reading “3,800 PS4s found and seized from a cryptocurrency farm in Ukraine” »

Jul 10, 2021

Researchers have taught a drone to recognize and hunt down meteorites autonomously

Posted by in categories: drones, robotics/AI, security

Planetary scientists estimate that each year, about 500 meteorites survive the fiery trip through Earth’s atmosphere and fall to our planet’s surface. Most are quite small, and less than 2% of them are ever recovered. While the majority of rocks from space may not be recoverable due to ending up in oceans or remote, inaccessible areas, other meteorite falls are just not witnessed or known about.

But new technology has upped the number known falls in recent years. Doppler radar has detected meteorite falls, as well as all-sky camera networks specifically on the lookout for meteors. Additionally, increased use of dashcams and security cameras have allowed for more serendipitous sightings and data on fireballs and potential meteorite falls.

Continue reading “Researchers have taught a drone to recognize and hunt down meteorites autonomously” »

Jul 2, 2021

Microsoft warns of Windows “PrintNightmare” vulnerability that’s being actively exploited

Posted by in category: security

Security researchers accidentally revealed a huge flaw.


Microsoft is warning Windows users about an unpatched critical flaw in the Windows Print Spooler service. The vulnerability, dubbed PrintNightmare, was uncovered earlier this week after security researchers accidentally published a proof-of-concept (PoC) exploit. While Microsoft hasn’t rated the vulnerability, it allows attackers to remotely execute code with system-level privileges, which is as critical and problematic as you can get in Windows.

Researchers at Sangfor published the PoC, in what appears to have been a mistake, or a miscommunication between the researchers and Microsoft. The test code was quickly deleted, but not before it had already been forked on GitHub.

Continue reading “Microsoft warns of Windows ‘PrintNightmare’ vulnerability that’s being actively exploited” »

Jun 28, 2021

Mind reading helmet | Boston Dynamics | High Tech News

Posted by in categories: drones, Elon Musk, robotics/AI, security, space travel

https://www.youtube.com/watch?v=BDOt91JqqhM

Video from PRO ROBOTS. 😃

-robot avatars.

Continue reading “Mind reading helmet | Boston Dynamics | High Tech News” »

Jun 27, 2021

Security robots expand across U.S., with few tangible results

Posted by in categories: robotics/AI, security

“It would be difficult to introduce a single thing and it causes crime to go down,” one expert said.


“Are we seeing dramatic changes since we deployed the robot in January?” Lerner, the Westland spokesperson said. “No. But I do believe it is a great tool to keep a community as large as this, to keep it safer, to keep it controlled.”

For its part, Knightscope maintains on its website that the robots “predict and prevent crime,” without much evidence that they do so. Experts say this is a bold claim.

Continue reading “Security robots expand across U.S., with few tangible results” »

Jun 25, 2021

Hackers are using unknown user accounts to target Zyxel firewalls and VPNs

Posted by in categories: internet, security

In an email, the company said that targeted devices included security appliances that have remote management or SSL VPN enabled, namely in the USG/ZyWALL, USG FLEX, ATP, and VPN series running on-premise ZLD firmware. The language in the email is terse, but it appears to say that the attacks target devices that are exposed to the Internet. When the attackers succeed in accessing the device, the email further appears to say, they are then able to connect to previously unknown accounts hardwired into the devices.

Batten down the hatches

“We’re aware of the situation and have been working our best to investigate and resolve it,” the email, which was posted to Twitter, said. “The threat actor attempts to access a device through WAN; if successful, they then bypass authentication and establish SSL VPN tunnels with unknown user accounts, such as ‘zyxel_silvpn,’ ‘zyxel_ts,’ or ‘zyxel_vpn_test,’ to manipulate the device’s configuration.”

Jun 25, 2021

World-largest petawatt laser completed, delivering 2,000 trillion watts output

Posted by in categories: biotech/medical, mobile phones, nuclear energy, quantum physics, security

Circa 2015 In theory this big bang laser could eventually create complex matter but would need to be pocket-size as I want it on a smartphone to make a replicator so I can make fruit or food in space 😀


The Institute of Laser Engineering (ILE), Osaka University, has succeeded to reinforce the Petawatt laser “LFEX” to deliver up to 2000 trillion watts in the duration of one trillionth of one second (this corresponds to 1000 times the integrated electric power consumed in the world). By using this high-power laser, it is now possible to generate all of the high-energy quantum beams (electrons, ions, gamma ray, neutron, positron). Owing to such quantum beams with large current, we can make a big step forward not only for creating new fundamental technologies such as medical applications and non-destructive inspection of social infrastructures to contribute to our future life of longevity, safety, and security, but also for realization of laser fusion energy triggered by fast ignition.

Background and output of research

Continue reading “World-largest petawatt laser completed, delivering 2,000 trillion watts output” »

Jun 24, 2021

Researchers propose the use of quantum cascade lasers to achieve private free-space communications

Posted by in categories: quantum physics, security

Free-space optical communication, the communication between two devices at a distance using light to carry information, is a highly promising system for achieving high-speed communication. This system of communication is known to be immune to electromagnetic interference (EMI), a disturbance generated by external sources that affects electrical circuits and can disrupt radio signals.

While some studies have highlighted the possible advantages of free-space optical communication, this system of communication has so far come with certain limitations. Most notably, it is known to offer limited security against eavesdroppers. Researchers at Télécom Paris (member of Institut Polytechnique de Paris), mirSense, Technische Universität Darmstadt and University of California Los Angeles (UCLA) have recently introduced a unique system for more secure free-space optical communication based on a technology known as , a specific type of semiconductor that typically emits mid–.

“The core idea behind our research is that private free-space communication with quantum key distribution (i.e., based on quantum physics properties) is promising, but it is probably years away, or even further,” Olivier Spitz, one of the researchers who carried out the study, told TechXplore. “Currently, the main limitations of this technology are the requirements for cryogenic systems, very slow data rates and costly equipment.”

Page 71 of 148First6869707172737475Last