Menu

Blog

Archive for the ‘security’ category: Page 9

Jul 30, 2024

AI can see what’s on your screen by reading HDMI electromagnetic radiation

Posted by in categories: robotics/AI, security

Shiver me timbers: Security researchers have demonstrated that it’s possible to spy on what’s visible on your screen by intercepting electromagnetic radiation from video cables with great accuracy, thanks to artificial intelligence. The team from Uruguay’s University of the Republic says their AI-powered cable-tapping method is good enough that these attacks are likely already happening.

Back in the analog video era, it was relatively straightforward for hackers to reconstruct what was on a screen by detecting the leakage from video cables. But once digital protocols like HDMI took over, that became much trickier. The data zipping through HDMI is much more complex than old analog signals.

However, those digital signals still leak some electromagnetic radiation as they transmit between your computer and display. By training an AI model on samples of matching original and intercepted HDMI signals, the researchers were able to decode those leaks into readable screen captures.

Jul 24, 2024

Event-driven optical encryption advances information security through neuromorphic imaging

Posted by in categories: computing, encryption, internet, security

In an era where the internet connects virtually every aspect of our lives, the security of information systems has become paramount. Safeguarding critical databases containing private and commercial information presents a formidable challenge, driving researchers to explore advanced encryption techniques for enhanced protection.

Data encryption, a cornerstone of modern practices, transforms readable plaintext into encoded ciphertext, ensuring that only authorized recipients can decipher the data using a decryption key or password. Optical techniques have emerged as promising tools for encryption due to their capabilities for parallel, high-speed transmission, and low-power consumption. However, traditional optical encryption systems often suffer from vulnerabilities where plaintext-ciphertext forms remain identical, potentially compromising security.

Reporting in Advanced Photonics Nexus, scientists have unveiled an approach inspired by bio-inspired neuromorphic imaging and speckle correlography. Their innovative technique leverages computational neuromorphic imaging (CNI) to encrypt images into event-stream ciphertexts, marking a significant departure from conventional methods. This method introduces a new paradigm in optical encryption by converting data into event-driven formats, thereby significantly enhancing security and complexity.

Jul 20, 2024

Infleqtion Installs First Quantum Computer at NQCC

Posted by in categories: computing, particle physics, quantum physics, security

Infleqtion, the world’s leading quantum information company, announced the installation of a cutting-edge neutral atom quantum computer at the National Quantum Computing Centre (NQCC).


PRESS RELEASE — Infleqtion, the world’s leading quantum information company, is proud to announce the installation of a cutting-edge neutral atom quantum computer at the National Quantum Computing Centre (NQCC). This marks a significant milestone as Infleqtion becomes the first company to deploy hardware at the NQCC under their quantum computing testbed programme. The news comes on the heels of Infleqtion’s rapid advancement in quantum gate fidelity.

Tim Ballance, President of Infleqtion UK, said, “Our recent installation is part of Infleqtion’s dedication to leading facility logistics in partnership with our colleagues at the NQCC. Together, we are establishing crucial infrastructure components such as network infrastructure, safety protocols, and security measures. Infleqtion has completed our second milestone, which includes the installation and in-situ characterisation of primary lasers, optical, vacuum, and electronic subsystems necessary for the quantum computer to function. This accomplishment demonstrates our advanced technology and expertise in the field.”

Continue reading “Infleqtion Installs First Quantum Computer at NQCC” »

Jul 20, 2024

AI-powered optical detection to thwart counterfeit chips

Posted by in categories: finance, quantum physics, robotics/AI, security, surveillance

The semiconductor industry has grown into a $500 billion global market over the last 60 years. However, it is grappling with dual challenges: a profound shortage of new chips and a surge of counterfeit chips, introducing substantial risks of malfunction and unwanted surveillance. In particular, the latter inadvertently gives rise to a $75 billion counterfeit chip market that jeopardizes safety and security across multiple sectors dependent on semiconductor technologies, such as aviation, communications, quantum, artificial intelligence, and personal finance.

Jul 13, 2024

Microsoft Issues Update Warning For All Outlook Users As ‘Dangerous’ New Threat Confirmed

Posted by in categories: business, security

The range of threats, they say, include “attackers exploit[ing] this vulnerability to gain unauthorized access, execute arbitrary code, and cause substantial damage without any user interaction. The absence of authentication requirements makes it particularly dangerous, as it opens the door to widespread exploitation.”

The repeated reference to “trusted senders” in this warning is important. This vulnerability only carries a zero click threat when an email is received from a trusted source. If the sender is unknown, then the user would need to click to execute. That said, if the problem for an attacker is now spoofing emails from trusted sources that’s a very low bar in today’s world of industrial scale business email compromise.

Jul 9, 2024

New technique offers unprecedented control over light at terahertz frequencies

Posted by in categories: biotech/medical, security

Researchers have developed a novel method for generating structured terahertz light beams using programmable spintronic emitters. This breakthrough offers a significant leap forward in terahertz technology, enabling the generation and manipulation of light with both spin and orbital angular momentum at these frequencies for the first time.

Terahertz radiation lies between microwaves and on the electromagnetic spectrum. It holds great promise for various applications, including security scanners, medical imaging, and ultrafast communication. However, generating and controlling terahertz light effectively has proven challenging.

This new research, published in eLight and led by Prof. Zhensheng Tao, Prof. Yizheng Wu from Fudan University and Prof. Yan Zhang from Capital Normal University, overcomes these limitations by employing programmable spintronic emitters based on exchange-biased magnetic multilayers. These devices consist of thin layers of magnetic and non-magnetic materials that convert laser-induced spin-polarized currents into broadband terahertz radiation.

Jul 8, 2024

How Quantum Computing Is Already Changing the World

Posted by in categories: computing, encryption, quantum physics, security

The power of quantum computing drives a desperate need for quantum encryption. This megatrend is creating a multi-billion-dollar security market.

Jul 8, 2024

Engineers develop advanced optical computing method for multiplexed data processing and encryption

Posted by in categories: computing, encryption, security

Engineers at the University of California, Los Angeles (UCLA) have unveiled a major advancement in optical computing technology that promises to enhance data processing and encryption. The work is published in the journal Laser & Photonics Reviews.

This innovative work, led by Professor Aydogan Ozcan and his team, showcases a reconfigurable diffractive optical network capable of executing high-dimensional permutation operations, offering a significant leap forward in telecommunications and data security applications.

Permutation operations, essential for various applications, including telecommunications and encryption, have traditionally relied on electronic hardware. However, the UCLA team’s advancement uses all-optical diffractive computing to perform these operations in a multiplexed manner, significantly improving efficiency and scalability.

Jul 8, 2024

Flying Qudits: Unlocking New Dimensions of Quantum Communication

Posted by in categories: computing, encryption, internet, quantum physics, security

Researchers have developed a breakthrough method for quantum information transmission using light particles called qudits, which utilize the spatial mode and polarization properties to enable faster, more secure data transfer and increased resistance to errors.

This technology could greatly enhance the capabilities of a quantum internet, providing long-distance, secure communication, and leading to the development of powerful quantum computers and unbreakable encryption.

Scientists have made a significant breakthrough in creating a new method for transmitting quantum information using particles of light called qudits. These qudits promise a future quantum internet that is both secure and powerful.

Jul 7, 2024

China’s Laws of Robotics: Shanghai publishes first humanoid robot guidelines

Posted by in categories: robotics/AI, security

Makers of humanoid robots should guarantee that their products “do not threaten human security” and “effectively safeguard human dignity”, according to a new set of guidelines published in Shanghai during the World Artificial Intelligence Conference (WAIC) on Saturday.

They should also take measures that include setting up risk warning procedures and emergency response systems, as well as give users training on the ethical and lawful use of these machines, according to the guidelines.

Page 9 of 148First678910111213Last