Menu

Blog

Archive for the ‘security’ category: Page 129

Mar 5, 2016

As Technology Barrels Ahead—Will Ethics Get Left in the Dust?

Posted by in categories: bioengineering, biological, drones, encryption, ethics, finance, robotics/AI, security

Interesting Question to ask.


The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create new legislation. That’s because there really aren’t any existing laws which encompass technologies such as these. The battle is between security and privacy, with Silicon Valley fighting for privacy. The debates in Congress will be ugly, uninformed, and emotional. Lawmakers won’t know which side to pick and will flip flop between what lobbyists ask and the public’s fear du jour. And because there is no consensus on what is right or wrong, any decision they make today will likely be changed tomorrow.

This is a prelude of things to come, not only with encryption technologies, but everything from artificial intelligence to drones, robotics, and synthetic biology. Technology is moving faster than our ability to understand it, and there is no consensus on what is ethical. It isn’t just the lawmakers who are not well-informed, the originators of the technologies themselves don’t understand the full ramifications of what they are creating. They may take strong positions today based on their emotions and financial interests, but as they learn more, they too will change their views.

Continue reading “As Technology Barrels Ahead—Will Ethics Get Left in the Dust?” »

Mar 4, 2016

Quantum Computer Comes Closer to Cracking RSA Encryption

Posted by in categories: computing, encryption, information science, quantum physics, security

Glad to see this article get published because it echoes many of the concerns established around China and Russia governments and their hackers having their infrastructures on Quantum before US, Europe, and Canada. Computer scientists at MIT and the University of Innsbruck say they’ve assembled the first five quantum bits (qubits) of a quantum computer that could someday factor any number, and thereby crack the security of traditional encryption schemes.


Shor’s algorithm performed in a system less than half the size experts expected.

Read more

Mar 2, 2016

Artificial Intelligence Risk — 12 Researchers Weigh in on the Danger’s of Smarter Machines

Posted by in categories: biotech/medical, economics, mobile phones, robotics/AI, security

A realistic article on AI — especially around AI being manipulated by others for their own gain which I have also identified as the real risks with AI.


Artificial intelligence (AI), once the seeming red-headed stepchild of the scientific community, has come a long way in the past two decades. Most of us have reconciled with the fact that we can’t live without our smartphones and Siri, and AI’s seemingly omnipotent nature has infiltrated the nearest and farthest corners of our lives, from robo-advisors on Wall Street and crime-spotting security cameras, to big data analysis by Google’s BigQuery and Watson’s entry into diagnostics in the medical field.

In many unforeseen ways, AI is helping to improve and make our lives more efficient, though the reverse degeneration of human economic and cultural structures is also a potential reality. The Future of Life Institute’s tagline sums it up in succinct fashion: “Technology is giving life the potential to flourish like never before…or to self-destruct.” Humans are the creators, but will we always have control of our revolutionary inventions?

To much of the general public, AI is AI is AI, but this is only part truth. Today, there are two primary strands of AI development — ANI (Artificial Narrow Intelligence) and AGI (Artificial General Intelligence). ANI is often termed “weak AI” and is “the expert” of the pair, using its intelligence to perform specific functions. Most of the technology with which we surround ourselves (including Siri) falls into the ANI bucket. AGI is the next generation of ANI, and it’s the type of AI behind dreams of building a machine that achieves human levels of consciousness.

Continue reading “Artificial Intelligence Risk — 12 Researchers Weigh in on the Danger’s of Smarter Machines” »

Mar 2, 2016

Latest attack against TLS shows the pitfalls of intentionally weakening encryption

Posted by in categories: encryption, government, security

“For the third time in less than a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government”

This could have more than just security gap ripple effects; it could actually be a loophole for any claims/ lawsuits that consumers and others have with various organizations.


For the third time in under a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government.

Continue reading “Latest attack against TLS shows the pitfalls of intentionally weakening encryption” »

Feb 28, 2016

IARPA seeks info on biometric attack detection tech

Posted by in categories: government, privacy, security

Reminder to everyone who loves hearing about what NextGen Technologies that US Government has been working on: March 11th, US IARPA is hosting a conference on “Odin” (detection technologies to ensure biometric security systems can detect when someone is attempting to disguise their biometric identity.)


The Intelligence Advanced Research Projects Activity plans to hold a conference related to a biometric presentation attack detection programme called Odin.

The conference, to be held on 11 March in Washington, will be to provide information on Odin and the research problems the program aims to address, the agency noted.

Continue reading “IARPA seeks info on biometric attack detection tech” »

Feb 27, 2016

Military Cyborgs May Soon Be a Reality

Posted by in categories: biotech/medical, cyborgs, drones, health, internet, military, security

BMI’s (according to DARPA and David Axe) could begin as early as 2017 on humans. The plan is to use stentrodes. Testing has already proven success on sheep. I personally have concerns in both a health (as the article highlighted prone to blood clots) as well as anything connecting via Wi-Fi or the net with hackers trying to challenge themselves to prove anything is hackable; that before this goes live on a person we make sure that we have a more secure hack-resistant net before someone is injured or in case could injure someone else.


Soldiers could control drones with a thought.

Read more

Feb 26, 2016

Weird noises are coming from an Apple complex

Posted by in categories: security, transportation

A new US Mystery has emerged at Apple. Wonder what it could be?


Strange sounds emanating from a mysterious building in the dead of night. White cars following families as they walk their dogs nearby. Science fiction movie? No, just Apple’s latest project.

Residents of Sunnyvale, Calif., who live near a complex of buildings Apple started occupying in 2014 tell the San Jose Mercury News it’s clear something is going on at the complex, where the sheet metal fences are 12 feet high and security is intense, but no one knows what.

Continue reading “Weird noises are coming from an Apple complex” »

Feb 26, 2016

Unprecedented scientific report says decline of pollinators a threat to food security

Posted by in categories: food, health, policy, security

Around the world, the animals that pollinate our food crops — more than 20,000 species of bees, butterflies, bats and many others — are the subject of growing attention. An increasing number of pollinator species are thought to be in decline, threatened by a variety of mostly human pressures, and their struggles could pose significant risks for global food security and public health.

Until now, most assessments of pollinator health have been conducted on a regional basis, focusing on certain countries or parts of the world. But this week, a United Nations organization has released the first-ever global assessment of pollinators, highlighting their importance for worldwide food and nutrition, describing the threats they currently face and outlining strategies to protect them.

The report, which was released Friday by the U.N.’s Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES), has been in the works since the summer of 2014. The research team consisted of more than 70 experts, who drew on the most up-to-date global pollinator science, as well as local and indigenous knowledge, to complete the assessment.

Continue reading “Unprecedented scientific report says decline of pollinators a threat to food security” »

Feb 25, 2016

Is this the future of work? Scientists predict which jobs will still be open to humans in 2035

Posted by in categories: computing, employment, government, quantum physics, robotics/AI, security, space, virtual reality

1st; we all know in 30 years anything can change, wars can be fought & lost, natural disasters can occur, etc. However, posting for everyone’s amusement. 30 years ago which would be 1986; no one thought USSR would be broken up, 9/11 would happen creating the US Homeland Security, Lybia & Eygpt would overthrow their own leaders, that US Space missions would be outside the US Government, hacking at the levels we have today creating the CISO roles, of VR technology would exist, DNA and CRISPR would be discovered, etc.

So, who really knows what jobs will be fully automated v. not in 30 years or even created as a result of Quantum technology (Computing, Networking, Q-Dots for numerous thing that are not only technology, etc.). Just a fun article to share with everyone.


CSIRO says the Australian workplace of the future will be increasingly digitally-focused and automated, with titles such as online chaperone.

Continue reading “Is this the future of work? Scientists predict which jobs will still be open to humans in 2035” »

Feb 25, 2016

Defence white paper faces the reality of Australia’s engagement with Asia and the Pacific

Posted by in categories: computing, quantum physics, security

Australia’s improved alliance with China on defense, and Quantum Computing. Australia has been one of the early R&D groups working on Quantum Computing just like D-Wave, Stanford, UC Berkley, etc. So, this could help China drastically migrate much sooner to a Quantum infrastructure.


You think you’ve heard it before: Australia’s great security challenge this century is the dramatic shift in power to Asia epitomised by the rise of China.

But read of the latest Defence white paper if you want that abstract idea to sink in.

Continue reading “Defence white paper faces the reality of Australia’s engagement with Asia and the Pacific” »