Menu

Blog

Archive for the ‘security’ category: Page 49

Sep 30, 2022

How MLops deployment can be easier with open-source versioning

Posted by in categories: robotics/AI, security

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

Modern software development typically follows a very iterative approach known as continuous integration/continuous development (CI/CD). The promise of CI/CD is better software that is released quicker and it’s a promise that ClearML now intends to bring to the world of machine learning (ML).

ClearML today announced the general availability of its enterprise MLops platform that extends the capabilities of the company’s open-source edition. The ClearML Enterprise platform provides organizations with security controls and additional capabilities for rapidly iterating and deploying ML workflows.

Sep 23, 2022

15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects

Posted by in categories: robotics/AI, security

As many as 350,000 open source projects are believed to be potentially vulnerable to exploitation as a result of a security flaw in a Python module that has remained unpatched for 15 years.

The open source repositories span a number of industry verticals, such as software development, artificial intelligence/machine learning, web development, media, security, and IT management.

Continue reading “15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects” »

Sep 21, 2022

Dr. Andrew Hebbeler, Ph.D. — Office of Science and Technology Policy (OSTP) — The White House

Posted by in categories: biotech/medical, chemistry, health, policy, science, security, terrorism

Maximizing Benefits Of The Life Sciences & Health Tech For All Americans — Dr. Andrew Hebbeler, Ph.D., Principal Assistant Director for Health and Life Sciences, Office of Science and Technology Policy, The White House.


Dr. Andrew Hebbeler, Ph.D., is Principal Assistant Director for Health and Life Sciences, Office of Science and Technology Policy at The White House (https://www.whitehouse.gov/ostp/ostps-teams/health-and-life-sciences/), and has extensive foreign affairs, national security, global health, and science and technology (S&T) policy experience.

Continue reading “Dr. Andrew Hebbeler, Ph.D. — Office of Science and Technology Policy (OSTP) — The White House” »

Sep 19, 2022

A WiFi Deauthentication Project in a Sleek Package

Posted by in categories: education, internet, security, wearables

Wearable tech has seen an explosion of creativity and applications in the last decade; especially with circuit components getting smaller and cheaper, and batteries getting better and better. Whereas taking phone calls on your wrist was impressive just a few years ago, now, you can experiment with deauthentication attacks on WiFi networks just from this watch: the DSTIKE Deauther Watch SE.

Based on the ESP8266 WiFi microcontroller, this watch is the latest generation of a project to give you a wearable interface for pen testing local WiFi networks. The watch only works on 2.4GHz networks, due to the restrictions of the ESP8266. It comes pre-flashed with the latest ESP8266 Deauther firmware, which is an open-source project! The watch supports four main functions: a deauther attack, which disconnects all local 2.4GHz networks; deauther beacon, used for creating fake networks; deauther probe, to confuse any nearby WiFi trackers; and packet monitoring, which lets you display local WiFi traffic. As you can see, there’s a lot to appreciate in this slick and discreet package.


This watch (and its prior iterations) are made and sold by Travis Lin. Much like the seller emphasizes on the product page, this device is meant for educational purposes, and should be only tested on devices and networks you own. But if this has your curiosity piqued, put on your red hat and check out the wearable devices and other security goodies they have for sale!

Sep 17, 2022

Where are all the personal robots we were promised?

Posted by in categories: genetics, robotics/AI, security

https://youtube.com/watch?v=EEqHir0YFnU

These 15 robots may demonstrate that the concept is viable.

Personal robots have been a common trope in sci-fi for many decades. Their apparent plausibility has made many sci-fi enthusiasts wonder when they may become a reality.

Continue reading “Where are all the personal robots we were promised?” »

Sep 16, 2022

First light at the most powerful laser in the US

Posted by in categories: biotech/medical, quantum physics, security

The laser that will be the most powerful in the United States is preparing to send its first pulses into an experimental target at the University of Michigan.

Called ZEUS, the Zetawatt-Equivalent Ultrashort pulse System, it will explore the physics of the quantum universe as well as outer space, and it is expected to contribute to new technologies in medicine, electronics and national security.

Continue reading “First light at the most powerful laser in the US” »

Sep 13, 2022

Nation’s first security-focused, 5G wireless test range opens in Idaho

Posted by in categories: internet, security

NEWS MEDIA CONTACTS: Ethan Huffman, (208) 716‑4594, [email protected] Sarah Neumann, (208) 526‑0490, [email protected]

Sep 12, 2022

Lassa Fever: Symptoms Of Ebola-like Virus As First UK Death Confirmed

Posted by in categories: biotech/medical, health, security

Lassa fever is like ebola and there is an outbreak in Nigeria. It is transmissible through inhalation.


The death of a patient in the UK suffering from Lassa fever has heightened concern around the illness after a third case was reported.

The UK Health Security Agency (UKHSA) said it was contacting individuals who had been in close contact with the infected patients after the death was confirmed last week.

Continue reading “Lassa Fever: Symptoms Of Ebola-like Virus As First UK Death Confirmed” »

Sep 2, 2022

Congress may tighten scrutiny of US investment in foreign technologies

Posted by in categories: government, robotics/AI, security

Inbound foreign investments in key sectors are reviewed by the Committee on Foreign Investment in the United States (CFIUS). However, screening of outbound investments – a so-called “reverse CFIUS” – would be new, and could significantly impact industries ranging from aerospace and defense to fintech to pharmaceuticals.

How did we get here?

The last several years have witnessed an accelerated national security pivot from the twenty-year global war on terror to strategic competition with major state adversaries. Unclassified assessments of the U.S. national security posture reveal significant threats in domains ranging from artificial intelligence to hypersonic weapons to energy, many of which have been exacerbated by the theft of U.S. technology. The legislation proposing a “reverse CFIUS” review would seek to counter these threats by adding new controls to the flow of U.S. capital and intellectual property abroad.

Sep 1, 2022

How the NQISRCs are harnessing the quantum revolution

Posted by in categories: economics, quantum physics, security

While having their own unique areas of expertise and resources, the NQISRCs are all aligned to the same mission—the advancement of quantum information science.

Five National Quantum Information Science Research Centers (NQISRCs) are leveraging the behavior of nature at the smallest scales to develop technologies for science’s most complex problems. Supported by the U.S. Department of Energy (DOE) Office of Science, the NQISRCs have been supporting DOE’s mission since 2020 to advance the energy, economic and national security of the United States. By building a national quantum ecosystem and workforce comprising researchers at roughly 70 institutions across the United States, the centers create a rich environment for quantum innovation and co-design.

The NQISRCs integrate state-of-the-art DOE facilities, preeminent talent at national laboratories and U.S. universities, and the enterprising ingenuity of U.S. technology companies.

Page 49 of 146First4647484950515253Last