Menu

Blog

Archive for the ‘security’ category: Page 6

Oct 9, 2024

Unlocking Quantum Communication: The Power of Diamond-Based Qubits

Posted by in categories: computing, quantum physics, security

Quantum computers and quantum communication are groundbreaking technologies that enable faster and more secure data processing and transmission compared to traditional computers. In quantum computers, qubits serve as the fundamental units of information, functioning as the quantum mechanical equivalent of bits in classical computing.

Where, for example, laser pulses in a glass fiber transport information from A to B in classical digital communication, quantum mechanics uses individual photons. In principle, this makes it impossible to intercept the transmitted data. Qubits that are optically addressable (can be controlled or read out with light) are suitable for storing the photons’ information and processing it in quantum computers. The qubits can store and process quantum states, and absorb and emit them in the form of photons.

Oct 8, 2024

DoD launches new biological defense supercomputer at Lawrence Livermore Lab

Posted by in categories: biological, government, security, supercomputing

The US government has launched a new supercomputer in Livermore, California.

The Department of Defense (DoD) and National Nuclear Security Administration (NNSA) this month inaugurated a new supercomputing system dedicated to biological defense at the Lawrence Livermore National Laboratory (LLNL).


Specs not shared, but same architecture as upcoming El Capitan system.

Continue reading “DoD launches new biological defense supercomputer at Lawrence Livermore Lab” »

Oct 8, 2024

Google Blocks Unsafe Android App Sideloading in India for Improved Fraud Protection

Posted by in category: security

Google’s new security pilot in India automatically blocks sideloading of risky Android apps, protecting users from malicious installs.

Oct 5, 2024

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

Posted by in category: security

LiteSpeed Cache plugin vulnerability (CVE-2024–47374) exposes WordPress sites to XSS attacks. Update to version 6.5.1 now.

Oct 5, 2024

Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks

Posted by in categories: mobile phones, security

Google enhances Pixel security in Android 14 to block baseband attacks, 2G downgrades, and SMS Blaster fraud.

Oct 3, 2024

The United Launch Alliance (ULA) is gearing up for the second certification flight of its Vulcan Centaur rocket

Posted by in categories: security, space

marking a critical milestone in ULA’s path toward certifying the Vulcan Centaur for national security missions with the U.S. Space Force.

The Vulcan VC2S rocket is set to launch the Cert-2 mission from Space Launch Complex-41 at Cape Canaveral Space Force Station, Florida, during a launch window on Friday, October 4, 2024, between 6:00 and 9:00 a.m. EDT.

This mission includes an inert payload and key technology demonstrations for the Centaur V upper stage.

Sep 27, 2024

Security protocol leverages quantum mechanics to shield data from attackers during cloud-based computation

Posted by in categories: finance, health, quantum physics, robotics/AI, security

Deep-learning models are being used in many fields, from health care diagnostics to financial forecasting. However, these models are so computationally intensive that they require the use of powerful cloud-based servers.

Sep 21, 2024

AI Live Players: the Geopolitics & Strategic Dynamics of AI, with Samo Burja of Bismarck Analysis

Posted by in categories: robotics/AI, security

In this episode of The Cognitive Revolution, Nathan interviews Samo Burja, founder of Bismarck Analysis, on the strategic dynamics of artificial intelligence through a geopolitical lens. They discuss AI’s trajectory, the chip supply chain, US-China relations, and the challenges of AI safety and militarization. Samo brings both geopolitical expertise and technological sophistication to these critical topics, offering insights on balancing innovation, security, and international cooperation.

Apply to join over 400 Founders and Execs in the Turpentine Network: https://www.turpentinenetwork.co/

Continue reading “AI Live Players: the Geopolitics & Strategic Dynamics of AI, with Samo Burja of Bismarck Analysis” »

Sep 17, 2024

Brain implant allows man to control Amazon’s Alexa with his mind

Posted by in categories: neuroscience, robotics/AI, security

“To be able to manage important aspects of my environment and control access to entertainment gives me back the independence that I’m losing,” Mark said.

The chip sits on a blood vessel and senses his brain activity, which is then translated into specific commands and sent to his digital devices for recognition. In a video shared by Synchron, Mark is seen mentally tapping on icons on his devices, ordering Alexa to turn the lights on and off, and checking his security camera to see who is outside — all without using his hands or voice.

“Synchron’s BCI is bridging the gap between neurotechnology and consumer tech, making it possible for people with paralysis to regain control of their environment,” Thomas Oxley, the company’s chief executive, said. “While many smart home systems rely on voice or touch, we are sending control signals directly from the brain, bypassing the need for these inputs. We’re thrilled … to address a critical unmet need for millions of people with mobility and voice impairment.”

Sep 13, 2024

WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers

Posted by in category: security

WordPress.org mandates 2FA for plugin/theme developers, introduces SVN passwords to enhance security and prevent unauthorized access.

Page 6 of 148First345678910Last