Menu

Blog

Archive for the ‘security’ category: Page 7

Aug 10, 2024

Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share

Posted by in category: security

Researchers uncover 10 security flaws in Google’s Quick Share, potentially allowing remote code execution on Windows. Update to version 1.0.1724.0 or.

Aug 6, 2024

Riverlane Locks Up $75M As Quantum Funding Continues Strong Year

Posted by in categories: computing, quantum physics, security

Startup Riverlane helped continue what has been a strong year for venture funding in the quantum computing industry.

The U.K.-based firm — which specializes in quantum error correction technology — raised a $75 million Series C led by Planet First Partners. The round also includes participation from ETF Partners, EDBI, Cambridge Innovation Capital, Amadeus Capital Partners, the National Security Strategic Investment Fund and Altair

The company’s tech helps quantum computers perform without succumbing to eventual errors. Such computers typically can only perform a few hundred quantum operations before failure.

Aug 5, 2024

Sam Altman’s Brain Chips | Rain Neuromorphic Chips | UAE Funds and US National Security and Q*

Posted by in categories: computing, neuroscience, security

LINKS: https://www.wired.com/story/openai-buy-ai-chips-startup-sam-…i/https:/.

Aug 2, 2024

45-Year-Old Theory Confirmed: Physicists Shed New Light on the “Invisible” Energy States of Molecules

Posted by in categories: biotech/medical, security

Artistic representation of hyper-Raman optical activity: twisted light (red helices) incident on molecules arranged on a helical scaffold (white dots) produce hyper-Raman scattering spectra (multicoloured light patches) that express ‘chirality’ (patches in spiral patterns and broken mirror). Credit: Ventsislav Valev and Kylian ValevAn international team of scientists, led by physicists from the University of Bath, has demonstrated a new optical phenomenon that could significantly impact various fields, including pharmaceutical science, security, forensics, environmental science, art conservation, and medicine.

Molecules rotate and vibrate in very specific ways. When light shines on them it bounces and scatters. For every million light particles (photons), a single one changes colour. This change is the Raman effect. Collecting many of these color-changing photons paints a picture of the energy states of molecules and identifies them.

Yet some molecular features (energy states) are invisible to the Raman effect. To reveal them and paint a more complete picture, ‘hyper-Raman’ is needed.

Aug 2, 2024

Synthesis of ceramic nanospheres with tunable electromagnetic wave absorption performance

Posted by in categories: biotech/medical, health, internet, security

Microwave technology has dramatically progressed, marked by the arrival of the 5G era, owing to the advantages of electromagnetic waves in long-distance, wireless, and high-speed transmissions. However, electromagnetic wave pollution problems such as electromagnetic wave interference and electromagnetic wave radiation are becoming increasingly serious.

Electromagnetic wave pollution not only affects the normal operation of electronic equipment, greatly threatens the information security of the scientific community, but also endangers human health and is a possible cause of cancer and sensitized diseases.

SiOC precursor ceramics have great application potential in electromagnetic protection because of their advantages such as lightweight, high-temperature resistance, and molecular designability. The main challenge of polymer-derived ceramic-based composites for electromagnetic wave absorption is the single loss mechanism, resulting in inferior electromagnetic wave attenuation ability.

Jul 31, 2024

You may soon be able to unlock your Apple devices with your heart

Posted by in categories: mobile phones, security

Passwords, Touch ID, and Face ID could all be a thing of the past, as Apple is working on a future where unlocking your devices is as easy as just holding a future iPhone or letting your Apple Watch sense your unique heart rhythm.

Everyone’s heart has a unique rhythm, which the Apple Watch monitors through the ECG app. In a recently granted patent, Apple describes a technique for identifying users based on their unique cardiovascular measurements.

With this technology, you can unlock all your devices if you keep wearing your Apple Watch. Verifying your heart patterns instead of a password or a fingerprint scan increases security and speeds up your identification.

Jul 31, 2024

Physicists use light to probe deeper into the ‘invisible’ energy states of molecules

Posted by in categories: biotech/medical, security

A new optical phenomenon has been demonstrated by an international team of scientists led by physicists at the University of Bath, with significant potential impact on pharmaceutical science, security, forensics, environmental science, art conservation and medicine.

Jul 30, 2024

SpaceX planning to land and recover Starship rocket off Australia’s coast

Posted by in categories: security, space

The plan would be to launch Starship from a SpaceX facility in Texas, land it in the sea off Australia’s coast and recover it on Australian territory. Getting permission to do so would require loosening US export controls on sophisticated space technologies bound for Australia, according to the sources, who spoke on condition of anonymity.

President Joe Biden’s administration already has sought to ease similar restrictions within the AUKUS security alliance, opens new tab, a grouping of the United States, Australia and Britain aimed at countering China.

SpaceX, the US Space Force and the Australian Space Agency did not immediately reply to requests for comment.

Jul 30, 2024

AI can see what’s on your screen by reading HDMI electromagnetic radiation

Posted by in categories: robotics/AI, security

Shiver me timbers: Security researchers have demonstrated that it’s possible to spy on what’s visible on your screen by intercepting electromagnetic radiation from video cables with great accuracy, thanks to artificial intelligence. The team from Uruguay’s University of the Republic says their AI-powered cable-tapping method is good enough that these attacks are likely already happening.

Back in the analog video era, it was relatively straightforward for hackers to reconstruct what was on a screen by detecting the leakage from video cables. But once digital protocols like HDMI took over, that became much trickier. The data zipping through HDMI is much more complex than old analog signals.

However, those digital signals still leak some electromagnetic radiation as they transmit between your computer and display. By training an AI model on samples of matching original and intercepted HDMI signals, the researchers were able to decode those leaks into readable screen captures.

Jul 24, 2024

Event-driven optical encryption advances information security through neuromorphic imaging

Posted by in categories: computing, encryption, internet, security

In an era where the internet connects virtually every aspect of our lives, the security of information systems has become paramount. Safeguarding critical databases containing private and commercial information presents a formidable challenge, driving researchers to explore advanced encryption techniques for enhanced protection.

Data encryption, a cornerstone of modern practices, transforms readable plaintext into encoded ciphertext, ensuring that only authorized recipients can decipher the data using a decryption key or password. Optical techniques have emerged as promising tools for encryption due to their capabilities for parallel, high-speed transmission, and low-power consumption. However, traditional optical encryption systems often suffer from vulnerabilities where plaintext-ciphertext forms remain identical, potentially compromising security.

Reporting in Advanced Photonics Nexus, scientists have unveiled an approach inspired by bio-inspired neuromorphic imaging and speckle correlography. Their innovative technique leverages computational neuromorphic imaging (CNI) to encrypt images into event-stream ciphertexts, marking a significant departure from conventional methods. This method introduces a new paradigm in optical encryption by converting data into event-driven formats, thereby significantly enhancing security and complexity.

Page 7 of 146First4567891011Last