Menu

Blog

Archive for the ‘security’ category: Page 75

Feb 3, 2021

Quantum tunneling in graphene advances the age of terahertz wireless communications

Posted by in categories: biotech/medical, quantum physics, security

Scientists from MIPT, Moscow Pedagogical State University and the University of Manchester have created a highly sensitive terahertz detector based on the effect of quantum-mechanical tunneling in graphene. The sensitivity of the device is already superior to commercially available analogs based on semiconductors and superconductors, which opens up prospects for applications of the graphene detector in wireless communications, security systems, radio astronomy, and medical diagnostics. The research results are published in Nature Communications.

Jan 24, 2021

The Empowering Neurologist — David Perlmutter M.D., and Dr. David Sinclair

Posted by in categories: biotech/medical, chemistry, genetics, law, life extension, security

Fair to say that we all assume that aging is inevitable. In reality however, there is no biological law that says we must age. Over the years we’ve seen a variety of theories proposed to explain why we age including the accumulation of damage to our DNA, the damaging effects of chemicals called “free radicals, changes in the function of our mitochondria, and so many others.

Our guest today, Dr. David Sinclair, believes that aging is related to a breakdown of information. Specifically, he describes how, with time, our epigenome accumulates changes that have powerful downstream effects on the way our DNA functions. Reducing these changes to the epigenome is achievable and in fact, even taking it further, his research now reveals that the epigenome can be reprogrammed back to a youthful state.

Continue reading “The Empowering Neurologist — David Perlmutter M.D., and Dr. David Sinclair” »

Jan 20, 2021

Malwarebytes said it was hacked by the same group who breached SolarWinds

Posted by in categories: government, security

Our internal systems showed no evidence of unauthorized access or compromise in any on-premises and production environments.

Our software remains safe to use, Kleczynski added.

After today’s disclosure, Malwarebytes becomes the fourth major security vendor targeted by the UNC2452/Dark Halo threat actor, which US officials have linked to a Russian government cyber-espionage operation.

Jan 19, 2021

Taured Mystery: The Man Who Vanished As Mysteriously As He Came

Posted by in categories: business, cosmology, internet, security, time travel

The Man Said That His Country Has Been In Existence For 1000 Years And Was A Little Puzzled Why His Country Was Called Andorra On The Map.

It was July 1954 when a smartly dressed man arrives at Haneda Airport in Tokyo, Japan. Much like other passengers, he makes his way to customs. But whatever happened from this point onwards have left all puzzled and concerned. When questioned by the customs officers, the mysterious passenger said he was from Taured, also referred to as Taured Mystery. The mystery man claimed that it was the third time he was visiting Japan from his country. But, to the surprise of officers, they couldn’t find any country named Taured. The primary language of the man, described as Caucasian looking with a beard, was French. However, she was purportedly speaking Japanese and many other languages as well.

Officers were perplexed because they had never heard about any such country. The passport of the man was issued by of course the Taured. The passport looked authentic but the place was not recognized.

Continue reading “Taured Mystery: The Man Who Vanished As Mysteriously As He Came” »

Jan 11, 2021

Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen

Posted by in categories: drones, education, government, law, robotics/AI, security, space, surveillance

The arrival of government-operated autonomous police robots does not look like predictions in science fiction movies. An army of robots with gun arms is not kicking down your door to arrest you. Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious —and then call the human police on them. Police robots may not be able to hurt people like armed predator drones used in combat— yet —but as history shows, calling the police on someone can prove equally deadly.

Long before the 1987 movie Robocop, even before Karel Čapek invented the word robot in 1920, police have been trying to find ways to be everywhere at once. Widespread security cameras are one solution—but even a blanket of CCTV cameras couldn’t follow a suspect into every nook of public space. Thus, the vision of a police robot continued as a dream, until now. Whether they look like Boston Dynamics’ robodogs or Knightscope’s rolling pickles, robots are coming to a street, shopping mall, or grocery store near you.

Continue reading “Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen” »

Jan 8, 2021

Researchers realize efficient generation of high-dimensional quantum teleportation

Posted by in categories: quantum physics, security

In a study published in Physical Review Letters, a team led by academician Guo Guangcan from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences (CAS) has made progress in high dimensional quantum teleportation. The researchers demonstrated the teleportation of high-dimensional states in a three-dimensional six-photon system.

To transmit unknown quantum states from one location to another, quantum teleportation is one of the key technologies to realize long-distance transmission.

Compared with two-dimensional systems, high-dimensional system quantum networks have the advantages of higher channel capacity and better security. In recent years more and more researchers of the quantum information field have been working on generating efficient generation of high-dimensional quantum teleportation to achieve efficient high-dimensional quantum networks.

Jan 6, 2021

Physicists observe competition between magnetic orders

Posted by in categories: computing, encryption, nanotechnology, quantum physics, security

They are as thin as a hair, only a hundred thousand times thinner—so-called two-dimensional materials, consisting of a single layer of atoms, have been booming in research for years. They became known to a wider audience when two Russian-British scientists were awarded the Nobel Prize in Physics in 2010 for the discovery of graphene, a building block of graphite. The special feature of such materials is that they possess novel properties that can only be explained with the help of the laws of quantum mechanics and that may be relevant for enhanced technologies. Researchers at the University of Bonn (Germany) have now used ultracold atoms to gain new insights into previously unknown quantum phenomena. They found out that the magnetic orders between two coupled thin films of atoms compete with each other. The study has been published in the journal Nature.

Quantum systems realize very unique states of matter originating from the world of nanostructures. They facilitate a wide variety of new technological applications, e.g. contributing to secure data encryption, introducing ever smaller and faster technical devices and even enabling the development of a quantum computer. In the future, such a computer could solve problems which conventional computers cannot solve at all or only over a long period of time.

How unusual quantum phenomena arise is still far from being fully understood. To shed light on this, a team of physicists led by Prof. Michael Köhl at the Matter and Light for Quantum Computing Cluster of Excellence at the University of Bonn are using so-called quantum simulators, which mimic the interaction of several quantum particles—something that cannot be done with conventional methods. Even state-of-the-art computer models cannot calculate complex processes such as magnetism and electricity down to the last detail.

Dec 26, 2020

Exploring the potential of near-sensor and in-sensor computing systems

Posted by in categories: computing, information science, internet, security

As the number of devices connected to the internet continues to increase, so does the amount of redundant data transfer between different sensory terminals and computing units. Computing approaches that intervene in the vicinity of or inside sensory networks could help to process this growing amount of data more efficiently, decreasing power consumption and potentially reducing the transfer of redundant data between sensing and processing units.

Researchers at Hong Kong Polytechnic University have recently carried out a study outlining the concept of near-sensor and in-sensor computing. These are two computing approaches that enable the partial transfer of computation tasks to sensory terminals, which could reduce and increase the performance of algorithms.

“The number of sensory nodes on the Internet of Things continues to increase rapidly,” Yang Chai, one of the researchers who carried out the study, told TechXplore. “By 2032, the number of will be up to 45 trillion, and the generated information from sensory nodes is equivalent to 1020 bit/second. It is thus becoming necessary to shift part of the computation tasks from cloud computing centers to edge devices in order to reduce energy consumption and time delay, saving communication bandwidth and enhancing data security and privacy.”

Dec 26, 2020

Suicide bomb detection method using Doppler radar to de“ data-react-helmet=”true

Posted by in categories: security, terrorism

Over the past 25 years, suicide attacks have emerged as a method used on a large scale by terrorist organizations to inflict lethal damage and create fear and chaos. Data collected by the University of Chicago’s Project on Security & Threats shows that worldwide there were 5, 021 suicide attacks utilizing bombs, which resulted in 47, 253 deaths and 113, 413 wounded from 2000 to 2016.

And recent news reports have highlighted the attempted use of suicide bombs in U.S. subways and city streets as well as on major airlines. An individual willing to sacrifice their own life in an attack is a significant force-multiplier, who too often escapes conventional threat detection methods. However, new technologies may yet close the security gap.

To detect suicide bombers preparing to attack public places and other high-value targets, a research team led by a professor at the Naval Postgraduate School invented a method to detect persons wearing wires or a significant amount of metal that might be part of an explosive device.

Dec 26, 2020

US Department of Homeland Security warns American business not to use Chinese tech or let data behind the Great Firewall

Posted by in categories: business, security

Even fitness trackers ruled a big risk due to potential for record-matching identifying your family.

Page 75 of 146First7273747576777879Last