Menu

Blog

Archive for the ‘security’ category: Page 83

May 19, 2020

Technology In A Time Of Crisis: How DARPA And AI Are Shaping The Future

Posted by in categories: bioengineering, biotech/medical, health, information science, policy, robotics/AI, security

Then there is the COVID-19 Open Research Dataset (CORD-19), a multi-institutional initiative that includes The White House Office of Science and Technology Policy, Allen Institute for AI, Chan Zuckerberg Initiative (CZI), Georgetown University’s Center for Security and Emerging Technology (CSET), Microsoft, and the National Library of Medicine (NLM) at the National Institutes of Health (NIH).

The goal of this initiative is to create new natural language processing and machine learning algorithms to scour scientific and medical literature to help researchers prioritize potential therapies to evaluate for further study. AI is also being used to automate screening at checkpoints by evaluating temperature via thermal cameras, as well as modulations in sweat and skin discoloration. What’s more, AI-powered robots have even been used to monitor and treat patients. In Wuhan, the original epicenter of the pandemic, an entire field hospital was transitioned into a “smart hospital” fully staffed by AI robotics.

Any time of great challenge is a time of great change. The waves of technological innovation that are occurring now will echo throughout eternity. Science, technology, engineering and mathematics are experiencing a call to mobilization that will forever alter the fabric of discovery in the fields of bioengineering, biomimicry and artificial intelligence. The promise of tomorrow will be perpetuated by the pangs of today. It is the symbiosis of all these fields that will power future innovations.

May 19, 2020

Secure smart-home entry via earprint

Posted by in categories: biotech/medical, computing, internet, mobile phones, privacy, security

Fingerprints and DNA are widely known forms of biometrics, thanks to crime dramas on television. But as technology advances the Internet of Things, the interconnection of computer devices in common objects, other forms of biometrics are sought for security. For example, distinctive physical characteristics of users are increasingly used in computer science as forms of identification and access restriction. Smartphones use fingerprints, iris scans and face recognition in this way. Other biometrics that are likely to come into use include retinas, veins and palm prints.

The ear is another potential biometric. According to research published recently in the Journal of Electronic Imaging, ear recognition technology, or “earprints,” could one day be used as personal identification to secure via smartphones.

May 18, 2020

Behavioral biometrics and continuous authentication advance as business adapts to remote everything

Posted by in categories: biotech/medical, business, privacy, security

Even as dramatic social change has been imposed by COVID-19, the kinds of fraud attacks companies experience and the biometric authentication technologies they use to prevent them have remained basically the same. What has changed is that online volumes of traffic, transactions and authentications have reached levels they were expected to years in the future, BehavioSec VP of Products Jordan Blake told Biometric Update in an interview.

As a result, he says, “timelines are getting advanced.”

Demand is coming from new verticals, according to Blake, as numerous people begin using the online channel to interact with many organizations they never have dealt with that way before.

May 17, 2020

Samsung Galaxy A Quantum announced with quantum encryption technology

Posted by in categories: encryption, internet, mobile phones, quantum physics, security

Samsung and South Korean carrier SK Telecom today announced a new 5G smartphone dubbed Galaxy A Quantum.

The Samsung Galaxy A Quantum is the world’s first 5G smartphone equipped with a quantum random number generator (QRNG) chipset, which is developed by SK Telecom’s Switzerland-based subsidiary ID Quantique.

The QRNG chipset is the SKT IDQ S2Q000 and it enhances the security of the phone’s data by using quantum encryption technology to generate random numbers and create unpredictable secure keys.

May 15, 2020

Video of black light experiment shows how fast a virus can spread in a restaurant setting

Posted by in categories: biotech/medical, security

In the video, one person is designed as the “infected” patient and is given a special black light-ready solution to rub into his hands. (The solution is invisible without a black light, so participants in the demonstration can’t see it during the simulation.) Then, everyone in the experiment does what people normally do at a buffet restaurant — they dish up food, eat chat, and drink. At the end of the video, a black light is turned on, and you can see the “virus” just about everywhere. It shows up on utensils, cups, food and even on some participants’ faces.

Experts say this is definitely worth paying attention to.

“This is an accurate illustration of how many commonly touched surfaces there are and how many opportunities there are for viruses to spread,” Dr. Amesh A. Adalja, senior scholar at the Johns Hopkins Center for Health Security, tells Yahoo Life.

May 14, 2020

The US Senate just voted to let the FBI access your browser history without a warrant

Posted by in categories: law enforcement, security, surveillance

In a major blow to citizens’ privacy, the US Senate voted today to give law enforcement agencies such as the FBI and CIA the power to look into your browser history without a warrant. Thanks, Mitch McConnell.

Senators Ron Wyden from Oregan and Senator Steve Daines of Montana led the charge to insert privacy protections into the Patriot Act, which gives law enforcement agencies power for surveillance in order to maintain national security. However, the privacy protection amendment fell short by just one vote, as many senators who may have voted in favor of it didn’t show up.

May 11, 2020

Secretive Jasons to offer advice on how to reopen academic labs shut

Posted by in categories: biotech/medical, government, health, security

‘s COVID-19 reporting is supported by the Pulitzer Center.

A group of prominent academic scientists that has been advising the U.S. government on security matters since the Cold War is conducting a quick-turnaround, pro bono study of a new threat to national security—the impact of COVID-19 on academic research. And this time it’s personal.

Last month, some 30 members of Jason began to tackle the thorny question of how to reopen university laboratories safely in the midst of the coronavirus pandemic. Nobody is paying for the study, a rare departure for the group, whose work is usually financed by government agencies and often involves classified information. But the study’s leader, Massachusetts Institute of Technology (MIT) physicist Peter Fisher, says several federal agencies have expressed interest in the group’s analysis of the technical challenges facing every university that wants to resume research operations without jeopardizing the health of the faculty, students, and staff who work in those labs.

May 11, 2020

ULA and SpaceX targeting this weekend for back-to-back rocket launches

Posted by in categories: security, space

If schedules hold, United Launch Alliance and SpaceX will highlight this weekend with back-to-back rocket launches, a cadence rarely seen on the Space Coast.

First on the Space Force’s calendar is X-37B, a secretive Department of Defense spaceplane that stays in orbit years at a time, testing new systems and capabilities. The 29-foot vehicle will fly on an Atlas V rocket between 6:30 a.m. and 11 a.m. Saturday, though an exact time has not yet been released due to security concerns. Launch Complex 41 will host the attempt.

Though most of the spaceplane’s capabilities are classified, the Space Force said the mission known as Orbital Test Vehicle 6 will host more experiments than ever before. Some of those include testing radiation’s effects on seeds, transforming solar power to transmissible microwave energy, and how space affects different kinds of materials.

May 9, 2020

Space Force to get deeper insight into inner workings of SpaceX commercial launches

Posted by in categories: security, space, surveillance

WASHINGTON — SpaceX on May 6 was awarded an $8.9 million contract modification that gives the U.S. Space Force direct insight into the inner workings of the company’s commercial and civil space missions.

The contract for “non-National Security Space fleet surveillance” gives the Space Force access to SpaceX missions until November.

“This contract provides for non-NSS fleet surveillance efforts across the SpaceX family of launch vehicles for non-NSS missions,” said the contract announcement. The $8.9 million is an addition to an existing $297 million contract awarded to SpaceX in February 2019 for three national security launches.

May 8, 2020

Scientists demonstrate quantum radar prototype

Posted by in categories: biotech/medical, quantum physics, security

Physicists at the Institute of Science and Technology Austria (IST Austria) have invented a new radar prototype that uses quantum entanglement as a method of object detection. This successful integration of quantum mechanics into devices could significantly impact the biomedical and security industries. The research is published in the journal Science Advances.

Quantum entanglement is a physical phenomenon whereby two particles remain interconnected, sharing physical traits regardless of how far apart they are from one another. Now, scientists from the research group of Professor Johannes Fink at the Institute of Science and Technology Austria (IST Austria) along with collaborators Stefano Pirandola from the Massachusetts Institute of Technology (MIT) and the University of York, UK, and David Vitali from the University of Camerino, Italy—have demonstrated a new type of detection technology called microwave quantum illumination that utilizes entangled as a method of detection. The prototype, which is also known as a quantum , is able to detect objects in noisy thermal environments where classical radar systems often fail. The technology has potential applications for ultra-low power biomedical imaging and security scanners.

Page 83 of 146First8081828384858687Last