Blog

Archive for the ‘security’ category

Jun 23, 2019

These Contacts Let You Shoot Lasers From Your Eyes

Posted by in categories: futurism, security

Scientists developed a laser-shooting membrane that could be the future of security.

Jun 20, 2019

Cisco Live 2019: Quantum Computing Presents an Exciting (and Scary) Future for IT

Posted by in categories: computing, quantum physics, security

The future is quantum, and while it’s absolutely full of possibilities, the increased power and scale of quantum computing presents some serious security concerns.

Jun 16, 2019

AI-Aided Video Surveillance Will Watch and Silently Judge Us

Posted by in categories: robotics/AI, security, surveillance

Gone are the days when a store’s security cameras only mattered to shoplifters.

Now, with the rising prevalence of surveillance systems constantly monitored by artificial intelligence, ubiquitous security systems can watch, learn about, and discriminate against shoppers more than ever before.

That’s the gist of a new ACLU report titled “The Dawn of Robot Surveillance,” about how emerging AI technology enables security companies to constantly monitor and collect data about people — opening new possibilities in which power is abused or underserved communities are overpoliced.

Jun 2, 2019

Key Northrop Grumman OmegA Rocket Test Succeeds, Despite Hiccup

Posted by in category: security

Successful OmegaA test keeps the program on the path towards a 2021 first launch and a crack at the Air Force’s hotly contested national security launch program.

Read more

May 29, 2019

Defense against wireless attacks using a deep neural network and game theory

Posted by in categories: business, habitats, internet, mobile phones, robotics/AI, security

A growing number of devices are now connected to the internet and are capable of collecting, sending and receiving data. This interconnection between devices, referred to as the Internet of Things (IoT), poses serious security threats, as cyberattackers can now target computers and smartphones, but also a vast array of other devices, such as tablets, smart watches, smart home systems, transportation systems and so on.

For the time being, examples of large-scale IoT implementations (e.g. connected infrastructure, cities, etc.) are somewhat limited, yet they could soon become widespread, posing significant risks for businesses and public services that heavily rely on the internet in their daily operations. To mitigate these risks, researchers have been trying to develop to protect devices connected to the internet from wireless attacks.

To this end, two researchers at Baoji University of Arts and Sciences, in China, have recently developed a new method to defend devices in an IOT environment from wireless network attacks. Their approach, presented in a paper published in Springer’s International Journal of Wireless Information Networks, combines a with a model based on , a branch of mathematics that proposes strategies for dealing with situations that entail competition between different parties.

Continue reading “Defense against wireless attacks using a deep neural network and game theory” »

May 25, 2019

A Quantum Revolution Is Coming

Posted by in categories: particle physics, quantum physics, security

Quantum physics, the study of the universe on an atomic scale, gives us a reference model to understand the human ecosystem in the discrete individual unit. It helps us understand how individual human behavior impacts collective systems and the security of humanity.

Metaphorically, we can see this in how a particle can act both like a particle or a wave. The concept of entanglement is at the core of much of applied quantum physics. The commonly understood definition of entanglement says that particles can be generated to have a distinct reliance on each other, despite any three-dimensional or 4-dimensional distance between the particles. What this definition and understanding imply is that even if two or more particles are physically detached with no traditional or measurable linkages, what happens to one still has a quantifiable effect on the other.

Now, individuals and entities across NGIOA are part of an entangled global system. Since the ability to generate and manipulate pairs of entangled particles is at the foundation of many quantum technologies, it is important to understand and evaluate how the principles of quantum physics translate to the survival and security of humanity.

Continue reading “A Quantum Revolution Is Coming” »

May 16, 2019

New Intel security flaw affects CPUs as far back as 2008

Posted by in categories: computing, security

Researchers say the new MDS attacks are ‘worse than Spectre.’

Read more

May 9, 2019

S-money: Ultra-secure form of virtual money proposed

Posted by in categories: computing, economics, finance, quantum physics, security, space

A new type of money that allows users to make decisions based on information arriving at different locations and times, and that could also protect against attacks from quantum computers, has been proposed by a researcher at the University of Cambridge.

The , dubbed ‘S–’, could ensure completely unforgeable and secure authentication, and allow faster and more flexible responses than any existing financial technology, harnessing the combined power of quantum theory and relativity. In fact, it could conceivably make it possible to conduct commerce across the Solar System and beyond, without long time lags, although commerce on a galactic scale is a fanciful notion at this point.

Researchers aim to begin testing its practicality on a smaller, Earth-bound scale later this year. S-money requires very fast computations, but may be feasible with current computing technology. Details are published in the Proceedings of the Royal Society A.

Continue reading “S-money: Ultra-secure form of virtual money proposed” »

May 8, 2019

A multi-scale body-part mask guided attention network for person re-identification

Posted by in categories: robotics/AI, security

Person re-identification entails the automated identification of the same person in multiple images from different cameras and with different backgrounds, angles or positions. Despite recent advances in the field of artificial intelligence (AI), person re-identification remains a highly challenging task, particularly due to the many variations in a person’s pose, as well as other differences associated with lighting, occlusion, misalignment and background clutter.

Researchers at the Suning R&D Center in the U.S. have recently developed a new technique for person re-identification based on a multi-scale body-part mask guided attention network (MMGA). Their paper, pre-published on arXiv, will be presented during the 2019 CVPR Workshop spotlight presentation in June.

“Person re-identification is becoming a more and more important task due to its wide range of potential applications, such as , and image retrieval,” Honglong Cai, one of the researchers who carried out the study, told TechXplore. “However, it remains a challenging task, due to occlusion, misalignment, variation of poses and background clutter. In our recent study, our team tried to develop a method to overcome these challenges.”

Continue reading “A multi-scale body-part mask guided attention network for person re-identification” »

May 7, 2019

Security Company to Install Gun-Detecting AI in Mosques Worldwide

Posted by in categories: robotics/AI, security

The Christchurch mosque will be one of the first to undergo installation.

Read more

Page 1 of 5212345678Last