Archive for the ‘security’ category

Apr 25, 2021

Study: ‘Fingerprint’ for 3D printer accurate 92% of time

Posted by in categories: computing, health, internet, security

3D printing is transforming everything from fashion and health care to transportation and toys. But this rapidly evolving technology, also known as additive manufacturing, can threaten national security and intellectual property rights.

To reduce illicit use of 3D printers, Zhanpeng Jin, Ph.D., associate professor in the Department of Computer Science and Engineering at the University at Buffalo, is developing a way to track the origin of 3D-printed items.

His concern was that, as long as people have the digital design for an item, which can be downloaded from the internet, sometimes as open-source material, people can print out anything they want, which can range from computer parts and toys to fully functional handguns and assault rifles.

Apr 22, 2021

Tech giant Eric Schmidt warns China is catching up to U.S. in AI

Posted by in categories: robotics/AI, security

In this episode of “Intelligence Matters,” National Security Commission on Artificial Intelligence Chair and Former CEO of Google Eric Schmidt joins Michael Morell to discuss the importance of investing in artificial intelligence as a national security priority. Schmidt believes China is likely to catch up to the U.S. in a few years in its artificial intelligence capabilities. He outlines how intelligence and national defense can benefit from superiority in these technologies and the benefits of holding A.I. to American values.


China is catching up to the U.S. in A.I. capabilities: “Where we are today with A.I. is that we judge America still ahead, but China investing very heavily and likely to catch up very soon. We don’t say what soon is, but my personal opinion, it is a few years, not five years.”

Continue reading “Tech giant Eric Schmidt warns China is catching up to U.S. in AI” »

Apr 15, 2021

Update Your Chrome Browser to Patch 2 New In-the-Wild 0-Day Exploits

Posted by in categories: computing, security

Google patches two security vulnerabilities in Chrome for Windows, Mac, and Linux, both of which it says are under active exploitation.

Apr 5, 2021

Intel CEO to attend White House meeting on chip supply chain

Posted by in categories: computing, economics, security

Intel Corp Chief Executive Officer Pat Gelsinger will virtually attend a meeting being put together by President Joe Biden’s administration for April 12 to discuss the semiconductor supply chain issues disrupting U.S. automotive factories, according to a person familiar with the matter. Reuters previously reported the meeting will include Biden’s national security adviser, Jake Sullivan, and a top economic aide, Brian Deese, as well as chipmakers and automakers. Gelsinger last month said Intel will spend $20 billion to build two new chip factories in Arizona.

Mar 26, 2021

AI makes edge and IoT smarter

Posted by in categories: robotics/AI, security

Implementing artificial intelligence at the edge can not only reduce latency and networking costs but also improve security and unlock the power of distributed intelligence.

Mar 25, 2021

WWII codebreaker Turing honored on UK’s new 50-pound note

Posted by in categories: biotech/medical, finance, security

LONDON (AP) — The rainbow flag flew proudly Thursday above the Bank of England in the heart of London’s financial district to commemorate World War II codebreaker Alan Turing, the new face of Britain’s 50-pound note.

The design of the bank note was unveiled before it is being formally issued to the public on June 23, Turing’s birthday. The 50-pound note is the most valuable denomination in circulation but is little used during everyday transactions, especially during the coronavirus pandemic as digital payments increasingly replaced the use of cash.

The new note, which is laden with high-level security features and is made of longer-lasting polymer, completes the bank’s rejig of its paper currencies over the past few years. Turing’s image joins that of Winston Churchill on the five-pound note, novelist Jane Austen on the 10-pound note and artist J. M. W. Turner on the 20-pound note.

Continue reading “WWII codebreaker Turing honored on UK’s new 50-pound note” »

Mar 25, 2021

Robotic Assistance Devices to Integrate EAGL Gunshot Detection Technology into All Security Devices

Posted by in categories: business, law enforcement, robotics/AI, security, weapons

HENDERSON, Nev.—()—Artificial Intelligence Technology Solutions, Inc. (OTCPK: AITX), today announced that its wholly-owned subsidiary Robotic Assistance Devices (RAD) has entered into an agreement with EAGL Technology, Inc. to offer EAGL’s Gunshot Detection System (GDS) in all present and foreseeable future RAD devices.

“We have been receiving repeated requests that gunshot detection capabilities be built into RAD devices from industries as varied as transit operators, retail property managers, and law enforcement. Integrating EAGL’s technology into RAD’s autonomous response solutions should be well received by all of the markets we serve” Tweet this

EAGL Technology was established in 2015 after acquiring gunshot ballistic science developed by the Department of Energy (DOE) Pacific Northwest National Laboratory (PNNL). EAGL has advanced this technology by creating a state-of-the-art security system. The EAGL product offering utilizes the company’s patented FireFly® Ballistic Sensor technology which RAD will offer, as an integrated option, on all mobile and stationary security solutions. EAGL clients include Honeywell, Johnson Controls, Siemens and many more.

Mar 16, 2021

Artificial intelligence leads NATO’s new strategy for emerging and disruptive tech

Posted by in categories: biotech/medical, quantum physics, robotics/AI, security

STUTTGART, Germany — NATO and its member nations have formally agreed upon how the alliance should target and coordinate investments in emerging and disruptive technology, or EDT, with plans to release artificial intelligence and data strategies by the summer of 2021.

In recent years the alliance has publicly declared its need to focus on so-called EDTs, and identified seven science and technology areas that are of direct interest. Now, the NATO enterprise and representatives of its 30 member states have endorsed a strategy that shows how the alliance can both foster these technologies — through stronger relationships with innovation hubs and specific funding mechanisms — and protect EDT investments from outside influence and export issues.

NATO will eventually develop individual strategies for each of the seven science and technology areas — artificial intelligence, data and computing, autonomy, quantum-enabled technologies, biotechnology, hypersonic technology, and space. But for the near future, the priority is AI and data, said David van Weel, NATO’s assistant secretary general for emerging security challenges.

Continue reading “Artificial intelligence leads NATO’s new strategy for emerging and disruptive tech” »

Mar 12, 2021

Irakli Beridze, Head, Centre for Artificial Intelligence and Robotics — UNICRI — United Nations

Posted by in categories: government, law, policy, robotics/AI, security, sustainability

AI And Robots For Law And Order — Irakli Beridze — Head, Artificial Intelligence and Robotics, UNICRI – United Nations Interregional Crime and Justice Research Institute.

Irakli Beridze is the Head of the Centre for Artificial Intelligence and Robotics at The United Nations Interregional Crime and Justice Research Institute (UNICRI).

Continue reading “Irakli Beridze, Head, Centre for Artificial Intelligence and Robotics — UNICRI — United Nations” »

Mar 8, 2021

Unsecured cloud configurations expose data across thousands of mobile apps

Posted by in category: security

In mobile application development, server-side storage of the application’s data remains top priority. In particular, many developers have begun using backend APIs that enable their apps to query a server for information in real time rather than reply upon static data stored in files. However, as many cloud storage services have been found to use unsecured configurations, data on thousands of mobile applications could be at risk.

A main challenge arises when the task of securing the configurations of these services falls upon the app developers rather than the provider, such as Amazon AWS, Google’s Firebase Storage or Azure by Microsoft. When developers use these services for the very purpose of having their API security taken care of, they invest the majority of their efforts into building the apps rather than protecting stored information. Such an oversight could threaten many app developers as well as their employers and users.

In 2021, the mobile security company Zimperium found that over 14 percent of using cloud storage face risks due to unsecured configurations. This research has revealed that, globally and across all industries, various apps are vulnerable to the exposure of publicly identifiable information (PII), fraud and unregulated internal IP/configuration sharing.

Page 1 of 7512345678Last