Menu

Blog

Archive for the ‘security’ category

Dec 10, 2024

Transforming Businesses With LLMs: Risks And Use Cases

Posted by in categories: business, governance, security

Conversely, proprietary LLMs typically offer robust security features but still pose data privacy and control risks. Using these models involves sharing sensitive data with a third-party provider, which could lead to regulatory penalties if a breach occurs.

LLMs also lack transparency regarding their training data and how datasets are formed. Be mindful of potential bias and fairness issues and consider a human-in-the-loop approach, where specialists review and manage the model’s output.

Continue reading “Transforming Businesses With LLMs: Risks And Use Cases” »

Dec 10, 2024

Silver nanocubes enable nanolaser light generation

Posted by in categories: biotech/medical, security

Kaunas University of Technology (KTU), Lithuania researchers, and scientists from Japan have developed a unique nanolaser. Although the dimensions of this laser are so small that its structure can only be seen through a powerful microscope, its potential is vast. With applications in early medical diagnostics, data communication, and security technologies, this invention could also become a key tool for the study of light and matter interactions.

Depending on the application, lasers differ in the way light is amplified and produced, which determines the color of the radiation and the quality of the laser beam.

“Nanolasers are lasers that use structures a million times smaller than a millimeter to generate and amplify light, and the laser radiation is generated in an extremely tiny volume of material,” says Dr. Mindaugas Juodėnas, one of the authors of the invention.

Dec 7, 2024

South Australia has the most wind and solar and no baseload: So why is it the only state not fretting about a vulnerable grid?

Posted by in category: security

South Australia has the highest wind and solar share – an average of around 72 per cent over the last 12 months – vastly more than other state in Australia, and higher than any other gigawatt scale grid in the world.

Renewable energy critics, particularly those that don’t understand the way that grids work, instantly assume that this means South Australia’s grid must be weak and unreliable. But that is simply not true, and a new report from Australian Energy Market Operator on “system strength” underlines why this is so.

System strength is an important part of grid security, and – according to AEMO – describes the ability of the power system to maintain and control the voltage waveform at a given location, when the grid is running normally and particularly when it has to deal with a major disturbance.

Dec 7, 2024

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

Posted by in categories: robotics/AI, security

Critical flaws in MLflow, PyTorch, and more enable remote code execution, threatening AI and ML security.

Dec 5, 2024

Scientists exploit photo-induced chirality in thin films to improve authentication tech

Posted by in categories: economics, holograms, security

In today’s world, the fight against counterfeiting is more critical than ever. Counterfeiting affects about 3% of global trade, posing significant risks to the economy and public safety. From fake pharmaceuticals to counterfeit currency, the need for secure and reliable authentication methods is paramount. Authentication labels are commonly used—such as holograms on bank notes and passports—but there is always a need for new unfalsifiable technologies.

This is where research recently published in Applied Sciences comes into play. Led by a team of scientists from Oxford University, the University of Southampton, and Diamond Light Source, the UK’s national synchrotron, the work focuses on developing a new technology for writing and reading covert information on labels.

This technology leverages the unique properties of Ge2Sb2Te5 thin films, which can change their structure when exposed to specific types of laser light. By using circularly or linearly polarized laser light, the researchers can encode hidden information in these thin films. This information can then be revealed using a simple reading device, making the technology both advanced and accessible.

Dec 5, 2024

Unmatched Data Capacity and Security With Revolutionary Vortex Beams

Posted by in categories: computing, encryption, security

Researchers have developed an innovative optical technology capable of enhancing data transmission by utilizing spatial-frequency patching metasurfaces.

This approach allows light beams to carry significantly more data across multiple independent channels, overcoming traditional optical beam limitations. Its applications extend to secure communication, encryption, and advanced optical systems.

Revolutionary optical technology for data transmission.

Dec 2, 2024

Eavesdropping on underwater signals from the air

Posted by in category: security

“This work shows that sensitive information can be leaked in ways that previously haven’t been considered,” said Poorya Mollahosseini, a graduate student at Princeton and the paper’s co-lead author with Sayed Saad Afzal, a graduate student at MIT.

How are underwater communications protected?

The security of underwater communications relies heavily on the inability of sound traveling underwater to penetrate the surface, the researchers said. Signals that carry information are transmitted underwater as sound waves. Because water and air have very different densities, the water’s surface acts as a barrier for sound. When underwater sound waves hit the surface, they mostly just bounce off.

Nov 30, 2024

Dawn and dusk satellite quantum key distribution using time- and phase-based encoding and polarization filtering

Posted by in categories: quantum physics, security, space

Free-space optical communication links promise better security and increase bandwidths but can suffer from noise in daylight. This is particularly detrimental in quantum communications where current mitigation techniques, such as spectral, temporal, and spatial filtering, are not yet sufficient to make daylight tolerable for satellite quantum key distribution (SatQKD). As all current SatQKD systems are polarization-encoded, polarization filtering has not been investigated. However, by using time-and phase-encoded SatQKD, it is possible to filter in polarization in addition to existing domains. Scattered daylight can be more than 90% polarized in the visible band, yielding a reduction in detected daylight between 3 dB and 13 dB, such that polarization filtering can reduce the brightness of 780 nm daylight to below the unfiltered equivalent at 1,550 nm. Simulations indicate that polarization filtering increases the secure key rate and allows for SatQKD to be performed at dawn and dusk. This could open the way for daylight SatQKD utilizing shorter near-infrared wavelengths and retaining their benefits.

Published by Optica Publishing Group under the terms of the Creative Commons Attribution 4.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.

Nov 21, 2024

Radiation-tolerant FPGAs for space applications from Microchip Technology achieve government QML Class V

Posted by in categories: computing, government, life extension, security

CHANDLER, Ariz. – The radiation-tolerant RTG4 field-programmable gate arrays (FPGAs) with lead-free flip-chip bumps from Microchip Technology Inc. in Chandler, Ariz., have earned the Qualified Manufacturers List (QML) Class V status from the U.S. Defense Logistics Agency (DLA).

These radiation-tolerant FPGAs are for critical space programs. QML Class V is the highest level of qualification for space components for human-rated, deep-space, and national security space programs.

RTG4 FPGAs offer more than 150,000 logic elements, and come in flip-chip package construction where flip-chip bumps connect the silicon die and the package substrate for extended the longevity.

Nov 18, 2024

Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites

Posted by in categories: robotics/AI, security

A critical authentication bypass vulnerability has been disclosed in the Really Simple Security (formerly Really Simple SSL) plugin for WordPress that, if successfully exploited, could grant an attacker to remotely gain full administrative access to a susceptible site.

The vulnerability, tracked as CVE-2024–10924 (CVSS score: 9.8), impacts both free and premium versions of the plugin. The software is installed on over 4 million WordPress sites.

“The vulnerability is scriptable, meaning that it can be turned into a large-scale automated attack, targeting WordPress websites,” Wordfence security researcher István Márton said.

Page 1 of 14712345678Last