Menu

Blog

Archive for the ‘security’ category

Jan 11, 2022

Raspberry Pi system can detect viruses on other devices without use of software

Posted by in categories: biotech/medical, computing, mobile phones, security

A team of researchers at the Institute of Computer Science and Random Systems has built a non-software-based virus detection system using a Raspberry Pi, an H-field probe and an oscilloscope to detect electromagnetic wave signatures of multiple types of viruses. The team presented its system and test results at last month’s ACM Machinery’s Annual Computer Security Applications Conference and published a paper describing their system on ACM’s Research Article page.

The idea behind the new system is that running software generates electromagnetic waves. And each piece of software generates its own unique wave patterns due to the way the software executes its code. The researchers took advantage of this knowledge and began using an H-field probe to capture wave patterns of known computer viruses running on various devices and viewed the results on an oscilloscope. They saw oscilloscope patterns that were unique to individual viruses as they were running. The researchers used that information to program a Raspberry Pi to identify data from the other two devices to recognize known virus wave patterns, using the system as a virus detector. To determine if a virus is running on a computer, IoT device or smartphone, a user places the H-field probe close enough to the device to read the electromagnetic waves that are generated. The Raspberry Pi then reports on whether it found any viruses, and if so, which ones.

Jan 10, 2022

Xage lands $30M to bring identity security to ‘real world’ infrastructure

Posted by in category: security

Xage, which offers zero trust identity security for operational technology customers, raised a $30 million series B to scale its deployments.

Jan 7, 2022

What is the smart factory? The impact of factory 4.0 on manufacturing

Posted by in categories: business, information science, internet, neuroscience, security

Smart factories will be very useful in metaverse.workers can operated machines in factories using Internet.


As the idea of interconnected and intelligent manufacturing is gaining ground, competing in the world of Industry 4.0 can be challenging if you’re not on the very cusp of innovation.

Seeing the growing economic impact of IIoT around the globe, many professionals and investors have been asking themselves if the industry is on the verge of a technological revolution. But judging from the numbers and predictions, there is tangible and concrete evidence that the idea of smart manufacturing has already burst into corporate consciousness. According to IDC, global spending on the Internet of Things in 2020 is projected to top $840 billion if it maintains the 12.6% year-over-year compound annual growth rate. There is no doubt that a huge part of this expenditure will be devoted to the introduction of IoT into all types of industry, especially including manufacturing.

Continue reading “What is the smart factory? The impact of factory 4.0 on manufacturing” »

Jan 7, 2022

JFrog researchers find JNDI vulnerability in H2 database consoles similar to log4shell

Posted by in category: security

JFrog’s senior director of security research said the vulnerability has a root cause similar to Log4Shell.

Jan 6, 2022

Coming to a Mall Nearby? RoboCop Isn’t Just Fiction Anymore

Posted by in categories: finance, robotics/AI, security

Picture credit: Knightscope.

The following post was written and/or published as a collaboration between Benzinga’s in-house sponsored content team and a financial partner of Benzinga.

Robots patrolling around shopping malls, casinos and places of work actively looking for criminal activity might no longer be something straight out of a science fiction novel or movie. Knightscope, Inc., a Silicon Valley Based startup, is building and deploying fully autonomous security robots that deter, detect and report crime.

Jan 5, 2022

First Microsoft Pluton-powered Windows 11 PCs to start rolling out this year

Posted by in categories: computing, security

The first PCs to incorporate Microsoft’s Pluton security chip will be available from Lenovo this May.

Jan 5, 2022

Experimental quantum teleportation of propagating microwaves

Posted by in categories: quantum physics, security

The field of experimental quantum communication promises ways of efficient and unconditional secure information exchange in quantum states. The possibility of transferring quantum information forms a cornerstone of the emerging field of quantum communication and quantum computation. Recent breakthroughs in quantum computation with superconducting circuits trigger a demand for quantum communication channels between superconducting processors separated in space at microwave length frequencies. To pursue this goal, Kirill G. Fedorov, and a team of scientists in Germany, Finland and Japan demonstrated unconditional quantum teleportation to propagate coherent microwave states by exploring two-mode squeezing and analog feedforward across a distance of 0.42 m. The researchers achieved a teleportation fidelity of F= 0.689±0.004, which exceeded the asymptotic no-cloning threshold, preventing the use of classical error correction methods on quantum states. The quantum state of the teleported state was preserved to open the avenue towards unconditional security in microwave quantum communication.

Quantum teleportation (QT).

The promise of quantum communication is based on the delivery of efficient and unconditionally secure ways to exchange information by exploring the quantum laws of physics. Quantum teleportation (QT) is an exemplary protocol that stands out to allow the disembodied and safe transfer of unknown quantum states using quantum entanglement and classical communication as resources. Recent progress in quantum computation with superconducting circuits has led to quantum communication between spatially separated superconducting processes functioning at microwave length frequencies. Methods to achieve this communication task includes the propagation of two-mode squeezed (TMS) microwaves to entangle remote qubits and teleport microwave states to interface between remote superconducting systems. Fedorov et al. demonstrated the deterministic QT of coherent microwave states by exploring two-mode squeezing and analog feedforward across a distance of 0.

Continue reading “Experimental quantum teleportation of propagating microwaves” »

Jan 4, 2022

How DevOps platform Zeet accelerates application deployment

Posted by in categories: finance, robotics/AI, security

Today, technical decision-makers at companies, whether big or small, try to look for flexible ways to speed up application development and ensure long-term scalability for their engineering teams. Configuring solutions such as AWS requires a team of in-house experts, which is expensive and takes time to build. In fact, more than 77% of all tech companies run into DevOps challenges across the board, including cost, risks, security, optimization of the deployment pipeline, and scaling.

San Francisco-based Zeet, a platform that solves DevOps challenges and accelerates application deployment for startups, has raised $2 million in a seed round of funding led by venture capital firm Race Capital. The company plans to use the funding, which also saw participation from GGV Capital, Founders Inc, and multiple engineering leaders, to build out its teams across areas ranging from engineering to marketing and meet growing demand from customers.

Founded in 2020 by Johnny Dallas and Zihao Zhang, Zeet strives to tackle these bottlenecks through automation. The solution connects to a cloud account and automates traditionally manual DevOps tasks, allowing a team to quickly go from code to a scalable application.

Continue reading “How DevOps platform Zeet accelerates application deployment” »

Dec 31, 2021

Faster, safer, more efficient data processing with edge AI

Posted by in categories: robotics/AI, security

The integration of AI into devices will improve the efficiency, security, and speed of data analytics. Edge AI is the future of data.

Dec 26, 2021

The Rise Of The Robotic Working Dog

Posted by in categories: biotech/medical, robotics/AI, security

A number of four-legged robot dogs made by companies like Boston Dynamics, Anybotics and Ghost Robotics have been deployed in the workforce already for applications like inspections, security and public safety among others. At their core, these four-legged robots are mobility platforms that can be equipped with different payloads depending on the type of information that companies want to gather.

Experts predict the insurance industry alone will spend $1.7 billion on robotics systems in 2025. And other industries may follow suit. Amid the pandemic, a tight job market is forcing many companies to turn to automation. A survey done in December of 2020 by McKinsey, showed that 51 percent of respondents in North America and Europe said they had increased investment in new technologies during 2020, not including remote-work technologies.

Continue reading “The Rise Of The Robotic Working Dog” »

Page 1 of 8612345678Last