Toggle light / dark theme

A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data.

As Vice reported three years ago, this stalkerware app was also found leaking real-time screenshots from Android phones.

Described by its developers as an “employee and child monitoring software,” pcTattletale is a consumer-grade spyware solution that was leaking guest details and customer information captured from the hotels’ check-in systems because of an API security vulnerability, according to TechCrunch.

When Descartes said “I think therefore I am” he probably didn’t know that he was answering a security question. Using behavioral or physical characteristics to identify people, biometrics, has gotten a big boost in the EU. The Orwellian sounding HUMABIO (Human Monitoring and Authentication using Biodynamic Indicators and Behavioral Analysis) is a well funded research project that seeks to combine sensor technology with the latest in biometrics to find reliable and non-obtrusive ways to identify people quickly. One of their proposed methods: scanning your brain stem. That’s right, in addition to reading your retinas, looking at your finger prints, and monitoring your voice, the security systems of the future may be scanning your brain.

How could they actually read your brain? What kind of patterns would they use to authenticate your identity? Yeah, that haven’t quite figured that out yet. HUMABIO is still definitely in the “pre-commercial” and “proof of concept” phase. They do have a nice ethics manual to read, and they’ve actually written some “stories” that illustrate the uses of their various works in progress, but they haven’t produced a fieldable instrument yet. In fact, this aspect of the STREP (Specific Targeted Research Project) would hardly be remarkable if we didn’t know more about the available technology from other sources.

A quantum internet would essentially be unhackable. In the future, sensitive information—financial or national security data, for instance, as opposed to memes and cat pictures—would travel through such a network in parallel to a more traditional internet.

Of course, building and scaling systems for quantum communications is no easy task. Scientists have been steadily chipping away at the problem for years. A Harvard team recently took another noteworthy step in the right direction. In a paper published this week in Nature, the team says they’ve sent entangled photons between two quantum memory nodes 22 miles (35 kilometers) apart on existing fiber optic infrastructure under the busy streets of Boston.

“Showing that quantum network nodes can be entangled in the real-world environment of a very busy urban area is an important step toward practical networking between quantum computers,” Mikhail Lukin, who led the project and is a physics professor at Harvard, said in a press release.

Ash carter exchange remarks as prepared.

I’m grateful to be here today with a group of kindred spirits focused on tackling some of the hardest problems we face at the intersection of technology and national security.

Ash Carter devoted his life to working in this arena, and many of you are here because of the impact he had on you and your careers.

Looking to embed analytics in your products but daunted by the complexity and resource demands?Join us to discover how you can rapidly (in days/weeks) deliver value with modern analytics, boosting innovation and increasing revenue through data-driven solutions. Data Experts at Aimpoint Digital and Sigma will explain what modern embedded analytics means and how it:- Empowers developers to swiftly create visualizations and data apps on a composable platform.- Wins customers with extensive data exploration, database writeback, and robust security for multi-tenancy. Register today to leverage data for growth and operational excellence. Act now before losing your competitive edge.

The nuclear reactions that power the stars and forge the elements emerge from the interactions of the quantum mechanical particles, protons and neutrons. Explaining these processes is one of the most challenging unsolved problems in computational physics. As the mass of the colliding nuclei grows, the resources required to model them outpace even the most powerful conventional computers. Quantum computers could perform the necessary computations. However, they currently fall short of the required number of reliable and long-lived quantum bits. This research combined conventional computers and quantum computers to significantly accelerate the prospects of solving this problem.

The Impact

The researchers successfully used the hybrid computing scheme to simulate the scattering of two neutrons. This opens a path to computing nuclear reaction rates that are difficult or impossible to measure in a laboratory. These include reaction rates that play a role in astrophysics and national security. The hybrid scheme will also aid in simulating the properties of other quantum mechanical systems. For example, it could help researchers study the scattering of electrons with quantized atomic vibrations known as phonons, a process that underlies superconductivity.

In 2024, security teams face new opportunities and obstacles, such as escalating geopolitical tensions, stricter compliance mandates, and the rise of generative AI — which will transform the industry in new and unexpected ways.

In the State of Security 2024: The Race to Harness AI, we identify organizations that are pulling ahead of their peers and share key characteristics and findings.

The problem of personal identity is a longstanding philosophical topic albeit without final consensus. In this article the somewhat similar problem of AI identity is discussed, which has not gained much traction yet, although this investigation is increasingly relevant for different fields, such as ownership issues, personhood of AI, AI welfare, brain–machine interfaces, the distinction between singletons and multi-agent systems as well as to potentially support finding a solution to the problem of personal identity. The AI identity problem analyses the criteria for two AIs to be considered the same at different points in time. Two approaches to tackle the problem are proposed: One is based on the personal identity problem and the concept of computational irreducibility, while the other one applies multi-factor authentication to the AI identity problem. Also, a range of scenarios is examined regarding AI identity, such as replication, fission, fusion, switch off, resurrection, change of hardware, transition from non-sentient to sentient, journey to the past, offspring and identity change.

Like Recommend