Archive for the ‘security’ category: Page 22

May 2, 2022

First Dream Chaser vehicle takes shape

Posted by in categories: security, space travel

WASHINGTON — Sierra Space says it is making good progress on its first Dream Chaser spaceplane as the company looks ahead to versions of the vehicle that can carry crews and perform national security missions.

The company provided SpaceNews with images of the first Dream Chaser, named Tenacity, being assembled at its Colorado headquarters. The vehicle’s structure is now largely complete, but there is still more work to install its thermal protection system and other components.

“We have the wings on now. It really looks like a spaceplane,” said Janet Kavandi, president of Sierra Space, during a panel at the AIAA ASCENDx Texas conference in Houston April 28, where she played a video showing work building the vehicle.

May 1, 2022

It’s not rocket science: Why Elon Musk’s Twitter takeover could be bad for privacy

Posted by in categories: Elon Musk, science, security

Apr 26, 2022

Urban-Air Port opens first functional eVTOL vertiport for delivery drones and flying taxis

Posted by in categories: drones, security

Builder of infrastructure for drone delivery and eVTOL air taxi vehicles, Urban-Air Port opens its first fully functional vertiport.

Urban-Air Port, the London-based developer of vertiports for delivery drones and electronic takeoff and landing (eVTOL) vehicles like air taxis, has opened the doors of its first functional aerial hub – one of 200 terminals it plans to build around the globe in the near future.

Continue reading “Urban-Air Port opens first functional eVTOL vertiport for delivery drones and flying taxis” »

Apr 11, 2022

Cloud server leasing can leave sensitive data up for grabs

Posted by in categories: business, computing, engineering, security, space

Renting space and IP addresses on a public server has become standard business practice, but according to a team of Penn State computer scientists, current industry practices can lead to “cloud squatting,” which can create a security risk, endangering sensitive customer and organization data intended to remain private.

Cloud squatting occurs when a company, such as your bank, leases space and IP addresses—unique addresses that identify individual computers or computer networks—on a public server, uses them, and then releases the space and addresses back to the public server company, a standard pattern seen every day. The public server company, such as Amazon, Google, or Microsoft, then assigns the same addresses to a second company. If this second company is a bad actor, it can receive information coming into the address intended for the original company—for example, when you as a customer unknowingly use an outdated link when interacting with your bank—and use it to its advantage—cloud squatting.

“There are two advantages to leasing server space,” said Eric Pauley, doctoral candidate in computer science and engineering. “One is a cost advantage, saving on equipment and management. The other is scalability. Leasing server space offers an unlimited pool of computing resources so, as workload changes, companies can quickly adapt.” As a result, the use of clouds has grown exponentially, meaning almost every website a user visits takes advantage of cloud computing.

Apr 11, 2022

GitHub can now alert of supply-chain bugs in new dependencies

Posted by in category: security

GitHub can now block and alert you of pull requests that introduce new dependencies impacted by known supply chain vulnerabilities.

This is achieved by adding the new Dependency Review GitHub Action to an existing workflow in one of your projects. You can do it through your repository’s Actions tab under Security or straight from the GitHub Marketplace.

It works with the help of an API endpoint that will help you understand the security impact of dependency changes before adding them to your repository at every pull request.

Continue reading “GitHub can now alert of supply-chain bugs in new dependencies” »

Apr 10, 2022

Responsible AI in a Global Context

Posted by in categories: business, economics, governance, policy, robotics/AI, security

CSIS will host a public event on responsible AI in a global context, featuring a moderated discussion with Julie Sweet, Chair and CEO of Accenture, and Brad Smith, President and Vice Chair of the Microsoft Corporation, on the business perspective, followed by a conversation among a panel of experts on the best way forward for AI regulation. Dr. John J. Hamre, President and CEO of CSIS, will provide welcoming remarks.

Keynote Speakers:
Brad Smith, President and Vice Chair, Microsoft Corporation.
Julie Sweet, Chair and Chief Executive Officer, Accenture.

Continue reading “Responsible AI in a Global Context” »

Apr 10, 2022

Warning for Samsung users as pre-installed app could let hacker control phone

Posted by in categories: mobile phones, security

MILLIONS of owners of the Samsung Galaxy smartphone face a security threat.

Those with an Android version 9 through 12 are at risk.

Researchers at Kryptowire published a report detailing how they discovered a serious vulnerability in the pre-installed Phone app across multiple models that could enable a hacker to take control of someone’s phone, Forbes reported.

Apr 10, 2022

Artificial intelligence is already upending geopolitics

Posted by in categories: biotech/medical, ethics, law, nanotechnology, robotics/AI, security

The TechCrunch Global Affairs Project examines the increasingly intertwined relationship between the tech sector and global politics.

Geopolitical actors have always used technology to further their goals. Unlike other technologies, artificial intelligence (AI) is far more than a mere tool. We do not want to anthropomorphize AI or suggest that it has intentions of its own. It is not — yet — a moral agent. But it is fast becoming a primary determinant of our collective destiny. We believe that because of AI’s unique characteristics — and its impact on other fields, from biotechnologies to nanotechnologies — it is already threatening the foundations of global peace and security.

The rapid rate of AI technological development, paired with the breadth of new applications (the global AI market size is expected to grow more than ninefold from 2020 to 2028) means AI systems are being widely deployed without sufficient legal oversight or full consideration of their ethical impacts. This gap, often referred to as the pacing problem, has left legislatures and executive branches simply unable to cope.

Mar 29, 2022

VPNs are digital ‘snake oil,’ expert claims — here’s why

Posted by in category: security

Here’s the true pros and cons of VPNs.

Don’t believe all the exaggerated claims that VPNs make about protecting your privacy and security, experts say.

Mar 24, 2022

Using just a laptop, an encryption code designed to prevent a quantum computer attack was cracked in just 53 hours

Posted by in categories: computing, encryption, quantum physics, security

Tech institutions are trying to find ways to guarantee security as new processing systems becoming increasingly sophisticated.

Page 22 of 111First1920212223242526Last