Archive for the ‘security’ category: Page 28

May 30, 2022

Top 5 Hottest Blockchain Programming Languages in 2022

Posted by in categories: biotech/medical, blockchains, business, cryptocurrencies, finance, security

Blockchain technology is spreading like fire across industries and businesses. It is currently used in digital voting, medical recordkeeping, decentralized finance, gaming, capital markets, supply chain management, etc. More and more businesses and individual users want to take advantage of blockchain to increase transparency, security, and communication. To leverage blockchain development in innovative use cases, organizations need to comprehend the programming languages best suited for their upcoming projects. Here are the top 5 hottest blockchain programming languages that are being utilized by start-ups and enterprises today.

A high-level programming language is getting more popularity as a blockchain developer language, particularly for dApps development. If you are looking for a language for developing smart contracts on Ethereum Blockchain, Solidity is the one. It is a contract-based language, allowing to store all the logic in the code of the Blockchain.

With amazing code portability, it is the most popular programming language among application developers. It has been used to create smart contracts such as Truffle, ARK, and some of the popular blockchains that are developed using Java include Ethereum, IOTA, NEM, and NEO.

May 28, 2022

What are the security risks of open sourcing the Twitter algorithm?

Posted by in categories: information science, security

May 28, 2022

‘Privacy’ Search Engine DuckDuckGo Smoked Over Hidden Tracking Agreement With Microsoft

Posted by in category: security

ZeroHedge — On a long enough timeline, the survival rate for everyone drops to zero.

DuckDuckGo, the search engine which claims to offer ‘real privacy’ because it doesn’t track searches or store users’ history, has come under fire after a security researcher discovered that the mobile DuckDuckGo browser app contains a third-party tracker from Microsoft.

Researcher Zach Edwards found that while Google and Facebook’s trackers are blocked, trackers related to and were also being allowed through.

Continue reading “‘Privacy’ Search Engine DuckDuckGo Smoked Over Hidden Tracking Agreement With Microsoft” »

May 28, 2022

Neural network-based prediction of the secret-key rate of quantum key distribution

Posted by in categories: quantum physics, robotics/AI, security

For instance, continuous-variable (CV) QKD has its own distinct advantages at a metropolitan distance36,37 due to the use of common components of coherent optical communication technology. In addition, the homodyne38 or heterodyne39 measurements used by CV-QKD have inherent extraordinary spectral filtering capabilities, which allows the crosstalk in wavelength division multiplexing (WDM) channels to be effectively suppressed. Therefore, hundreds of QKD channels may be integrated into a single optical fiber and can be cotransmitted with classic data channels. This allows QKD channels to be more effectively integrated into existing communication networks. In CV-QKD, discrete modulation technology has attracted much attention31,40,41,42,43,44,45,46,47,48,49,50 because of its ability to reduce the requirements for modulation devices. However, due to the lack of symmetry, the security proof of discrete modulation CV-QKD also mainly relies on numerical methods43,44,45,46,47,48,51.

Unfortunately, calculating a secure key rate by numerical methods requires minimizing a convex function over all eavesdropping attacks related with the experimental data52,53. The efficiency of this optimization depends on the number of parameters of the QKD protocol. For example, in discrete modulation CV-QKD, the number of parameters is generally \(1000–3000\) depending on the different choices of cutoff photon numbers44. This leads to the corresponding optimization possibly taking minutes or even hours51. Therefore, it is especially important to develop tools for calculating the key rate that are more efficient than numerical methods.

In this work, we take the homodyne detection discrete-modulated CV-QKD44 as an example to construct a neural network capable of predicting the secure key rate for the purpose of saving time and resource consumption. We apply our neural network to a test set obtained at different excess noises and distances. Excellent accuracy and time savings are observed after adjusting the hyperparameters. Importantly, the predicted key rates are highly likely to be secure. Note that our method is versatile and can be extended to quickly calculate the complex secure key rates of various other unstructured quantum key distribution protocols. Through some open source deep learning frameworks for on-device inference, such as TensorFlow Lite54, our model can also be easily deployed on devices at the edge of the network, such as mobile devices, embedded Linux or microcontrollers.

May 28, 2022

Microsoft finds severe bugs in Android apps from large mobile providers

Posted by in category: security

Microsoft security researchers have found high severity vulnerabilities in a framework used by Android apps from multiple large international mobile service providers.

The researchers found these vulnerabilities (tracked as CVE-2021–42598, CVE-2021–42599, CVE-2021–42600, and CVE-2021–42601) in a mobile framework owned by mce Systems exposing users to command injection and privilege escalation attacks.

The vulnerable apps have millions of downloads on Google’s Play Store and come pre-installed as system applications on devices bought from affected telecommunications operators, including AT&T, TELUS, Rogers Communications, Bell Canada, and Freedom Mobile.

May 28, 2022

Taiwan is worried about the security of its chip industry

Posted by in categories: computing, security

New laws are meant to prevent espionage and leaking.

May 25, 2022

Screencastify Chrome extension flaws allow webcam hijacks

Posted by in category: security

The popular Screencastify Chrome extension has fixed a vulnerability that allowed malicious sites to hijack users’ webcams and steal recorded videos. However, security flaws still exist that could be exploited by unscrupulous insiders.

The vendor acknowledged the cross-site scripting (XSS) vulnerability and promptly fixed it after security researcher Wladimir Palant reported it responsibly on February 14, 2022.

However, the same privacy and security-related risks remain unaddressed, keeping users at potential risk from websites that partner with the Screencastify platform.

May 19, 2022

Holographic Chocolates Look As Beautiful As They Taste

Posted by in categories: holograms, security

Circa 2014

For most of us, even one bite of chocolate is enough to send our taste buds into ecstasy. Now, scientists have concocted a process to make these dark, dulcet morsels look as decadent as they taste.

Switzerland-based company Morphotonix has given traditional Swiss chocolate-making a colorful twist: It’s devised a method to imprint shiny holograms onto the sweet surfaces — sans harmful additives. Which means when you tilt the goodies from side to side, rainbow stars and swirly patterns on the chocolate’s surface dance and shimmer in the light.

Continue reading “Holographic Chocolates Look As Beautiful As They Taste” »

May 19, 2022

Canada to ban China’s Huawei, ZTE from 5G networks

Posted by in categories: government, internet, security

Canada’s government said it would ban the use of the two Chinese telecommunications giants’ 5G gear due to national security concerns. The move follows similar bans in other Western countries.

May 18, 2022

New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack

Posted by in category: security

A group of researchers developed a tool capable of detecting errors in the way applications such as Adobe Acrobat or Microsoft Word process JavaScript code, which has allowed finding a total of 134 security flaws, of which 33 have already received a CVE tracking key.

The tool is called “Cooper”, in reference to the technique known as “Cooperative Mutation” it employees. Xu Peng, a software development specialist and co-author of the tool, explains that tools like the ones mentioned accept information from scripting languages; for example, Acrobat allows JavaScript to manipulate PDF files.

Continue reading “New tool to find vulnerabilities in the way applications like Microsoft Word and Adobe Acrobat process JavaScript: Cooperative mutation attack” »

Page 28 of 119First2526272829303132Last