Menu

Blog

Archive for the ‘security’ category: Page 40

Jun 24, 2022

Biometric authentication using breath

Posted by in categories: chemistry, privacy, robotics/AI, security

An artificial nose, which is combined with machine learning and built with a 16-channel sensor array was found to be able to authenticate up to 20 individuals with an average accuracy of more than 97%.

“These techniques rely on the physical uniqueness of each individual, but they are not foolproof. Physical characteristics can be copied, or even compromised by injury,” explains Chaiyanut Jirayupat, first author of the study. “Recently, human scent has been emerging as a new class of biometric authentication, essentially using your unique chemical composition to confirm who you are.”

The team turned to see if human breath could be used after finding that the skin does not produce a high enough concentration of volatile compounds for machines to detect.

Jun 24, 2022

More than 770 million records available through the Travis CI API: Anyone can extract tokens, secrets, and other credentials associated with services like GitHub, AWS, and Docker Hub

Posted by in category: security

Software development and testing platform Travis CI confirmed the second incident of exposing its users’ data in less than a year. On this occasion, the compromised records include authentication tokens that would allow access to platforms such as AWS, GitHub, and Docker Hub.

According to a report prepared by the firm Aqua Security, tens of thousands of user tokens would have been exposed through the Travis CI API, which contains more than 770 million records with multiple types of credentials belonging to users of free subscriptions.

Continue reading “More than 770 million records available through the Travis CI API: Anyone can extract tokens, secrets, and other credentials associated with services like GitHub, AWS, and Docker Hub” »

Jun 22, 2022

Sniffing out your identity with breath biometrics

Posted by in categories: mobile phones, privacy, robotics/AI, security

Biometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as fingerprint verification and facial recognition are now common features on many of our phones.

Now, researchers have developed a new potential odorous option for the security toolkit: your breath. In a report published in Chemical Communications, researchers from Kyushu University’s Institute for Materials Chemistry and Engineering, in collaboration with the University of Tokyo, have developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath.

Combined with machine learning, this “artificial nose,” built with a 16-channel sensor array, was able to authenticate up to 20 individuals with an average accuracy of more than 97%.

Jun 21, 2022

Quantum Artificial Intelligence | My PhD at MIT

Posted by in categories: information science, quantum physics, robotics/AI, security

Algorithms, Shor’s Quantum Factoring Algorithm for breaking RSA Security, and the Future of Quantum Computing.

▬ In this video ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
I talk about my PhD research at MIT in Quantum Artificial Intelligence. I also explain the basic concepts of quantum computers, and why they are superior to conventional computers for specific tasks. Prof. Peter Shor, the inventor of Shor’s algorithm and one of the founding fathers of Quantum Computing, kindly agreed to participate in this video.

Continue reading “Quantum Artificial Intelligence | My PhD at MIT” »

Jun 20, 2022

Microsoft Lasers Music into Glass for 1000 Years of Storage

Posted by in categories: food, information science, media & arts, nanotechnology, robotics/AI, security

Philip Glass to release a short silence on the matter.


The music vault is a parallel project to the Global Seed Vault (opens in new tab), which keeps the seeds of today’s trees and plants safe for the future, just in case we need to rebuild agriculture for any reason. The vault is located on the island of Spitsbergen, Norwegian territory, within the Arctic circle. It lacks tectonic activity, is permanently frozen, is high enough above sea level to stay dry even if the polar caps melt, and even if the worst happens, it won’t thaw out fully for 200 years. Just to be on the safe side, the main vault is built 120m into a sandstone mountain, and its security systems are said to be robust. As of June 2021, the seed vault had conserved 1,081,026 different crop samples.

The music is to be stored in a dedicated vault in the same mountain used by the seed vault. The glass used is an inert material, shaped into platters 75mm (3 inches) across and 2mm (less than 1/8th of an inch) thick. A laser encodes data in the glass by creating layers of three-dimensional nanoscale gratings and deformations. Machine learning algorithms read the data back by decoding images and patterns created as polarized light shines through the glass. The silica glass platters are fully resistant to electromagnetic pulses and the most challenging of environmental conditions. It can be baked, boiled, scoured and flooded without degradation of the data written into the glass. Tests to see if it really does last many thousands of years, however, can be assumed to be ongoing.

Continue reading “Microsoft Lasers Music into Glass for 1000 Years of Storage” »

Jun 18, 2022

TikTok takes action amid new claims workers in China accessed US users’ data

Posted by in category: security

Jun 14, 2022

Microsoft patches actively exploited Follina Windows zero-day

Posted by in category: security

Microsoft has released security updates with the June 2022 cumulative Windows Updates to address a critical Windows zero-day vulnerability known as Follina and actively exploited in ongoing attacks.

“Microsoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action,” Microsoft said in an update to the original advisory.

“Microsoft recommends installing the updates as soon as possible,” the company further urged customers in a post on the Microsoft Security Response Center.

Jun 14, 2022

Nigeria to require social media platforms to open local offices

Posted by in categories: computing, government, internet, security

Online platforms like Twitter 0, Facebook and Tiktok will be required to register and open offices in Nigeria and appoint contact persons with the government, draft regulations from the information technology development agency show. The code of practice for “interactive computer service platforms/internet intermediaries” was meant to curb online abuse, including disinformation and misinformation, the National Information Technology Development Agency (NITDA) said in the regulations posted on its website.

A statement from the agency’s spokesperson dated June 13 said the regulations were developed with input from Twitter, Facebook, WhatsApp, Instagram, Google and TikTok, among others. The platforms are popular in Nigeria, Africa’s most populous nation with more than 200 million people.

NIDTA said the platforms would be required to provide to users or authorised government agencies relevant information, including for purposing of preserving security and public order. They would also have to file annual reports to NITDA with the number of registered users in Nigeria, number of complaints received and content taken down due to disinformation and misinformation.

Jun 14, 2022

Hackers clone Coinbase, MetaMask mobile wallets to steal your crypto

Posted by in categories: cryptocurrencies, security

Security researchers have uncovered a large-scale malicious operation that uses trojanized mobile cryptocurrency wallet applications for Coinbase, MetaMask, TokenPocket, and imToken services.

The malicious activity has been identified earlier this year in March. Researchers at Confiant named this activity cluster SeaFlower and describe it as “the most technically sophisticated threat targeting web3 users, right after the infamous Lazarus Group.”

In a recent report, Confiant notes that the malicious cryptocurrency apps are identical to the real ones but they come with a backdoor that can steal the users’ security phrase for accessing the digital assets.

Jun 11, 2022

Windows 11 22H2 build 22621 bug shows “hardware security not supported” on supported PCs

Posted by in category: security

The Windows 11 22H2 (Sun Valley 2) RTM build 22,621 has resurrected an old bug whereupon a system gets a “hardware security not supported” message even on PCs that meet the necessary requirements.

Page 40 of 132First3738394041424344Last