Toggle light / dark theme

Chrome is rolling out an update for Android users that lets them lock their incognito sessions with a password code or biometric info when they exit the app. The feature has been available for iOS users for some time, but now it’s being made available to folks using Chrome on Android.

Users can activate this feature by going to Chrome Settings Privacy & Security and turning on the “Lock incognito tabs when you close Chrome” toggle. So next time when a user exits Chrome, their incognito session will automatically be locked. To unlock the incognito tabs, you can use the biometric unlock on the phone such as a fingerprint unlock or lock code.

An international team of scientists have demonstrated a leap in preserving the quantum coherence of quantum dot spin qubits as part of the global push for practical quantum networks and quantum computers.

These technologies will be transformative to a broad range of industries and research efforts: from the security of information transfer, through the search for materials and chemicals with novel properties, to measurements of fundamental physical phenomena requiring precise time synchronization among the sensors.

Spin-photon interfaces are elementary building blocks for that allow converting stationary quantum information (such as the quantum state of an ion or a solid-state spin qubit) into light, namely photons, that can be distributed over large distances. A major challenge is to find an interface that is both good at storing quantum information and efficient at converting it into light.

Whether we realize it or not, cryptography is the fundamental building block on which our digital lives are based. Without sufficient cryptography and the inherent trust that it engenders, every aspect of the digital human condition we know and rely on today would never have come to fruition much less continue to evolve at its current staggering pace. The internet, digital signatures, critical infrastructure, financial systems and even the remote work that helped the world limp along during the recent global pandemic all rely on one critical assumption – that the current encryption employed today is unbreakable by even the most powerful computers in existence. But what if that assumption was not only challenged but realistically compromised?

This is exactly what happened when Peter Shor proposed his algorithm in 1995, dubbed Shor’s Algorithm. The key to unlocking the encryption on which today’s digital security relies is in finding the prime factors of large integers. While factoring is relatively simple with small integers that have only a few digits, factoring integers that have thousands of digits or more is another matter altogether. Shor proposed a polynomial-time quantum algorithm to solve this factoring problem. I’ll leave it to the more qualified mathematicians to explain the theory behind this algorithm but suffice it to say that when coupled with a quantum computer, Shor’s Algorithm drastically reduces the time it would take to factor these larger integers by multiple orders of magnitude.

Prior to Shor’s Algorithm, for example, the most powerful computer today would take millions of years to find the prime factors of a 2048-bit composite integer. Without Shor’s algorithm, even quantum computers would take such an inordinate amount of time to accomplish the task as to render it unusable by bad actors. With Shor’s Algorithm, this same factoring can potentially be accomplished in a matter of hours.

Is the Head, Nuclear Safety Office, overseeing the development of the DEMO Fusion Reactor (https://euro-fusion.org/programme/demo/), at EUROfusion.

DEMO (DEMOnstration Power Plant) refers to a proposed class of nuclear fusion experimental reactors that are intended to demonstrate the net production of electric power from nuclear fusion.

EUROfusion is a consortium of national fusion research institutes located in the European Union, the UK, Switzerland and Ukraine. It was established in 2014 to succeed the European Fusion Development Agreement (EFDA) as the umbrella organization of Europe’s fusion research laboratories.

Prior to this role, Ms. Elbez-Uzan spent over a decade at the ITER Organization as Head of the Division of Nuclear Safety.

Gene therapies have the potential to treat neurological disorders like Alzheimer’s and Parkinson’s diseases, but they face a common barrier—the blood-brain barrier. Now, researchers at the University of Wisconsin-Madison have developed a way to move therapies across the brain’s protective membrane to deliver brain-wide therapy with a range of biological medications and treatments.

“There is no cure yet for many devastating disorders,” says Shaoqin “Sarah” Gong, UW-Madison professor of ophthalmology and visual sciences and biomedical engineering and researcher at the Wisconsin Institute for Discovery. “Innovative brain-targeted delivery strategies may change that by enabling noninvasive, safe and efficient delivery of CRISPR genome editors that could, in turn, lead to genome-editing therapies for these diseases.”

CRISPR is a molecular toolkit for editing (for example, to correct mutations that may cause disease), but the toolkit is only useful if it can get through security to the job site. The is a membrane that selectively controls access to the brain, screening out toxins and pathogens that may be present in the bloodstream. Unfortunately, the bars some beneficial treatments, like certain vaccines and gene therapy packages, from reaching their targets because in lumps them in with hostile invaders.

Check out all the on-demand sessions from the Intelligent Security Summit here.

For years, encryption has played a core role in securing enterprise data. However, as quantum computers become more advanced, traditional encryption solutions and public-key cryptography (PKC) standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption.

Today, IBM Institute for Business Value issued a new report titled Security in the Quantum Era, examining the reality of quantum risk and the need for enterprise adoption of quantum-safe capabilities to safeguard the integrity of critical applications and infrastructure as the risk of decryption increases.

UK Atomics, a subsidiary of the company applied to the UK Department for Business, Energy and Industrial Strategy (BEIS) for a GDA by the Office for Nuclear Regulation (ONR) and the Environment Agency (EA). This assessment aims to assess the safety, security, and environmental protection aspects of any nuclear power plant design that is intended to be deployed in the UK.

In May 2021, BEIS opened the GDA process to advanced nuclear technologies, including small modular reactors (SMRs). Successful completion of the GDA culminates in the issue of a Design Acceptance Confirmation from the ONR and a Statement of Design Acceptability from the EA. Rolls-Royce SMR was the first vendor to submit an application for a GDA of an SMR design. Its 470 MWe pressurised water reactor design was accepted for review in March 2022. In December, GE Hitachi Nuclear Energy submitted a GDA entry application for its BWRX-300 SMR, and Holtec International has stated its intention to submit an application for its SMR-160 design.

UK Atomics molten salt reactor design uses unpressurised heavy water as a moderator, while the reactor is intended to burn nuclear waste while breeding new fuel from thorium. The company says, with an output of 100 MWt, it is small enough to allow for mass manufacturing and assembly line production.

Check out all the on-demand sessions from the Intelligent Security Summit here.

2022 was a great year for generative AI, with the release of models such as DALL-E 2, Stable Diffusion, Imagen, and Parti. And 2023 seems to follow on that path as Google introduced its latest text-to-image model, Muse, earlier this month.

Like other text-to-image models, Muse is a deep neural network that takes a text prompt as input and generates an image that fits the description. However, what sets Muse apart from its predecessors is its efficiency and accuracy. By building on the experience of previous work in the field and adding new techniques, the researchers at Google have managed to create a generative model that requires less computational resources and makes progress on some of the problems that other generative models suffer from.

Check out all the on-demand sessions from the Intelligent Security Summit here.

Classical machine learning (ML) algorithms have proven to be powerful tools for a wide range of tasks, including image and speech recognition, natural language processing (NLP) and predictive modeling. However, classical algorithms are limited by the constraints of classical computing and can struggle to process large and complex datasets or to achieve high levels of accuracy and precision.

Enter quantum machine learning (QML).