Toggle light / dark theme

A team of security researchers at Georgia Tech, the University of Michigan and Ruhr University Bochum in Germany has reported a new form of side-channel attack that capitalizes on power and speed management methods used by graphics processing units and systems on a chip (SoCs).

The researchers demonstrated how they could steal by targeting data released by the Dynamic Voltage and Frequency Scaling (DVFS) mechanisms found on most modern chips.

As manufacturers race to develop thinner and more energy-efficient devices, they must train their sights on constructing SoCs that balance power consumption, heat generation and processing speed.

SAN FRANCISCO, June 1 (Reuters) — Hackers have stolen data from the systems of a number of users of the popular file transfer tool MOVEit Transfer, U.S. security researchers said on Thursday, one day after the maker of the software disclosed that a security flaw had been discovered.

Software maker Progress Software Corp (PRGS.O), after disclosing the vulnerability on Wednesday, said it could lead to potential unauthorized access into users’ systems.

The managed file transfer software made by the Burlington, Massachusetts-based company allows organizations to transfer files and data between business partners and customers.

Fun thought experiment today:


What if today’s ultra-wealthy— the Musks, Bezoses, and Zuckerbergs of the world— decided to demonstrate the true extent of what AI can do today? What if money were no object? Let’s think about some ambitious, albeit costly, applications of current AI technologies that are already within our grasp.

Personal Protection Army

In the realm of personal security, AI-driven technology offers a tantalizing glimpse into the future. Imagine a scenario where, instead of a cadre of bodyguards, a personal drone swarm follows you around, providing an unprecedented level of safety and protection.

Security guards are extremely useful, some would say necessary. But they can be quite expensive and there simply aren’t enough of them to put them everywhere they need to be.

In Europe, people living in Switzerland have been privy to witnessing a patrol bot, developed by a robotics start-up from ETH Zurich called Ascento, that could soon take the place of human security guards. The machine has thus far been successfully acting as a guard for Swiss security firm Securitas AG.

A video released by ETH Zurich shows just how agile the new security guard is, allowing him to patrol many locations without missing a step (pun intended!) Clearly this new bot has got what it takes to monitor many locations and a variety of terrian but can it do so with the attention that a human can provide?

Researchers have developed a quantum key distribution (QKD) system based on integrated photonics that can transmit secure keys at unprecedented speeds. The proof-of-principle experiments represent an important step toward real-world application of this highly secure communication method.

QKD is a well-established method of providing secret keys for secure communication between distant parties. By using the quantum properties of light to generate secure random keys for encrypting and decrypting data, its security is based on the laws of physics, rather than computational complexity like today’s communication protocols.

“A key goal for QKD technology is the ability to simply integrate it into a real-world communications network,” said research team member Rebecka Sax from the University of Geneva in Switzerland. “An important and necessary step toward this goal is the use of integrated photonics, which allows to be manufactured using the same semiconductor technology used to make silicon computer chips.”

The spacecraft that the Indian Space Research Organization (ISRO) hopes to land on the moon later this year, has been wheeled into the country’s spaceport, Satish Dhawan Space Centre, WION has learnt.

Named as Chandrayaan-3 (Sanskrit for Moon Vehicle-3), this will be India’s third lunar mission and will attempt both controlled soft-landing on the lunar surface and in-situ analysis by the means of a rover.

In the evening hours on Friday, the slow-moving, specialised truck ferrying the spacecraft from UR Rao Satellite Centre in Bengaluru arrived at India’s spaceport, under a security blanket.

Our technological age is witnessing a breakthrough that has existential implications and risks. The innovative behemoth, ChatGPT, created by OpenAI, is ushering us inexorably into an AI economy where machines can spin human-like text, spark deep conversations and unleash unparalleled potential. However, this bold new frontier has its challenges. Security, privacy, data ownership and ethical considerations are complex issues that we must address, as they are no longer just hypothetical but a reality knocking at our door.

The G7, composed of the world’s seven most advanced economies, has recognized the urgency of addressing the impact of AI.


To understand how countries may approach AI, we need to examine a few critical aspects.

Clear regulations and guidelines for generative AI: To ensure the responsible and safe use of generative AI, it’s crucial to have a comprehensive regulatory framework that covers privacy, security and ethics. This framework will provide clear guidance for both developers and users of AI technology.

Public engagement: It’s important to involve different viewpoints in policy discussions about AI, as these decisions affect society as a whole. To achieve this, public consultations or conversations with the general public about generative AI can be helpful.

During its ongoing Think 2023 conference, IBM today announced an end-to-end solution to prepare organisations to adopt quantum-safe cryptography. Called Quantum Safe technology, it is a set of tools and capabilities that integrates IBM’s deep security expertise. Quantum-safe cryptography is a technique to identify algorithms that are resistant to attacks by both classical and quantum computers.

Under Quantum Safe technology, IBM is offering three capabilities. First is the Quantum Safe Explorer to locate cryptographic assets, dependencies, and vulnerabilities and aggregate all potential risks in one central location. Next is the Quantum Safe Advisor which allows the creation of a cryptographic inventory to prioritise risks. Lastly, the Quantum Safe Remidiator lets organisations test quantum-safe remediation patterns and deploy quantum-safe solutions.

In addition, the company has also announced IBM Safe Roadmap, which will serve as the guide for industries to adopt quantum technology. IBM Quantum Safe Roadmap is the company’s first blueprint to help companies in dealing with anticipated cryptographic standards and requirements and protect systems from vulnerabilities.