Toggle light / dark theme

Researchers at Penn Engineering have created a chip that outstrips the security and robustness of existing quantum communications hardware. Their technology communicates in “qudits,” doubling the quantum information space of any previous on-chip laser.

Liang Feng, Professor in the Departments of Materials Science and Engineering (MSE) and Electrical Systems and Engineering (ESE), along with MSE postdoctoral fellow Zhifeng Zhang and ESE Ph.D. student Haoqi Zhao, debuted the technology in a recent study published in Nature. The group worked in collaboration with scientists from the Polytechnic University of Milan, the Institute for Cross-Disciplinary Physics and Complex Systems, Duke University and the City University of New York (CUNY).

Researchers at the University of California, Irvine have discovered that the safe operation of a negative pressure room—a space in a hospital or biological research laboratory designed to protect outside areas from exposure to deadly pathogens—can be disrupted by an attacker armed with little more than a smartphone.

According to UCI cyber-physical systems security experts, who shared their findings with attendees at the Association for Computing Machinery’s recent Conference on Computer and Communications Security in Los Angeles, mechanisms that control airflow in and out of biocontainment facilities can be tricked into functioning irregularly by a sound of a particular frequency, possibly tucked surreptitiously into a popular song.

“Someone could play a piece of music loaded on their smartphone or get it to transmit from a television or other audio device in or near a negative room,” said senior co-author Mohammad Al Faruque, UCI professor of electrical engineering and computer science. “If that music is embedded with a tone that matches the of the pressure controls of one of these spaces, it could cause a malfunction and a leak of deadly microbes.”

Machine learning programs mean even encrypted information can give cybercriminals insight into your daily habits.

Smart technology claims to make our lives easier. You can turn on your lights, lock your front door remotely and even adjust your thermostat with the click of a button.

But new research from the University of Georgia suggests that convenience potentially comes at a cost—your personal security.

The community will offer eight different floor plans, ranging from three to four bedrooms and two to three bathrooms. Homes will be powered by rooftop solar panels, include a Ring Video Doorbell Pro, Schlage Encode Smart WiFi deadbolt, a Honeywell Home T6 Pro WiFi smart thermostat and a Wolf Ranch security package.

RELATED: The Georgetown gem that gleams rich with history: Southwestern University

Prices are expected to start from the mid-$400,000s.

A security source has told Sky News that Russia flew €140m in cash to Tehran in exchange for dozens of deadly “suicide drones”.

Moscow also included Western weapons it had captured in Ukraine in the shipment.

There are now fears that Iran could reverse engineer the technology behind the weapons.

#ukraine #skynews #russia #iran #ukrainewar #shahed136

SUBSCRIBE to our YouTube channel for more videos: https://www.youtube.com/skynews.

Follow us on Twitter: https://twitter.com/skynews.

With the help of NASA and Japan, Uganda has officially become a spacefaring nation — and its newly-launched PearlAfricaSat-1 craft has some pretty nifty tech onboard.

As the Uganda-based Nile Post reports, the satellite launched out of NASA’s Mid-Atlantic Regional Spaceport facility in Virginia on the morning of November 7 will not only provide important agricultural and security monitoring features for the developing nation, but will also conduct experiments involving the 3D printing of human tissue.

Per the Ugandan news site, the tissues printed on PearlAfricaSat-1 will be used in research into the effects microgravity has on ovary function — and as Quartz notes in its write-up of the NASA and Japan-supported mission, the microgravity aspect of the experiments is key because “bioprinting” human organs is difficult to achieve with Earth’s gravity.

When Courtney “CJ” Johnson pulls up footage from her Ph.D. dissertation, it’s like she’s watching an attempted break-in on a home security camera.

The intruder cases its target without setting a foot inside, looking for a point of entry. But this intruder is not your typical burglar. It’s a virus.

Filmed over two and a half minutes by pinpointing its location 1,000 times a second, the footage shows a tiny virus particle, thousands of times smaller than a grain of sand, as it lurches and bobs among tightly packed .

In 1994, the computer scientist Peter Shor discovered that if quantum computers were ever invented, they would decimate much of the infrastructure used to protect information shared online. That frightening possibility has had researchers scrambling to produce new, “post-quantum” encryption schemes, to save as much information as they could from falling into the hands of quantum hackers.

Earlier this year, the National Institute of Standards and Technology revealed four finalists in its search for a post-quantum cryptography standard. Three of them use “lattice cryptography” — a scheme inspired by lattices, regular arrangements of dots in space.

Lattice cryptography and other post-quantum possibilities differ from current standards in crucial ways. But they all rely on mathematical asymmetry. The security of many current cryptography systems is based on multiplication and factoring: Any computer can quickly multiply two numbers, but it could take centuries to factor a cryptographically large number into its prime constituents. That asymmetry makes secrets easy to encode but hard to decode.