Menu

Blog

Archive for the ‘security’ category: Page 8

Jul 20, 2024

AI-powered optical detection to thwart counterfeit chips

Posted by in categories: finance, quantum physics, robotics/AI, security, surveillance

The semiconductor industry has grown into a $500 billion global market over the last 60 years. However, it is grappling with dual challenges: a profound shortage of new chips and a surge of counterfeit chips, introducing substantial risks of malfunction and unwanted surveillance. In particular, the latter inadvertently gives rise to a $75 billion counterfeit chip market that jeopardizes safety and security across multiple sectors dependent on semiconductor technologies, such as aviation, communications, quantum, artificial intelligence, and personal finance.

Jul 13, 2024

Microsoft Issues Update Warning For All Outlook Users As ‘Dangerous’ New Threat Confirmed

Posted by in categories: business, security

The range of threats, they say, include “attackers exploit[ing] this vulnerability to gain unauthorized access, execute arbitrary code, and cause substantial damage without any user interaction. The absence of authentication requirements makes it particularly dangerous, as it opens the door to widespread exploitation.”

The repeated reference to “trusted senders” in this warning is important. This vulnerability only carries a zero click threat when an email is received from a trusted source. If the sender is unknown, then the user would need to click to execute. That said, if the problem for an attacker is now spoofing emails from trusted sources that’s a very low bar in today’s world of industrial scale business email compromise.

Jul 9, 2024

New technique offers unprecedented control over light at terahertz frequencies

Posted by in categories: biotech/medical, security

Researchers have developed a novel method for generating structured terahertz light beams using programmable spintronic emitters. This breakthrough offers a significant leap forward in terahertz technology, enabling the generation and manipulation of light with both spin and orbital angular momentum at these frequencies for the first time.

Terahertz radiation lies between microwaves and on the electromagnetic spectrum. It holds great promise for various applications, including security scanners, medical imaging, and ultrafast communication. However, generating and controlling terahertz light effectively has proven challenging.

This new research, published in eLight and led by Prof. Zhensheng Tao, Prof. Yizheng Wu from Fudan University and Prof. Yan Zhang from Capital Normal University, overcomes these limitations by employing programmable spintronic emitters based on exchange-biased magnetic multilayers. These devices consist of thin layers of magnetic and non-magnetic materials that convert laser-induced spin-polarized currents into broadband terahertz radiation.

Jul 8, 2024

How Quantum Computing Is Already Changing the World

Posted by in categories: computing, encryption, quantum physics, security

The power of quantum computing drives a desperate need for quantum encryption. This megatrend is creating a multi-billion-dollar security market.

Jul 8, 2024

Engineers develop advanced optical computing method for multiplexed data processing and encryption

Posted by in categories: computing, encryption, security

Engineers at the University of California, Los Angeles (UCLA) have unveiled a major advancement in optical computing technology that promises to enhance data processing and encryption. The work is published in the journal Laser & Photonics Reviews.

This innovative work, led by Professor Aydogan Ozcan and his team, showcases a reconfigurable diffractive optical network capable of executing high-dimensional permutation operations, offering a significant leap forward in telecommunications and data security applications.

Permutation operations, essential for various applications, including telecommunications and encryption, have traditionally relied on electronic hardware. However, the UCLA team’s advancement uses all-optical diffractive computing to perform these operations in a multiplexed manner, significantly improving efficiency and scalability.

Jul 8, 2024

Flying Qudits: Unlocking New Dimensions of Quantum Communication

Posted by in categories: computing, encryption, internet, quantum physics, security

Researchers have developed a breakthrough method for quantum information transmission using light particles called qudits, which utilize the spatial mode and polarization properties to enable faster, more secure data transfer and increased resistance to errors.

This technology could greatly enhance the capabilities of a quantum internet, providing long-distance, secure communication, and leading to the development of powerful quantum computers and unbreakable encryption.

Scientists have made a significant breakthrough in creating a new method for transmitting quantum information using particles of light called qudits. These qudits promise a future quantum internet that is both secure and powerful.

Jul 7, 2024

China’s Laws of Robotics: Shanghai publishes first humanoid robot guidelines

Posted by in categories: robotics/AI, security

Makers of humanoid robots should guarantee that their products “do not threaten human security” and “effectively safeguard human dignity”, according to a new set of guidelines published in Shanghai during the World Artificial Intelligence Conference (WAIC) on Saturday.

They should also take measures that include setting up risk warning procedures and emergency response systems, as well as give users training on the ethical and lawful use of these machines, according to the guidelines.

Jul 6, 2024

The Mathematics of Reliable Artificial Intelligence

Posted by in categories: mathematics, robotics/AI, security, transportation

By Gitta Kutyniok

The recent unprecedented success of foundation models like GPT-4 has heightened the general public’s awareness of artificial intelligence (AI) and inspired vivid discussion about its associated possibilities and threats. In March 2023, a group of technology leaders published an open letter that called for a public pause in AI development to allow time for the creation and implementation of shared safety protocols. Policymakers around the world have also responded to rapid advancements in AI technology with various regulatory efforts, including the European Union (EU) AI Act and the Hiroshima AI Process.

One of the current problems—and consequential dangers—of AI technology is its unreliability and subsequent lack of trustworthiness. In recent years, AI-based technologies have often encountered severe issues in terms of safety, security, privacy, and responsibility with respect to fairness and interpretability. Privacy violations, unfair decisions, unexplainable results, and accidents involving self-driving cars are all examples of concerning outcomes.

Jul 1, 2024

Multinational fusion energy project marks completion of its most complex magnet system

Posted by in categories: education, nuclear energy, security

After two decades of design, production, fabrication and assembly on three continents, the historic, multinational ITER fusion energy project today celebrates the completion and delivery of its massive toroidal field coils from Japan and Europe.

Masahito Moriyama, Japan’s Minister of Education, Culture, Sports, Science and Technology, and Gilberto Pichetto Fratin, Italy’s Minister of Environment and Energy Security, will attend the ceremony with officials from other ITER members.

Nineteen gigantic toroidal field coils have been delivered to southern France. They will be key components in ITER, the experimental fusion mega-project that will use magnetic confinement to imitate the process that powers the sun and stars and gives Earth light and warmth.

Jul 1, 2024

Bypassing the blood–brain barrier

Posted by in categories: biotech/medical, neuroscience, security

By 2024–06-24T12:55:00

Researchers are on a quest to outsmart and overcome the sophisticated security system of the brain. Julia Robinson reports on some of the approaches being studied.

Page 8 of 146First56789101112Last