Menu

Blog

Archive for the ‘security’ category: Page 86

Apr 14, 2020

New electronic cooling technology to enable miniaturization of quantum computers

Posted by in categories: computing, quantum physics, security

VTT researchers have successfully demonstrated a new electronic refrigeration technology that could enable major leaps in the development of quantum computers. Present quantum computers require extremely complicated and large cooling infrastructure that is based on mixture of isotopes of helium. The new electronic cooling technology could replace these cryogenic liquid mixtures and enable miniaturization of quantum computers.

In this purely electrical refrigeration method, and thermal isolation operate effectively through the same point like junction. In the experiment the researchers suspended a piece of silicon from such junctions and refrigerated the object by feeding electrical current from one junction to another through the piece. The current lowered the thermodynamic temperature of the silicon object as much as 40% from that of the surroundings. This could lead to the miniaturization of future quantum computers, as it can simplify the required cooling infrastructure significantly. The discovery has been published in Science Advances.

“We expect that this newly discovered electronic cooling method could be used in several applications from the miniaturization of quantum computers to ultra-sensitive radiation sensors of the security field,” says Research Professor Mika Prunnila from VTT Technical Research Centre of Finland.

Apr 10, 2020

Billions Of Google Chrome Users Now Have Another Surprising Option

Posted by in categories: bitcoin, internet, security

Google Chrome has dominated the internet browser market for the last decade with a staggering near-60% market share and users stretching into the billions.

Rivals to Google Chrome, including Apple’s Safari, Microsoft’s Edge (formerly known as Internet Explorer), and Mozilla’s Firefox have largely failed to convince users to switch—but browser choices are becoming more complex.

Users’ desire for greater security, better privacy, and an ill-defined need to “take back control” from the likes of Google and Microsoft has opened the door for alternatives—including blockchain-based privacy browser Brave, whose chief executive thinks Google “is going to be taken apart over coming years.”

Apr 8, 2020

Attackers can bypass fingerprint authentication with an ~80% success rate

Posted by in categories: mobile phones, security

Although hackers managed to defeat TouchID with a fake fingerprint less than 48 hours after the technology was rolled out in the iPhone 5S, fingerprint-based authentication over the past few years has become much harder to defeat. Today, fingerprints are widely accepted as a safe alternative over passwords when unlocking devices in many, but not all, contexts.

A study published on Wednesday by Cisco’s Talos security group makes clear that the alternative isn’t suitable for everyone—namely those who may be targeted by nation-sponsored hackers or other skilled, well-financed, and determined attack groups. The researchers spent about $2,000 over several months testing fingerprint authentication offered by Apple, Microsoft, Samsung, Huawei, and three lock makers. The result: on average, fake fingerprints were able to bypass sensors at least once roughly 80 percent of the time.

The percentages are based on 20 attempts for each device with the best fake fingerprint the researchers were able to create. The results may not be fully applicable to Apple products since they limit users to five attempts before asking for the PIN or password. Other products tested permitted significantly more or even an unlimited number of unsuccessful tries.

Apr 7, 2020

DARPA seeks enhanced low-light navigation performance for unmanned systems

Posted by in categories: robotics/AI, security

A new programme from the US Defense Advanced Research Projects Agency (DARPA) aims to address a key weakness of autonomous and semi-autonomous land systems: the need for active illumination to navigate in low-light conditions.

Unmanned systems rely on active illumination — anything that emits light or electromagnetic radiation, such as light detection and ranging (LIDAR) systems — to navigate at night or underground.

However, according to Joe Altepeter, programme manager in DARPA’s Defense Sciences Office, this approach creates significant security concerns, as such emissions could be detected by potential adversaries.

Apr 7, 2020

Email provider got hacked, data of 600,000 users now sold on the dark web

Posted by in category: security

Italian email provider Email.it confirms security breach.

Mar 30, 2020

The Next Pandemic Will Be Arriving Shortly

Posted by in categories: biotech/medical, government, health, security

Circa 2018: In January 2017, while one of us was serving as a homeland security advisor to outgoing President Barack Obama, a deadly pandemic was among the scenarios that the outgoing and incoming U.S. Cabinet officials discussed in a daylong exercise that focused on honing interagency coordination and rapid federal response to potential crises. The exercise is an important element of the preparations during transitions between administrations, and it seemed things were off to a good start with a commitment to continuity and a focus on biodefense, preparedness, and the Global Health Security Agenda—an initiative begun by the Obama administration to help build health security capacity in the most critically at-risk countries around the world and to prevent the spread of infectious disease. But that commitment was short-lived.


Deadly diseases like Ebola and the avian flu are only one flight away. The U.S. government must start taking preparedness seriously.

Mar 28, 2020

US Space Force launches first national security mission

Posted by in categories: biotech/medical, security, space

The United Launch Alliance Atlas 5 rocket was launched from Cape Canaveral, Florida.

The launch was delayed by an hour due to a ground hydraulics issue.

The public viewing area was closed to the public due to the coronavirus pandemic.

Mar 25, 2020

A nanoscale device to generate high-power terahertz waves

Posted by in categories: biotech/medical, health, nanotechnology, security, sustainability

Terahertz (THz) waves fall between microwave and infrared radiation in the electromagnetic spectrum, oscillating at frequencies of between 100 billion and 30 trillion cycles per second. These waves are prized for their distinctive properties: they can penetrate paper, clothing, wood and walls, as well as detect air pollution. THz sources could revolutionize security and medical imaging systems. What’s more, their ability to carry vast quantities of data could hold the key to faster wireless communications.

THz waves are a type of non-ionizing radiation, meaning they pose no risk to human health. The technology is already used in some airports to scan passengers and detect dangerous objects and substances.

Despite holding great promise, THz waves are not widely used because they are costly and cumbersome to generate. But new technology developed by researchers at EPFL could change all that. The team at the Power and Wide-band-gap Electronics Research Laboratory (POWERlab), led by Prof. Elison Matioli, built a nanodevice that can generate extremely high-power signals in just a few picoseconds, or one trillionth of a second, which produces high-power THz waves.

Mar 22, 2020

Millions of Americans are suddenly working from home. That’s a huge security risk

Posted by in categories: biotech/medical, business, computing, government, internet, mobile phones, security

As they increasingly log on from home, Americans are having to meld their personal technology with professional tools at unprecedented scale. For employers, the concern isn’t just about capacity, but also about workers introducing new potential vulnerabilities into their routine — whether that’s weak passwords on personal computers, poorly secured home WiFi routers, or a family member’s device passing along a computer virus.


The dramatic expansion of teleworking by US schools, businesses and government agencies in response to the coronavirus is raising fresh questions about the capacity and security of the tools many Americans use to connect to vital workplace systems and data.

At one major US agency, some officials have resorted to holding meetings on iPhone group calls because the regular conference bridges haven’t always been working, according to one federal employee. But the workaround has its limits: The group calls support only five participants at a time, the employee noted.

Continue reading “Millions of Americans are suddenly working from home. That’s a huge security risk” »

Mar 19, 2020

Making Sense with Sam Harris #191 — Early Thoughts On a Pandemic (with Amesh Adalja)

Posted by in categories: biotech/medical, government, health, security, terrorism

Sam Harris discusses the coronavirus withAmesh Adalja.


In this episode of the podcast, Sam Harris speaks with Amesh Adalja about the spreading coronavirus pandemic. They discuss the contagiousness of the virus and the severity of the resultant illness, the mortality rate and risk factors, vectors of transmission, how long coronavirus can live on surfaces, the importance of social distancing, possible anti-viral treatments, the timeline for a vaccine, the importance of pandemic preparedness, and other topics.

Continue reading “Making Sense with Sam Harris #191 — Early Thoughts On a Pandemic (with Amesh Adalja)” »

Page 86 of 148First8384858687888990Last