Menu

Blog

Page 6212

Feb 4, 2016

MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack

Posted by in categories: cybercrime/malcode, materials, security

Non-hackable RFIDs


You might not realize it, but radio frequency identification (RFID) tech is everywhere these days. From the cards in your wallet, to inventory control in warehouses, it’s the technology that works behind the scenes to power the world around you. RFID has brought efficiency to complicated industries and makes our tiny devices and everyday carry items speak to each other. But RFID technology has also been very vulnerable to security attacks and information hackers – until now. A team of researchers from MIT and Texas Instruments have developed a new kind of RFID chip that they believe is impossible to hack.

The new RFID chip is made of ferroelectric crystals, which are material made up of molecules arranged in a lattice pattern across three dimensions. Thanks to this unique structure, when you apply electricity to the lattice, each cell can be polarized as either positive or negative, representing the values of a bit of information. Because the cells retain their polarization when the electric field is removed, the chips can store data even when they’re powered off. Texas Instruments developed a series of 3.3-volt capacitors for the chip’s energy source, and 1.5-volt cells for data storage.

Continue reading “MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack” »

Feb 4, 2016

A Deep Learning AI Chip for Your Phone

Posted by in categories: computing, mobile phones, robotics/AI

AI Chip for the phone — the new MIT chip has 168 processing engines with each engine having it’s own dedicated memory bank.


A chip designed to run powerful neural networks for image analysis uses one-tenth the energy a mobile GPU would.

Read more

Feb 4, 2016

U.S. To Rework Arms Control Rule on Exporting Hacker Tools

Posted by in categories: cybercrime/malcode, security

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Feb 4, 2016

DOT&E: Cyber Vulnerabilities Plague Battlefield Comms

Posted by in categories: cybercrime/malcode, military

Cyber is still a challenge for soldiers on the battlefield.


Editor’s Note: This story has been updated to include comment from an industry official.

WASHINGTON — Cyber vulnerabilities continue to plague the Army’s battlefield communications, according to the Pentagon’s top weapons tester, while the service works to harden its network against cyber attacks.

Continue reading “DOT&E: Cyber Vulnerabilities Plague Battlefield Comms” »

Feb 4, 2016

Are you covered? Emerging issues for health care providers under cyber risk insurance

Posted by in categories: biotech/medical, health, law, policy, security

Tough to be a doctor these days — Could be bad news for Providers with limited or no Cyber Risk Coverage.


Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren’t expected to slow down in 2016, Harry Greenspun, director for Deloitte’s Center for Health Solutions, told Bloomberg BNA. One element of a comprehensive strategy to address data security is customized cyber risk insurance. Recent case law supports standing for class action litigants alleging future injuries, which may not be covered by some policy forms. We urge providers to review their cyber risk coverage with the increasing risks and this new case law in mind.

Specifically, it is critical that cyber risk insurance is designed to both: adequately mitigate future harm to those whose private information is compromised as a result of a data breach; and satisfy the full array of damages sought by such third parties, including damages for future injuries resulting from the anticipated improper use of data. These considerations are increasingly important because the policies available in today’s market are not standardized. While many absorb some of the costs associated with notification and fraud monitoring, existing forms may not protect against damages sought for susceptibility to identity theft.

Continue reading “Are you covered? Emerging issues for health care providers under cyber risk insurance” »

Feb 4, 2016

Samsung thinks giant screens on the backs of trucks will make highways safer

Posted by in category: futurism

Great idea until that ADHD kicks in.


What do you think of this idea?

Read more

Feb 4, 2016

Robot Voice Designed To Annoy Telemarketers

Posted by in categories: mobile phones, robotics/AI

Finally, the solution that I been looking for to combat Telemarketers.


TEXAS (CBSNEWS.COM) – We’ve all been there — usually right at dinner time, the phone rings and you pick up only to find out that you have now been roped into an unwanted conversation with a telemarketer. Have you ever wanted to give them a taste of their own medicine? Well, now, a developer is harnessing the power of artificial intelligence to turn the tables and annoy those pesky callers.

The Jolly Roger Telephone Co., from developer Roger Anderson, is a robot voice that answers with “hello?” and keeps the conversation going. When you get a telemarketing call, you manually conference in the robot and then go on about your life. It stays on the line and any time it senses a moment of silence in the conversation, the robot voice jumps in and fills the gap with generic responses like “yes” or “right” or “hang on.”

Continue reading “Robot Voice Designed To Annoy Telemarketers” »

Feb 4, 2016

NASA’s Spirit Mars rover found mysterious growths on Mars that could be the biggest discovery in science

Posted by in categories: alien life, science

VIDEO: Was the Ancient Aliens guy right?

Read more

Feb 4, 2016

Astronauts and Arugula: Using Space-Station Technology to Grow Food — By Davina van Buren | Modern Farmer / smithsonian.com

Posted by in categories: human trajectories, science, space, space travel

infinite-harvest.jpg__800x600_q85_crop

“Unlike other vertical farms that use market-ready technology, Romano developed Infinite Harvest’s proprietary building management system from the ground up, using his knowledge of space habitat design.

Read more

Feb 4, 2016

Wait not in vain | The Economist

Posted by in categories: business, cryonics, human trajectories, science

20160206_STP001_0

“After decades of piecemeal progress, the science of cryogenically storing human organs is warming up”

Read more