Menu

Blog

Page 7

Aug 16, 2022

Plasma reactors could create oxygen on Mars

Posted by in category: space

Approach splits atmospheric carbon dioxide, but still has kinks to work out.

Aug 16, 2022

The problem with our cybersecurity problem

Posted by in category: cybercrime/malcode

We’ve got a cybersecurity problem, but it’s not the one we think we have. The problem is how we think about cybersecurity problems.


Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

The problem is not that there are problems. The problem is expecting otherwise and thinking that having problems is a problem.

Continue reading “The problem with our cybersecurity problem” »

Aug 16, 2022

Breaking: Scientists Have Reversed Time with a Quantum Computer

Posted by in categories: computing, quantum physics

Scientists have reversed the direction of time with a quantum computer.

The breakthrough study seems to contradict basic laws of physics and could alter our understanding of the processes governing the universe.

In a development that also represents a major advance in our understanding of quantum computers, by using electrons and the strange world of quantum mechanics, researchers were able to turn back time in an experiment that is the equivalent of causing a broken rack of pool balls to go back into place.

Continue reading “Breaking: Scientists Have Reversed Time with a Quantum Computer” »

Aug 16, 2022

International Space Station: Girl, 8, chats to astronaut on amateur radio

Posted by in category: space

American spaceman Kjell Lindgren says the encounter “may be my favourite so far”.

Aug 16, 2022

Exploit out for critical Realtek flaw affecting many networking devices

Posted by in category: futurism

Exploit code has been released for a critical vulnerability affecting networking devices with Realtek’s RTL819x system on a chip (SoC), which are estimated to be in the millions.

The flaw is identified as CVE-2022–27255 and a remote attacker could exploit it to compromise vulnerable devices from various original equipment manufacturers (OEMs), ranging from routers and access points to signal repeaters.

Aug 16, 2022

Malicious browser extensions targeted almost 7 million people

Posted by in category: futurism

Almost 7 million users have attempted to install malicious browser extensions since 2020, with 70% of those extensions used as adware to target users with advertisements.

The most common payloads carried by malicious web browser extensions during the first half of 2022 belonged to adware families, snooping on browsing activity and promoting affiliate links.

This finding is based on telemetry data collected by Kaspersky, which reports over 1,300,000 attempts by users to install malicious extensions throughout H1 ‘22, an increase compared to last year’s figures.

Continue reading “Malicious browser extensions targeted almost 7 million people” »

Aug 16, 2022

Open-source software gives a leg up to robot research

Posted by in category: robotics/AI

Carnegie Mellon researchers have developed an open-source software that enables more agile movement in legged robots.

Robots can help humans with tasks like aiding disaster recovery efforts or monitoring the environment. In the case of quadrupeds, robots that walk on four legs, their mobility requires many software components to work together seamlessly. Most researchers must spend much of their time developing lower-level infrastructure instead of focusing on high-level behaviors.

Continue reading “Open-source software gives a leg up to robot research” »

Aug 16, 2022

Uncovering nature’s patterns at the atomic scale in living color

Posted by in categories: information science, mapping, robotics/AI

Color coding makes aerial maps much more easily understood. Through color, we can tell at a glance where there is a road, forest, desert, city, river or lake.

Working with several universities, the U.S. Department of Energy’s (DOE) Argonne National Laboratory has devised a method for creating color-coded graphs of large volumes of data from X-ray analysis. This new tool uses computational data sorting to find clusters related to physical properties, such as an atomic distortion in a . It should greatly accelerate future research on structural changes on the atomic scale induced by varying temperature.

The research team published their findings in the Proceedings of the National Academy of Sciences in an article titled “Harnessing interpretable and unsupervised to address big data from modern X-ray diffraction.”

Aug 16, 2022

ÆPIC and SQUIP Vulnerabilities Found in Intel and AMD Processors

Posted by in category: futurism

Researchers have uncovered details of the ÆPIC and SQUIP vulnerabilities in Intel and AMD processors that allow attackers to obtain secret info.

Aug 16, 2022

New Evil PLC Attack Weaponizes PLCs to Breach OT and Enterprise Networks

Posted by in categories: cybercrime/malcode, robotics/AI

Cybersecurity researchers have elaborated a novel attack technique that weaponizes programmable logic controllers (PLCs) to gain an initial foothold in engineering workstations and subsequently invade the operational technology (OT) networks.

Dubbed “Evil PLC” attack by industrial security firm Claroty, the issue impacts engineering workstation software from Rockwell Automation, Schneider Electric, GE, B&R, Xinje, OVARRO, and Emerson.

Programmable logic controllers are a crucial component of industrial devices that control manufacturing processes in critical infrastructure sectors. PLCs, besides orchestrating the automation tasks, are also configured to start and stop processes and generate alarms.

Page 7 of 7,621First4567891011Last