Menu

Blog

Archive for the ‘security’ category: Page 117

Sep 19, 2016

ISARA Corporation Readies Security Measures for the Quantum Age

Posted by in categories: computing, encryption, internet, quantum physics, security

Wireless security and internet standards experts release a complete quantum resistant toolkit for commercial use.

TORONTO, Sept. 19, 2016 /CNW/ — 4TH ETSI/IQC Workshop on Quantum-Safe Cryptography – ISARA Corporation today announced the availability of its ISARA Quantum Resistant (IQR) Toolkit. The toolkit helps software and hardware solution providers build robust commercial products that protect vulnerable infrastructure against the threat quantum computing already poses to widely-used security standards.

Similar to the Y2K crisis, the technology industry is facing a ‘Y2Q’ (years to quantum) challenge that has a limited timeline and requires significant work to ensure systems and information are properly protected. The massive processing power of quantum computers is such that, without integrating quantum resistant security solutions, all security that depends on existing standards is vulnerable.

Read more

Sep 14, 2016

How Russia and the UN are actually planning to take over the Internet

Posted by in categories: internet, security, transportation

Ouch!


According to a countdown clock from Sen. Ted Cruz, there are less than three weeks until the Obama administration puts the Internet at risk from takeover and censorship by China, Russia, and Iran. This conspiratorial fearmongering is, frankly, absurd.

But just because this particular alleged conspiracy is insane doesn’t mean that there is no conspiracy. Of course authoritarian regimes want more control over the Internet, and at this very moment, they are working through the U.N. to get it. But instead of targeting the administration of the domain name system (which, thanks to the so-called “IANA transition” Sen. Cruz opposes, is nearly out of their reach), their chosen vehicle is next-generation Internet standards, particularly an arcane proposal called the Digital Object Architecture (DOA). The best way to stop authoritarian regimes and keep the Internet free is to go through with the transition.

Continue reading “How Russia and the UN are actually planning to take over the Internet” »

Sep 10, 2016

DARPA Wants a ‘Social Supercollider’ To Help It Understand Humans

Posted by in categories: military, security

The Pentagon wants to fundamentally change how social science research is conducted.

The Defense Department uses principles of human behavior to make major decisions affecting national security, but social science is inherently limited, according to the Defense Advanced Research Projects Agency, mostly because social scientists “rarely, if ever, have ground truth” about “actual causes of observed behaviors in the ‘real world.’”

To help mitigate those shortcomings, DARPA is gathering information on ways, and potentially new technology, that can assess how closely social science research methods do represent the real world. Simulations, for instance, could be used to calibrate whether the inferences about human behavior social scientists make when they’re conducting an analysis are valid.

Continue reading “DARPA Wants a ‘Social Supercollider’ To Help It Understand Humans” »

Sep 10, 2016

China to Launch Spacelab Next Week –“1st Step Toward Being the World’s De Facto Space Station”

Posted by in categories: military, security, space

“The vast majority of space technology being developed is dual-use, and so serves Chinese security interests as well,” says Johnson-Freese, an expert on the Chinese space program and a professor at the US Naval War College. “China understands the military advantages reaped by US space capabilities for many years, and wants those same capabilities”.

Read more

Sep 8, 2016

DARPA developing security tools for gene editing

Posted by in categories: bioengineering, biotech/medical, military, security

DARPA’s answer in defending the US from Gene Editing Warfare.


DARPA has announced a new program to develop security procedures and remedial protocols to protect against the misuse of gene editing technologies.

Read more

Sep 8, 2016

New Quantum Chip Could Bring Highest Level of Encryption to Any Mobile Device

Posted by in categories: computing, encryption, mobile phones, quantum physics, security

Nice.


“We’ve managed to put quantum-based technology that has been used in high profile science experiments into a package that might allow it to be used commercially.”

Random number generators are crucial to the encryption that protects our privacy and security when engaging in digital transactions such as buying products online or withdrawing cash from an ATM. For the first time, engineers have developed a fast random number generator based on a quantum mechanical process that could deliver the world’s most secure encryption keys in a package tiny enough to use in a mobile device.

Continue reading “New Quantum Chip Could Bring Highest Level of Encryption to Any Mobile Device” »

Sep 8, 2016

Your Next Phone Could Have Quantum Security

Posted by in categories: computing, mobile phones, quantum physics, security

As I mentioned 4 months ago when an article came out stating that this type of concept of a scalable quantum chip was at least 15 years away was bunk; this is again one more example where contributors really need to do their homework and make sure they are speaking to the real folks on the frontlines of QC.


Quantum-based random number generators are now small enough that they could fit in mobile devices.

Read more

Sep 7, 2016

The Science of a New Space Race

Posted by in categories: bioengineering, biotech/medical, economics, health, science, security, space, sustainability

The future frontier for hackers is synthetic biology.


Landmark scientific projects such as the Human Genome Project can encourage international cooperation and bring nations together. However, when security interests and defence research align with the prestige of a landmark project—international competition is all but assured. Synthetic biology is a scientific discipline less than a decade old, and the potential defence and security applications may create a new space race, this time between the USA and China.

The larger concern is not that this race may happen, but that if it does it will politicise and militarise an ethically sensitive area of the life sciences at a time when this frontier technology is critical to maintaining a sustainable world.

Continue reading “The Science of a New Space Race” »

Sep 7, 2016

Amateur biohackers could create a biological weapon, scientist warns

Posted by in categories: bioengineering, biotech/medical, security

Hackers new weapon.


Professor John Parrington, from Oxford University, warns that the security services, including the FBI, are increasingly concerned about the spread of gene editing technology by biohackers.

Read more

Aug 30, 2016

Forget Passwords, This Device Locks Your PC Based On Your Proximity

Posted by in categories: computing, encryption, security

The Gatekeeper keychain uses bluetooth 4.0 technology with an AES encryption method to automatically lock your computer when you walk away.

Every office has that one coworker—that person who sneaks on to your computer and posts absurd messages on your various social media pages. Fortunately, computers come with handy security features and are generally password protected.

Continue reading “Forget Passwords, This Device Locks Your PC Based On Your Proximity” »