Menu

Blog

Archive for the ‘security’ category: Page 124

Jun 2, 2016

Network security shifting toward machine learning, quantum computing, predicts expert

Posted by in categories: computing, quantum physics, robotics/AI, security

Very true points by Kharam.


At SC Congress Toronto, Evgeniy Kharam, director and network security solutions architect at Herjavec Group predicted that the future network security was in machine learning, quantum computing and the cloud.

Read more

Jun 2, 2016

DoD to launch info-sharing system to protect against insider threats

Posted by in categories: government, military, security

I could see this for those US Gov. non-classified and even some lower risk classified systems. However, when I had worked in government we found for the “Top Secret” and highly “Classified” systems that the best secured method is to continue to leave these systems unconnected and using those floppy disks to transfer information. Yes it’s dinosaur technology; it has been proven time and time again to be the most reliable and safest until we have QC on a massive scale adopted.


The Defense Department is creating an information-sharing platform that will monitor risks posed by government employees and other individuals in possession of high-level U.S. government security clearance.

The program, known as “Department of Defense (DoD) Component Insider Threat Records System” is part of an executive order signed by President Obama in October 2011. The system aims to prevent leaks of classified government information and will monitor individuals who were granted eligibility to access classified information and those “who have exhibited actual, probable, or possible indications of insider threat behaviors or activities.” This includes National Guard and military reserves personnel, employees, DoD contractors.

Continue reading “DoD to launch info-sharing system to protect against insider threats” »

May 31, 2016

China’s Quantum Satellite Next Month to Make China Communications Difficult to Crack

Posted by in categories: quantum physics, satellites, security

As the world is wary about cyber hackers in China, the next big thing for it is launching an experimental quantum communication satellite in July that was designed by the Chinese Academy of Sciences (CAS), making it first of its kind.

Since quantum communications assure the highest level of security being hard to replicate or separate. Nor can it be reverse engineered as it involves a complex process employing quantum entanglement. Once it is successful, China can be sure that no one can crack into its security networks, making it impossible for any world power to snoop around.

Developed over the last five years, the quantum satellite will be launched from the Jiuquan Satellite Launch Center with four ground stations to track and facilitate communication. Moreover, it will have one space quantum teleportation experiment station, said a report prepared by CAS.

Continue reading “China’s Quantum Satellite Next Month to Make China Communications Difficult to Crack” »

May 28, 2016

Google’s late response to Amazon Echo suggests the future is voice control and virtual reality

Posted by in categories: business, food, robotics/AI, security, virtual reality

The recent Google I/O developer conference at which the company reveals its new products and directions brought with it several surprising announcements that mark significant changes for the way the company approaches its online business.

The first was the admission by Google chief executive, Sundar Pichai, that Amazon had taken the lead in voice-activated devices when it launched Echo last year when he announced the company’s own Google Home, a similar table-top, voice-controlled AI assistant. These devices have been made possible by the rapid improvement of voice-recognition technology and AI fast enough to respond in real time to questions and answers. But under the surface, the devices are deeply integrated with the cloud, and in the case of Echo, Amazon’s online marketplace.

This is significant because Echo now boasts more than 400 different “skills” and connected suppliers through which users can order food, look up calendar appointments, pay credit card bills, search for information and many other things – just by asking with their voice. The ecosystem of companion products around these intelligent assistants is growing too: just by asking, you can switch on the lights in any room, control the thermosat, security system and fire detectors, automate perimeter doors or fences.

Read more

May 21, 2016

Computing a secret, unbreakable key

Posted by in categories: computing, quantum physics, security

Awesome.


What once took months by some of the world’s leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo’s Institute for Quantum Computing, paving the way for fast, secure quantum communication.

Researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo developed the first available software to evaluate the security of any protocol for Quantum Key Distribution (QKD).

Continue reading “Computing a secret, unbreakable key” »

May 14, 2016

Nanotechnology To Make Holographic Applications More Secure And Efficient

Posted by in categories: biotech/medical, encryption, nanotechnology, security

Making Holographic Apps more secured and efficient.


Since its birth, holograms have been extensively used to serve security systems and related purposes. The making of a hologram, dissecting it to pieces and again rejoining the blocks involves a steady orientation of lenses which encodes the information with depth perception that could be deciphered later according to requirement.

It’s hard to imagine a 21st century city running smooth without an immense use of holograms, small or big sized 2D cards with 3D engraved pictures that are present in credit cards, grocery objects, books, biomedical devices and in other objects requiring retrievable information to be stored.

Continue reading “Nanotechnology To Make Holographic Applications More Secure And Efficient” »

May 13, 2016

Pentagon News And Updates: Reveals Amazing Technology; DARPA Enters Pentagon’s Domain With Game Changer Tech For Security

Posted by in categories: military, security

https://youtube.com/watch?v=Gd3tN4H0NjY

Pentagon and DARPA’s path collide to showcase game changing technology.

Read more

May 12, 2016

Advisory Committee expresses Quantum, legacy system concerns

Posted by in categories: military, privacy, quantum physics, security

NSA meets with Silicon Valley execs to voice their concerns over legacy systems being hacked by Quantum technology. Glad they’re talking about it because with the recent advancements in Quantum means it will be available in devices, communications, and platforms a lot sooner than originally projected.


The National Security Telecommunications Advisory Committee (NSTAC) brought together Silicon Valley executives with federal officials at the advisory committee’s annual meeting on Wednesday in Santa Clara, California.

U.S. military and intelligence officials, including Department of Defense Secretary Ash Carter, Department of Homeland Security Secretary Jeh Johnson, and Department of Commerce Secretary Penny Pritzker, attended the advisory committee.

Continue reading “Advisory Committee expresses Quantum, legacy system concerns” »

May 11, 2016

America is ‘dropping cyberbombs’ – but how do they work — By Richard Forno and Anupam Joshi | The Conversation

Posted by in category: security

Soldiers wrapped up day two of an integrated cyber exercise between 4th Battalion, 23rd Infantry, 14th Brigade Engineer Battalion, 201st Expeditionary Military Intelligence Brigade, from Joint Base Lewis-McChord, Wash., supported by cyber augmentees from the 780th Military Intelligence Brigade from Fort Meade, Md., Oct. 21. Cyber information collected during the exercise enabled the Soldiers to isolate and capture a simulated high-value target in a mock village. The training integrates infantry ground units with cyber, signal and human intelligence collection capabilities, which gives units on the modern battlefield a broader capacity to search out and isolate their enemies in real time. (Photo by Capt. Meredith Mathis)

“Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was “dropping cyberbombs,” taking its ongoing battle against the Islamic State group into the online world. Other American officials, including President Barack Obama, have discussed offensive cyber activities, too.”

Read more

May 10, 2016

US investigates security of mobile devices

Posted by in categories: electronics, mobile phones, security

Not saying that the whole Apple situation cause this; it just odd timing.


The Federal Communications Commission and Federal Trade Commission have asked mobile phone carriers and manufacturers to explain how they release security updates amid mounting concerns over security vulnerabilities, the U.S. agencies said on Monday.

The agencies have written to Apple, AT&T and Alphabet, among others, in order “to better understand, and ultimately to improve, the security of mobile devices,” the FCC said.

Continue reading “US investigates security of mobile devices” »