Menu

Blog

Archive for the ‘security’ category: Page 128

Mar 11, 2016

Digital CMOS Camera Series Boosts Quantum Efficiency (QE) For Breakthrough Photon Detection Capability

Posted by in categories: chemistry, nanotechnology, quantum physics, security

Digital CMOS camera with QE technology with improved photon detection capabilities — now this should interest to many medical departments, researchers, and even for security checkpoint screening.


Hamamatsu Corporation has again raised the bar in scientific CMOS camera performance with the 2016 version of the ORCA-Flash4.0 V2. The increased quantum efficiency (QE), now at a peak of 82%, increases the likelihood of detecting the faintest of signals, helping to answer the question “Is it there?” And, for brighter samples, higher QE translates into shorter exposure times without sacrificing image quality. The ORCA-Flash4.0 V2 opens up new possibilities for imaging in low conditions and improves signal to noise at all light levels.

Since its introduction and evolution, the ORCA-Flash4.0 series has become the favorite scientific CMOS camera of investigators everywhere, powering cutting-edge imaging research in every field from biology and chemistry to astrophysics and nanotechnology. The widespread appeal is due to the vast array of high-performance features: low read noise, large field of view, high dynamic range and fast frame rates. The newly enhanced QE of the “Flash V2” only serves to increase the power and versatility of this game-changing camera.

Continue reading “Digital CMOS Camera Series Boosts Quantum Efficiency (QE) For Breakthrough Photon Detection Capability” »

Mar 10, 2016

There are ways the FBI can crack the iPhone PIN without Apple doing it for them — By Peter Bright | Ars Technica

Posted by in categories: privacy, security

6195928488_e958f9a671_b-640x960

“There may well be approaches that don’t require Apple to build a custom firmware to defeat some of the iPhone’s security measures.”

Read more

Mar 9, 2016

Biometrics Are Coming, Along With Serious Security Concerns

Posted by in categories: privacy, security

Biometric technology can be used for everything from shopping apps to police work, but it brings with it a whole host of privacy concerns.

Read more

Mar 7, 2016

MIT’s new 5-atom quantum computer could make today’s encryption obsolete

Posted by in categories: computing, encryption, quantum physics, security

Much of the encryption world today depends on the challenge of factoring large numbers, but scientists now say they’ve created the first five-atom quantum computer with the potential to crack the security of traditional encryption schemes.

In traditional computing, numbers are represented by either 0s or 1s, but quantum computing relies on atomic-scale units, or “qubits,” that can be simultaneously 0 and 1 — a state known as a superposition that’s far more efficient. It typically takes about 12 qubits to factor the number 15, but researchers at MIT and the University of Innsbruck in Austria have found a way to pare that down to five qubits, each represented by a single atom, they said this week.

Using laser pulses to keep the quantum system stable by holding the atoms in an ion trap, the new system promises scalability as well, as more atoms and lasers can be added to build a bigger and faster quantum computer able to factor much larger numbers. That, in turn, presents new risks for factorization-based methods such as RSA, used for protecting credit cards, state secrets and other confidential data.

Continue reading “MIT’s new 5-atom quantum computer could make today’s encryption obsolete” »

Mar 5, 2016

As Technology Barrels Ahead—Will Ethics Get Left in the Dust?

Posted by in categories: bioengineering, biological, drones, encryption, ethics, finance, robotics/AI, security

Interesting Question to ask.


The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create new legislation. That’s because there really aren’t any existing laws which encompass technologies such as these. The battle is between security and privacy, with Silicon Valley fighting for privacy. The debates in Congress will be ugly, uninformed, and emotional. Lawmakers won’t know which side to pick and will flip flop between what lobbyists ask and the public’s fear du jour. And because there is no consensus on what is right or wrong, any decision they make today will likely be changed tomorrow.

This is a prelude of things to come, not only with encryption technologies, but everything from artificial intelligence to drones, robotics, and synthetic biology. Technology is moving faster than our ability to understand it, and there is no consensus on what is ethical. It isn’t just the lawmakers who are not well-informed, the originators of the technologies themselves don’t understand the full ramifications of what they are creating. They may take strong positions today based on their emotions and financial interests, but as they learn more, they too will change their views.

Continue reading “As Technology Barrels Ahead—Will Ethics Get Left in the Dust?” »

Mar 4, 2016

Quantum Computer Comes Closer to Cracking RSA Encryption

Posted by in categories: computing, encryption, information science, quantum physics, security

Glad to see this article get published because it echoes many of the concerns established around China and Russia governments and their hackers having their infrastructures on Quantum before US, Europe, and Canada. Computer scientists at MIT and the University of Innsbruck say they’ve assembled the first five quantum bits (qubits) of a quantum computer that could someday factor any number, and thereby crack the security of traditional encryption schemes.


Shor’s algorithm performed in a system less than half the size experts expected.

Read more

Mar 2, 2016

Artificial Intelligence Risk — 12 Researchers Weigh in on the Danger’s of Smarter Machines

Posted by in categories: biotech/medical, economics, mobile phones, robotics/AI, security

A realistic article on AI — especially around AI being manipulated by others for their own gain which I have also identified as the real risks with AI.


Artificial intelligence (AI), once the seeming red-headed stepchild of the scientific community, has come a long way in the past two decades. Most of us have reconciled with the fact that we can’t live without our smartphones and Siri, and AI’s seemingly omnipotent nature has infiltrated the nearest and farthest corners of our lives, from robo-advisors on Wall Street and crime-spotting security cameras, to big data analysis by Google’s BigQuery and Watson’s entry into diagnostics in the medical field.

In many unforeseen ways, AI is helping to improve and make our lives more efficient, though the reverse degeneration of human economic and cultural structures is also a potential reality. The Future of Life Institute’s tagline sums it up in succinct fashion: “Technology is giving life the potential to flourish like never before…or to self-destruct.” Humans are the creators, but will we always have control of our revolutionary inventions?

To much of the general public, AI is AI is AI, but this is only part truth. Today, there are two primary strands of AI development — ANI (Artificial Narrow Intelligence) and AGI (Artificial General Intelligence). ANI is often termed “weak AI” and is “the expert” of the pair, using its intelligence to perform specific functions. Most of the technology with which we surround ourselves (including Siri) falls into the ANI bucket. AGI is the next generation of ANI, and it’s the type of AI behind dreams of building a machine that achieves human levels of consciousness.

Continue reading “Artificial Intelligence Risk — 12 Researchers Weigh in on the Danger’s of Smarter Machines” »

Mar 2, 2016

Latest attack against TLS shows the pitfalls of intentionally weakening encryption

Posted by in categories: encryption, government, security

“For the third time in less than a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government”

This could have more than just security gap ripple effects; it could actually be a loophole for any claims/ lawsuits that consumers and others have with various organizations.


For the third time in under a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government.

Continue reading “Latest attack against TLS shows the pitfalls of intentionally weakening encryption” »

Feb 28, 2016

IARPA seeks info on biometric attack detection tech

Posted by in categories: government, privacy, security

Reminder to everyone who loves hearing about what NextGen Technologies that US Government has been working on: March 11th, US IARPA is hosting a conference on “Odin” (detection technologies to ensure biometric security systems can detect when someone is attempting to disguise their biometric identity.)


The Intelligence Advanced Research Projects Activity plans to hold a conference related to a biometric presentation attack detection programme called Odin.

The conference, to be held on 11 March in Washington, will be to provide information on Odin and the research problems the program aims to address, the agency noted.

Continue reading “IARPA seeks info on biometric attack detection tech” »

Feb 27, 2016

Military Cyborgs May Soon Be a Reality

Posted by in categories: biotech/medical, cyborgs, drones, health, internet, military, security

BMI’s (according to DARPA and David Axe) could begin as early as 2017 on humans. The plan is to use stentrodes. Testing has already proven success on sheep. I personally have concerns in both a health (as the article highlighted prone to blood clots) as well as anything connecting via Wi-Fi or the net with hackers trying to challenge themselves to prove anything is hackable; that before this goes live on a person we make sure that we have a more secure hack-resistant net before someone is injured or in case could injure someone else.


Soldiers could control drones with a thought.

Read more