Menu

Blog

Archive for the ‘security’ category: Page 15

Mar 3, 2024

TheNET: ChatGPT, the popular AI-based large language model (LLM) app from OpenAI, has seen levels of user growth unique for many reasons

Posted by in categories: business, policy, robotics/AI, security

For one, it reached over a million users in five days of its release, a mark unmatched by even the most historically popular apps like Facebook and Spotify. Additionally, ChatGPT has seen near-immediate adoption in business contexts, as organizations seek to gain efficiencies in content creation, code generation, and other functional tasks.

But as businesses rush to take advantage of AI, so too do attackers. One notable way in which they do so is through unethical or malicious LLM apps.

Unfortunately, a recent spate of these malicious apps has introduced risk into an organization’s AI journey. And, the associated risk is not easily addressed with a single policy or solution. To unlock the value of AI without opening doors to data loss, security leaders need to rethink how they approach broader visibility and control of corporate applications.

Mar 1, 2024

Google’s AI-First Strategy Brings Vector Support To Cloud Databases

Posted by in categories: robotics/AI, security, space

With an emphasis on AI-first strategy and improving Google Cloud databases’ capability to support GenAI applications, Google announced developments in the integration of generative AI with databases.


AWS offers a broad range of services for vector database requirements, including Amazon OpenSearch Service, Amazon Aurora PostgreSQL-Compatible Edition, Amazon RDS for PostgreSQL, Amazon Neptune ML, and Amazon MemoryDB for Redis. AWS emphasizes the operationalization of embedding models, making application development more productive through features like data management, fault tolerance, and critical security features. AWS’s strategy focuses on simplifying the scaling and operationalization of AI-powered applications, providing developers with the tools to innovate and create unique experiences powered by vector search.

Azure takes a similar approach by offering vector database extensions to existing databases. This strategy aims to avoid the extra cost and complexity of moving data to a separate database, keeping vector embeddings and original data together for better data consistency, scale, and performance. Azure Cosmos DB and Azure PostgreSQL Server are positioned as services that support these vector database extensions. Azure’s approach emphasizes the integration of vector search capabilities directly alongside other application data, providing a seamless experience for developers.

Continue reading “Google’s AI-First Strategy Brings Vector Support To Cloud Databases” »

Mar 1, 2024

Korean researchers develop insect brain-inspired motion detector

Posted by in categories: neuroscience, security

The new semiconductor is expected to have some important applications in things like transportation and security systems in both industry and the public.

Korean researchers have developed a new “intelligent sensor” semiconductor that works similarly to the optic nerves of insects.

Continue reading “Korean researchers develop insect brain-inspired motion detector” »

Mar 1, 2024

Scientists Develop a Technique to Protect a Quantum-era Metaverse

Posted by in categories: computing, encryption, quantum physics, security

A team of Chinese scientists introduced a quantum communication technique that they say could help secure Web 3.0 against the formidable threat of quantum computing.

Their approach, called Long-Distance Free-Space Quantum Secure Direct Communication (LF QSDC), promises to improve data security by enabling encrypted direct messaging without the need for key exchange, a method traditionally vulnerable to quantum attacks.

They add the approach not only enhances security but also aligns with the decentralized ethos of Web 3.0, offering a robust defense in the rapidly evolving digital landscape.

Feb 25, 2024

Texas’s San Antonio airport will get a 420lb autonomous security robot

Posted by in categories: robotics/AI, security, transportation

The robot, which weighs 420lbs, stands at 5ft 4in and travels at 3 miles per hour, is expected to make its appearance at the airport in the next two months, according to local reports.

According to Knightscope, the K5 is intended for outdoor use and features autonomous recharging without requiring human intervention. Features listed on Knightscope’s website include 360-degree and eye-level video streaming, people detection during certain restricted hours, thermal anomaly detection, as well as license plate recognition.

The city’s director of airports, Jesus Saenz, said that the K5 will be used to respond to door alarms at the airport and will be placed near doors with alarms that are frequently set off.

Feb 23, 2024

SentinelOne Singularity Data Lake Data Sheet

Posted by in categories: business, security, singularity

Singularity Data Lake empowers businesses to centralize and transform data into actionable intelligence for cost-effective, high-performance security and log analytics. The unified, AI-powered platform converges SIEM, XDR, and analytics solutions, creating a comprehensive security and log data ecosystem.

Feb 21, 2024

Quantum annealers and the future of prime factorization

Posted by in categories: encryption, information science, quantum physics, security

Researchers at the University of Trento, Italy, have developed a novel approach for prime factorization via quantum annealing, leveraging a compact modular encoding paradigm and enabling the factorization of large numbers using D-Wave quantum devices.

Prime factorization is the procedure of breaking down a number into its prime components. Every integer greater than one can be uniquely expressed as a product of prime numbers.

In cryptography, prime factorization holds particular importance due to its relevance to the security of encryption algorithms, such as the widely used RSA cryptosystem.

Feb 20, 2024

New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics

Posted by in category: security

Malicious packages lurking in open-source repositories. Discover how DLL side-loading is the latest technique used to evade security software.

Feb 20, 2024

Your fingerprints can be recreated from the sounds made when you swipe on a touchscreen — Chinese and US researchers show new side channel can reproduce fingerprints to enable attacks

Posted by in categories: privacy, security

An interesting new attack on biometric security has been outlined by a group of researchers from China and the US. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound [PDF] proposes a side-channel attack on the sophisticated Automatic Fingerprint Identification System (AFIS). The attack leverages the sound characteristics of a user’s finger swiping on a touchscreen to extract fingerprint pattern features. Following tests, the researchers assert that they can successfully attack “up to 27.9% of partial fingerprints and 9.3% of complete fingerprints within five attempts at the highest security FAR [False Acceptance Rate] setting of 0.01%.” This is claimed to be the first work that leverages swiping sounds to infer fingerprint information.

Biometric fingerprint security is widespread and widely trusted. If things continue as they are, it is thought that the fingerprint authentication market will be worth nearly $100 billion by 2032. However, organizations and people have become increasingly aware that attackers might want to steal their fingerprints, so some have started to be careful about keeping their fingerprints out of sight, and become sensitive to photos showing their hand details.

Feb 20, 2024

WordPress Bricks Theme Under Active Attack: Critical Flaw Impacts 25,000+ Sites

Posted by in category: security

A critical security flaw in the Bricks theme for WordPress is being actively exploited by threat actors to run arbitrary PHP code on susceptible installations.

The flaw, tracked as CVE-2024–25600 (CVSS score: 9.8), enables unauthenticated attackers to achieve remote code execution. It impacts all versions of the Bricks up to and including 1.9.6.

It has been addressed by the theme developers in version 1.9.6.1 released on February 13, 2024, merely days after WordPress security provider Snicco reported the flaw on February 10.

Page 15 of 146First1213141516171819Last