Menu

Blog

Archive for the ‘security’ category: Page 34

Feb 17, 2023

Chromo-encryption method uses color to encode information

Posted by in categories: encryption, nanotechnology, security

In a new approach to security that unites technology and art, EPFL researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages.

Cryptography is something of a new field for Olivier Martin, who has been studying the optics of nanostructures for many years as head of the Nanophotonics and Metrology Lab EPFL’s School of Engineering. But after developing some new silver nanostructures in collaboration with the Center of MicroNanoTechnology, Martin and Ph.D. student Hsiang-Chu Wang noticed that these nanostructures reacted to in an unexpected way, which just happened to be perfect for encoding information.

They found that when polarized light was shone through the nanostructures from certain directions, a range of vivid and easily-identifiable colors was reflected back. These different colors could be assigned numbers, which could then be used to represent letters using the standard code ASCII (American Standard Code for Information Interchange). To encode a secret message, the researchers applied a quaternary code using the digits 0, 1, 2 and 3 (as opposed to the more commonly used 0 and 1). The result was a series of four-digit strings composed of different color combinations that could be used to spell out a message, and the method of chromo-encryption was born.

Feb 17, 2023

Catastrophic Contagion, a high-level pandemic exercise in 2022

Posted by in categories: biotech/medical, health, security

The Johns Hopkins Center for Health Security, in partnership with WHO and the Bill & Melinda Gates Foundation, conducted Catastrophic Contagion, a pandemic tabletop exercise at the Grand Challenges Annual Meeting in Brussels, Belgium, on October 23, 2022.

The extraordinary group of participants consisted of 10 current and former Health Ministers and senior public health officials from Senegal, Rwanda, Nigeria, Angola, Liberia, Singapore, India, Germany, as well as Bill Gates, co-chair of the Bill & Melinda Gates Foundation.

The exercise simulated a series of WHO emergency health advisory board meetings addressing a fictional pandemic set in the near future. Participants grappled with how to respond to an epidemic located in one part of the world that then spread rapidly, becoming a pandemic with a higher fatality rate than COVID-19 and disproportionately affecting children and young people.

Feb 17, 2023

Tile Adds Undetectable Anti-Theft Mode to Tracking Devices, With $1 Million Fine If Used for Stalking

Posted by in categories: mobile phones, security

AirTag competitor Tile today announced a new Anti-Theft Mode for Tile tracking devices, which is designed to make Tile accessories undetectable by the anti-stalking Scan and Secure feature.

Scan and Secure is a security measure that Tile implemented in order to allow iPhone and Android users to scan for and detect nearby Tile devices to keep them from being used for stalking purposes. Unfortunately, Scan and Secure undermines the anti-theft capabilities of the Tile because a stolen device’s Tile can be located and removed, something also possible with similar security features added for AirTags.

Feb 17, 2023

6 Quantum Algorithms That Will Change Computing Forever

Posted by in categories: computing, information science, quantum physics, security

Here is a list of some of the most popular quantum algorithms highlighting the significant impact quantum can have on the classical world:

Shor’s Algorithm

Our entire data security systems are based on the assumption that factoring integers with a thousand or more digits is practically impossible. That was until Peter Shor in 1995 proposed that quantum mechanics allows factorisation to be performed in polynomial time, rather than exponential time achieved using classical algorithms.

Feb 16, 2023

Dynatrace strengthens observability intelligence with AutomationEngine, Grail updates

Posted by in categories: business, robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

Massachusetts-headquartered Dynatrace, which provides an intelligence layer to monitor and optimize application development, performance and security, today announced key updates for its core platform, including a new AutomationEngine that enables teams to streamline monitoring and other activity across a variety of workflows.

Developers, security specialists, operations personnel and even business users can tap into the platform. The company made the announcement at its annual cloud observability conference in Las Vegas.

Feb 15, 2023

Hackers start using Havoc post-exploitation framework in attacks

Posted by in category: security

Security researchers are seeing threat actors switching to a new and open-source command and control (C2) framework known as Havoc as an alternative to paid options such as Cobalt Strike and Brute Ratel.

Among its most interesting capabilities, Havoc is cross-platform and it bypasses Microsoft Defender on up-to-date Windows 11 devices using sleep obfuscation, return address stack spoofing, and indirect syscalls.

Like other exploitation kits, Havoc includes a wide variety of modules allowing pen testers (and hackers) to perform various tasks on exploited devices, including executing commands, managing processes, downloading additional payloads, manipulating Windows tokens, and executing shellcode.

Feb 14, 2023

Jasper targets enterprise to expand generative AI beyond generic AI

Posted by in categories: robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

Generative AI has been all the rage in the recent months, but it is typically generic and not specifically focused on the specific needs of any one company.

San Francisco based startup Jasper is aiming to help make generative AI less generic. The company made a series of announcements today at its Gen AI conference.

Feb 14, 2023

CISOs: Self-healing endpoints key to consolidating tech stacks, improving cyber-resiliency

Posted by in categories: robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

Self-healing endpoint platform providers are under pressure to create new solutions to help CISOs consolidate tech stacks while improving cyber-resiliency. CISOs see the potential of self-healing platforms to reduce costs, increase visibility and capture real-time data that quantifies how cyber-resilient they are becoming. And reducing costs while increasing cyber-resilience is the risk profile their boards of directors want.

A self-healing endpoint is one that combines self-diagnostics with the adaptive intelligence to identify a suspected or actual breach attempt and take immediate action to stop it. Self-healing endpoints can shut themselves off, complete a re-check of all OS and application versioning, and then reset themselves to an optimized, secure configuration — all autonomously with no human intervention.

Feb 11, 2023

Generative AI may only be a foreshock to AI singularity

Posted by in categories: robotics/AI, security, singularity

Check out all the on-demand sessions from the Intelligent Security Summit here.

Generative AI, which is based on Large Language Models (LLMs) and transformer neural networks, has certainly created a lot of buzz. Unlike hype cycles around new technologies such as the metaverse, crypto and Web3, generative AI tools such as Stable Diffusion and ChatGPT are poised to have tremendous, possibly revolutionary impacts. These tools are already disrupting multiple fields — including the film industry — and are a potential game-changer for enterprise software.

All of this has led Ben Thompson to declare in his Stratechery newsletter to declare generative AI advances as marking “a new epoch in technology.”

Feb 11, 2023

What is artificial narrow intelligence (ANI)?

Posted by in categories: robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

Hyperbole aside, we have only scratched the surface of what the new technology may eventually become. ChatGPT has the markings of artificial narrow intelligence (ANI). That is, AI that is designed to perform specific tasks.

Page 34 of 142First3132333435363738Last