Menu

Blog

Archive for the ‘security’ category: Page 83

Feb 14, 2020

Study unveils security vulnerabilities in EEG-based brain-computer interfaces

Posted by in categories: information science, robotics/AI, security

Brain-computer interfaces (BCIs) are tools that can connect the human brain with an electronic device, typically using electroencephalography (EEG). In recent years, advances in machine learning (ML) have enabled the development of more advanced BCI spellers, devices that allow people to communicate with computers using their thoughts.

So far, most studies in this area have focused on developing BCI classifiers that are faster and more reliable, rather than investigating their possible vulnerabilities. Recent research, however, suggests that algorithms can sometimes be fooled by attackers, whether they are used in computer vision, speech recognition, or other domains. This is often done using , which are tiny perturbations in data that are indistinguishable by humans.

Researchers at Huazhong University of Science and Technology have recently carried out a study investigating the security of EEG-based BCI spellers, and more specifically, how they are affected by adversarial perturbations. Their paper, pre-published on arXiv, suggests that BCI spellers are fooled by these perturbations and are thus highly vulnerable to adversarial attacks.

Feb 13, 2020

Quantum memories entangled over 50-kilometer cable

Posted by in categories: internet, particle physics, quantum physics, security

A team of researchers affiliated with several institutions in China has succeeded in sending entangled quantum memories over a 50-kilometer coiled fiber cable. In their paper published in the journal Nature, the group describes several experiments they conducted involving entangling quantum memory over long distances, the challenges they overcame, and problems still to be addressed.

Over the past several years, scientists have been working toward the development of a quantum internet—one very much the same as the present-day network, but with much stronger security. One such approach is based on the development of quantum keys that would allow parties to a private conversation to know that an interloper is eavesdropping, because doing so would change the state of the keys. But in such systems, measurements of the quantum state of the keys is required, which can be impacted by , making the approach nearly impractical.

Another approach involves using entangled particles to form a network—but this has proven to be difficult to implement because of the sensitivity of such particles and their short lifespan. But progress is being made. In this new effort, the researchers in China succeeded in entangling between buildings 20 kilometers apart and across 50 kilometers of coiled cable in their lab.

Feb 12, 2020

Spaceflight Industries to sell rideshare business to Japanese firms

Posted by in categories: business, satellites, security

WASHINGTON — Spaceflight Industries announced Feb. 11 it will sell its smallsat rideshare launch business to a pair of Japanese companies, allowing it to focus on its BlackSky geospatial business.

Spaceflight Industries said that Mitsui & Co., Ltd. and Yamasa Co., Ltd. will acquire its rideshare business, known as Spaceflight, Inc., for an undisclosed sum. Mitsui & Co. and Yamasa will own Spaceflight as a 50/50 joint venture. The companies said that they expect the deal to close in the second quarter of this year, after a review by the Committee on Foreign Investment in the United States (CFIUS) to examine any national security implications of the sale.

Spaceflight Industries said it will use the proceeds from the deal to accelerate the growth of BlackSky, its geospatial intelligence business that is developing a constellation of high-resolution imaging satellites. BlackSky has four satellites in orbit currently with another eight scheduled for launch this year.

Feb 11, 2020

These engineers are developing artificially intelligent hackers

Posted by in categories: robotics/AI, security

Circa 2016


In a sign of the autonomous security of the future, a $2m contest wants teams to build a system that can exploit rivals’ vulnerabilities while fixing its own.

Feb 10, 2020

A new device uses AI to identify fake pairs of Nike and Adidas sneakers in seconds. Here’s how it works

Posted by in categories: robotics/AI, security

One of the biggest problems in the sneaker resale market may now be more manageable.

Product authentication technology provider Entrupy on Wednesday released its Legit Check Tech (LCT) solution, a device that uses artificial intelligence to determine whether a sneaker is counterfeit or not — and it only takes about a minute to use.

Fake pairs of popular Nike and Adidas sneakers are rampant in the resale sector. Authorities recently busted a counterfeiting operation that shipped $470 million worth of fake Nikes to the US.

Feb 9, 2020

Information theft via manipulating screen brightness in air-gapped computers

Posted by in categories: computing, internet, security, surveillance

Data can be stolen from an air gapped personal computer just by using variations in screen brightness. Researchers at Ben-Gurion University wrote a paper on it.

As the team defines them, “Air-gapped computers are systems that are kept isolated from the Internet since they store or process .”

Continue reading “Information theft via manipulating screen brightness in air-gapped computers” »

Feb 7, 2020

Dr Tara O’Toole: The CIA, National Security And Preventing The Next Pandemic

Posted by in categories: biotech/medical, health, security

https://www.youtube.com/watch?v=DXo5BVdzZQE

Ira Pastor, ideaXme exponential health ambassador interviews Dr. Tara O’Toole, Executive Vice President and Senior Fellow at In-Q-Tel.

https://www.cia.gov/library/publications/intelligence-history/in-q-tel

Continue reading “Dr Tara O’Toole: The CIA, National Security And Preventing The Next Pandemic” »

Jan 31, 2020

Severe ‘Perfect 10.0’ Microsoft Flaw Confirmed: ‘This Is A Cloud Security Nightmare’

Posted by in category: security

This patched critical flaw is the first remote code execution threat to a major cloud platform, undermining the security layers that isolate shared resources.

Jan 29, 2020

RealityEngines.AI Launches World’s First Autonomous Cloud AI Service

Posted by in categories: business, robotics/AI, security

San Francisco startup RealityEngines. AI has turned off stealth mode and today launched its completely autonomous cloud AI service. It’s all very tedious to the common reader IMO — enterprise-level business stuff — but the technology itself and how it could shape our future in both data and perceived reality should be at least mildly considered.

Here’s how RealityEngines. AI works: using a Neural Architecture Search (NAS) technique called BANANAS, when a user points their data (through an API) to RealityEngines. AI and selects a use case (churn predictions, fraud detection, sales lead forecasting, security threat detection, cloud spend optimization, et al.), the data is attacked by the NAS to create cutting-edge models then refined by a generative adversarial network (GAN) in order to augment sparse or noisy data with synthetic data to further enhance the data modeling. Now that, is bananas.

Continue reading “RealityEngines.AI Launches World’s First Autonomous Cloud AI Service” »

Jan 27, 2020

In a Recent Simulation, a Coronavirus Killed 65 Million People

Posted by in categories: finance, security

Three and a half hours later, the group finished the simulation exercise — and despite their best efforts, they couldn’t prevent the hypothetical coronavirus from killing 65 million people.

The fictional coronavirus at the center of the Event 201 simulation — a collaboration between the Johns Hopkins Center for Health Security, the World Economic Forum, and the Bill and Melinda Gates Foundation — was called CAPS, and it started with pigs in Brazil before spreading to farmers, not unlike how 2019-nCoV reportedly began with animals before spreading to people.

In the simulation, CAPS infected people all across the globe within six months, and by the 18-month mark, it had killed 65 million people and triggered a global financial crisis.

Page 83 of 142First8081828384858687Last