Menu

Blog

Archive for the ‘internet’ category: Page 266

Mar 14, 2017

Your brain is unique – here’s how it could be used as the ultimate security password

Posted by in categories: finance, internet, mobile phones, neuroscience, privacy, security

Biometrics – technology that can recognise individuals based on physical and behavioural traits such as their faces, voices or fingerprints – are becoming increasingly important to combat financial fraud and security threats. This is because traditional approaches, such as those based on PIN numbers or passwords, are proving too easily compromised. For example, Barclays has introduced TouchID, whereby customers can log onto internet banking using fingerprint scanners on mobile phones.

However, this is not foolproof either – it is possible to forge such biometrics. Fingers can after all be chopped off and placed by impostors to gain fraudulent access. It has also been shown that prints lifted from glass using cellophane tape can be used with gelatine to create fake prints. So there is a real need to come up with more advanced biometrics that are difficult or impossible to forge. And a promising alternative is the brain.

Emerging biometric technology based on the electrical activity of the brain have indeed shown potential to be fraud resistant. Over the years, a number of research studies have found that “brainprints” (readings of how the brain reacts to certain words or tasks) are unique to individuals as each person’s brain is wired to think differently. In fact, the brain can be used to identify someone from a pool of 102 users with more than 98% accuracy at the moment, which is very close to that of fingerprints (99.8% accuracy).

Read more

Mar 11, 2017

Artificial intelligence given priority development status

Posted by in categories: internet, robotics/AI

“We will implement a comprehensive plan to boost strategic emerging industries,” said Premier Li Keqiang in his delivery at the annual parliamentary session in Beijing over the weekend.

“We will accelerate research & development (R&D) on, and the commercialisation of new materials, artificial intelligence (AI), integrated circuits, bio-pharmacy, 5G mobile communications, and other technologies.”


One analyst now projecting industry in China to grow by more than 50 per cent in value to US$5.5 billion by 2018.

Continue reading “Artificial intelligence given priority development status” »

Mar 7, 2017

IBM Is Rolling Out the World’s First Universal ‘Quantum Computing’ Service

Posted by in categories: computing, internet, quantum physics

IBM esta anunciando que estão desenvolvendo um sistema universal de “computação qu ntica”

O serviço será chamado IBM Q, e ele dará às pessoas acesso ao seu computador qu ntico de estágio inicial pela internet para usar como desejar — por uma taxa.

O grande elefante na sala é que, por enquanto, o computador qu ntico da IBM só funciona com cinco qubits, então não é muito mais rápido (se houver mais rápido) do que um computador convencional.

Continue reading “IBM Is Rolling Out the World’s First Universal ‘Quantum Computing’ Service” »

Mar 6, 2017

Hard drives of the future could be made of DNA

Posted by in categories: biotech/medical, computing, internet, mathematics

Our data-driven society is churning out more information than traditional storage technology can handle, so scientists are looking for a solution in Nature’s hard drive: DNA. A pair of researchers at Columbia University and the New York Genome Center recently wrote a full computer operating system, an 1895 French film, an Amazon gift card and other files into DNA strands and retrieved them without errors, according to a study published in the latest edition of Science.

There are several advantages to using DNA. It’s a lot smaller than traditional media; a single gram can fit 215,000 times more data than a one terabyte hard drive, The Atlantic notes. It’s also incredibly durable. Scientists are using DNA thousands of years old to de-extinct wooly mammoths, for example. But, until now, they’ve only unlocked a fraction of its storage capacity. Study coauthors Yaniv Erlich and Dina Zielinski were able to fit the theoretical maximum amount of information per nucleotide using a new method inspired by how movies stream across the internet.

“We mapped the bits of the files to DNA nucleotides. Then, we synthesized these nucleotides and stored the molecules in a test-tube,” Erlich explained in an interview with ResearchGate. “To retrieve the information, we sequenced the molecules. This is the basic process. To pack the information, we devised a strategy—called DNA Fountain—that uses mathematical concepts from coding theory. It was this strategy that allowed us to achieve optimal packing, which was the most challenging aspect of the study.”

Continue reading “Hard drives of the future could be made of DNA” »

Mar 6, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

Posted by in categories: cybercrime/malcode, drones, encryption, internet, mobile phones

Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

Read more

Mar 3, 2017

What Fraction of Bitcoin Value is Driven by Speculators?

Posted by in categories: bitcoin, cryptocurrencies, economics, internet

At Quora, I occasionally play, “Ask the expert”. Several hundred of my Quora answers are linked here. Today, I was asked “How much of Bitcoin’s value is driven by speculation”. This is my answer…


This is a great question! While the value of any commodity is determined by supply and demand, speculation is one component of demand. Another is the unique utility value inherent in a product or process. This is sometimes called ‘intrinsic value’.

It’s ironic that when a high fraction of value is driven by speculation, short-term value becomes volatile and long-term value becomes less certain—and less likely to produce returns for those same speculators.

Editor’s Note: In the past few weeks, a significant spike in Bitcoin’s value and trading volume relates to a pending regulatory decision expected at the end of next week. This activity is certainly driven by speculation. But for this article, I am considering periods in which the demands of individual events are less clear.

Continue reading “What Fraction of Bitcoin Value is Driven by Speculators?” »

Mar 1, 2017

Mathematician breaks down how to defend against quantum computing attacks

Posted by in categories: computing, encryption, internet, mathematics, quantum physics

The encryption codes that safeguard internet data today won’t be secure forever.

Future quantum computers may have the and algorithms to crack them.

Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality.

Read more

Feb 25, 2017

Canada to Spend $750 Million to Ensure All Citizens Have Internet Access

Posted by in categories: government, internet, mobile phones

In Brief

  • Canada is spending millions to ensure all citizens have access to home internet with download speeds of at least 50Mbps and upload speeds of 10Mbps in the next 10 to 15 years.
  • At a time when so many things we used to do in person or via a physical medium are done digitally, living without the internet inherently puts a person at a disadvantage.

Canada is making some major moves to ensure that every citizen in the country has access to fast broadband speeds. The Canadian Radio-Television and Telecommunications Commission (CRTC) announced this week that it was setting up a fund of $750 million available over the next five years to expand internet access.

The CRTC is implementing a standard of universal availability of home internet with download speeds of at least 50Mbps and upload speeds of 10Mbps with the option of unlimited data. In doing so, the Canadian government is declaring that broadband internet is a basic telecommunications service, akin to phone service.

Continue reading “Canada to Spend $750 Million to Ensure All Citizens Have Internet Access” »

Feb 25, 2017

Is Quantum Networking The End of Man-in-the-Middle Attacks?

Posted by in categories: internet, quantum physics, security

I currently have a lot of exciting information security writing and research that I’m engaged in. I’m eager to publish my ongoing work for my loyal readership! Meanwhile, if you really enjoy my writing for Tripwire, Alienvault, and Medium, consider supporting my Patreon. Like most people who write for the Internet for a living, I make very little money. Helping me buy groceries and public transit fare goes a long way, and every little bit counts. Thank you!

Read more

Feb 24, 2017

IOTA — Next Generation Blockchain

Posted by in categories: bitcoin, business, internet

A new world is coming — been waiting for a while. Glad we’re finally seeing the promotion.


As Internet-of-Things keep expanding the need for interoperability and sharing of resources become a necessity. IOTA enables companies to explore new business-2-business models by making every technological resource a potential service to be traded on an open market in real time, with no fees.

Read more