Menu

Blog

Archive for the ‘security’ category: Page 118

Sep 8, 2016

New Quantum Chip Could Bring Highest Level of Encryption to Any Mobile Device

Posted by in categories: computing, encryption, mobile phones, quantum physics, security

Nice.


“We’ve managed to put quantum-based technology that has been used in high profile science experiments into a package that might allow it to be used commercially.”

Random number generators are crucial to the encryption that protects our privacy and security when engaging in digital transactions such as buying products online or withdrawing cash from an ATM. For the first time, engineers have developed a fast random number generator based on a quantum mechanical process that could deliver the world’s most secure encryption keys in a package tiny enough to use in a mobile device.

Continue reading “New Quantum Chip Could Bring Highest Level of Encryption to Any Mobile Device” »

Sep 8, 2016

Your Next Phone Could Have Quantum Security

Posted by in categories: computing, mobile phones, quantum physics, security

As I mentioned 4 months ago when an article came out stating that this type of concept of a scalable quantum chip was at least 15 years away was bunk; this is again one more example where contributors really need to do their homework and make sure they are speaking to the real folks on the frontlines of QC.


Quantum-based random number generators are now small enough that they could fit in mobile devices.

Read more

Sep 7, 2016

The Science of a New Space Race

Posted by in categories: bioengineering, biotech/medical, economics, health, science, security, space, sustainability

The future frontier for hackers is synthetic biology.


Landmark scientific projects such as the Human Genome Project can encourage international cooperation and bring nations together. However, when security interests and defence research align with the prestige of a landmark project—international competition is all but assured. Synthetic biology is a scientific discipline less than a decade old, and the potential defence and security applications may create a new space race, this time between the USA and China.

The larger concern is not that this race may happen, but that if it does it will politicise and militarise an ethically sensitive area of the life sciences at a time when this frontier technology is critical to maintaining a sustainable world.

Continue reading “The Science of a New Space Race” »

Sep 7, 2016

Amateur biohackers could create a biological weapon, scientist warns

Posted by in categories: bioengineering, biotech/medical, security

Hackers new weapon.


Professor John Parrington, from Oxford University, warns that the security services, including the FBI, are increasingly concerned about the spread of gene editing technology by biohackers.

Read more

Aug 30, 2016

Forget Passwords, This Device Locks Your PC Based On Your Proximity

Posted by in categories: computing, encryption, security

The Gatekeeper keychain uses bluetooth 4.0 technology with an AES encryption method to automatically lock your computer when you walk away.

Every office has that one coworker—that person who sneaks on to your computer and posts absurd messages on your various social media pages. Fortunately, computers come with handy security features and are generally password protected.

Continue reading “Forget Passwords, This Device Locks Your PC Based On Your Proximity” »

Aug 26, 2016

Virtual reality robots could someday TELEPORT juries to crime scenes

Posted by in categories: robotics/AI, security, virtual reality

Virtual reality robots could someday teleport juries to gruesome crime scenes to investigate murders…


Juries are rarely allowed to visit crime scenes.

There are some exceptions, usually in difficult, high-profile murder cases such as the O.J Simpson trial in 1995.

Continue reading “Virtual reality robots could someday TELEPORT juries to crime scenes” »

Aug 25, 2016

Russia More Prey Than Predator to Cyber Firm Wary of China

Posted by in categories: military, security

No surprises here.


(Bloomberg) — While the West sees Russia as a cyber predator, hackers in the East increasingly view it as prey, according to online security company Kaspersky Lab, which says there?s been a sharp spike in attacks from China.

Read more

Aug 25, 2016

Ban Ki-moon: ‘digital technologies like 3D printing have the potential for massive destruction’

Posted by in categories: 3D printing, biological, law, security, space, terrorism

https://youtube.com/watch?v=FGEm1ktRJgk

More on the UN’s concern on the next gen technologies.


UN Photo/Rick Bajornas

Continue reading “Ban Ki-moon: ‘digital technologies like 3D printing have the potential for massive destruction’” »

Aug 24, 2016

World not prepared for biological attacks, new technology threats: Ban Ki-moon

Posted by in categories: 3D printing, bioengineering, biological, government, robotics/AI, security, space

CISO & CSO at many companies are certainly going to have their work cut out for them in the long-term future as more and more new tech such as 3D Printing, Synthetic Bio, etc. are adopted into companies; really brings a new level of security concerns not only in government; but also the private sector.


He pointed out that while there were international organisations to prevent the spread of nuclear and chemical weapons, there was no such agency to deal with biological weapons.

Speaking at the Council debate on weapons of mass destruction (WMD), he sought to expand its definition beyond nuclear, chemical and biological to embrace the threats arising from 21st century science, technology and globalisation.

Continue reading “World not prepared for biological attacks, new technology threats: Ban Ki-moon” »

Aug 24, 2016

The NSA Plans for a Post-Quantum World

Posted by in categories: computing, encryption, government, information science, internet, privacy, quantum physics, security

Hope they’re working with QC researchers in Los Alamos and DARPA; it is the US Government which is known for its silos and multi-layer bureaucracies.


Quantum computing is a novel way to build computers — one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In some cases, the algorithm speedups are extraordinary.

Specifically, a quantum computer using something called Shor’s algorithm can efficiently factor numbers, breaking RSA. A variant can break Diffie-Hellman and other discrete log-based cryptosystems, including those that use elliptic curves. This could potentially render all modern public-key algorithms insecure. Before you panic, note that the largest number to date that has been factored by a quantum computer is 143. So while a practical quantum computer is still science fiction, it’s not stupid science fiction.

Continue reading “The NSA Plans for a Post-Quantum World” »