Menu

Blog

Archive for the ‘security’ category: Page 126

May 3, 2016

US intelligence awards multimillion dollar grant to Sydney University quantum science lab

Posted by in categories: neuroscience, quantum physics, science, security

All I can say is WOW!!!! US Security Intelligence awards contract to University of Sydney who is also partnering with China. Also, this should send a huge message to the university in the US that Sydney is kicking it.


The US office of the director of national intelligence has awarded a mutlimillion dollar research grant to an international consortium that includes a quantum science laboratory at the University of Sydney.

Read more

Apr 28, 2016

India to require panic buttons on phones

Posted by in categories: computing, economics, law enforcement, mobile phones, policy, security

New requirement if you’re a Smartphone device provider and trying to sell in India.


Starting next year, all mobile phones sold across India must include a panic button, local news outlets are reporting. In addition, by 2018, all cell phones need to come with a built-in GPS chip, so a person in trouble can be more easily found.

“Technology is solely meant to make human life better and what better than using it for the security of women,” communications and IT minister Ravi Shankar Prasad said in a statement, according to The Economic Times. “I have taken a decision that from January 1, 2017, no cell phone can be sold without a provision for panic button and from January 1, 2018, mobile sets should have in-built GPS.”

Continue reading “India to require panic buttons on phones” »

Apr 27, 2016

Researchers create a first frequency comb of time-bin entangled qubits

Posted by in categories: computing, particle physics, quantum physics, security

Quantum mechanics, with its counter-intuitive rules for describing the behavior of tiny particles like photons and atoms, holds great promise for profound advances in the security and speed of how we communicate and compute.

Now an international team of researchers has built a chip that generates multiple frequencies from a robust quantum system that produces time-bin entangled photons. In contrast to other quantum state realizations, entangled photons don’t need bulky equipment to keep them in their quantum state, and they can transmit quantum information across long distances. The new device creates entangled photons that span the traditional telecommunications spectrum, making it appealing for multi-channel quantum communication and more powerful quantum computers.

“The advantages of our chip are that it’s compact and cheap. It’s also unique that it operates on multiple channels,” said Michael Kues, Institut National de la Recherche Scientifique (INRS), University of Quebec, Canada.

Read more

Apr 25, 2016

AI Helps Scientists Develop Anti-Poaching System

Posted by in categories: computing, information science, mathematics, robotics/AI, security

A team of computer scientists from the University of Southern California (USC) have been successful in developing a new method to alleviate wildlife poaching. The National Science Foundation (NSF) funded the project that has created a model for ‘green security games’.

This model is based on game theory to safeguard wildlife from poachers. Game theory involves predicting the actions of enemy using mathematical equations and subsequently formulating the best possible restrain moves. This model will enable more efficient patrolling of parks and wildlife by park rangers.

An artificial intelligence (AI) application, known as Protection Assistant for Wildlife Sanctuary (PAWS) was developed by Fei Fang, a Ph.D. candidate in the computer science department at USC and Milind Tambe, a professor of computer science and systems engineering at USC, in 2013. The team has since then spent a couple of years to test the effectiveness of the application in Uganda and Malaysia.

Continue reading “AI Helps Scientists Develop Anti-Poaching System” »

Apr 23, 2016

Why messaging bots are a looming security threat

Posted by in categories: robotics/AI, security

I almost snickered at this article because many of us have been highlighting many of the issues with AI. I am glad to see someone else also speaking up with the bigger issue with AI which is poor security due to the existing net infrastructure.


Facebook and others are all working on simplifying users’ lives with bots, but these novel interactive programs change the game in terms of security.

Read more

Apr 19, 2016

JROC Speeds Up & Opens Up: Reforming The Dark Heart of Acquisition

Posted by in categories: military, security

Nice and long overdue; however, finally happening and that’s good as long as security and safety are not compromised.


PENTAGON: One of the most important — and most maligned — elements of the Pentagon bureaucracy has gotten 30 percent faster, according to data exclusively compiled for Breaking Defense by the staff of the Joint Requirements Oversight Council. In a new drive for openness, the infamously opaque JROC is also bringing in outside expertise from industry, military laboratories and the Defense Department’s in-house disruptive innovators at DARPA.

Reforming the Joint Requirements Oversight Council is a big deal. The military’s weapons-buying bureaucracy is a maze, and at the dark heart of the labyrinth lurks the JROC, which must approve the official wish list — the requirements — for almost any major program. Led by the vice-chairman of the Joint Chiefs, Gen. Paul Selva, and comprising the No. 2 officers of each service, supported by lesser boards and lower-ranking working groups, the JROC has a reputation for delaying, watering down, or killing the armed services’ proposals. Many believe it’s where good ideas go to die — slowly.

Continue reading “JROC Speeds Up & Opens Up: Reforming The Dark Heart of Acquisition” »

Apr 18, 2016

Implanted Medical Devices Save Our Lives And Tempt Computer Hackers

Posted by in categories: biotech/medical, computing, cyborgs, health, internet, mobile phones, neuroscience, security

All true and good points. Until the under pinning technology and net infrastructures are update; all things connected will mean all things hackable.


Medical devices like pacemakers and insulin pumps will save many lives, but they also represent an opportunity to computer hackers who would use the Internet to cause havoc. Former futurist-in-residence at the FBI, Marc Goodman says it is easy to take for granted how connected we’ve already become to the Internet. Most American adults keep their phones within arm’s reach all day, and keep their devices on their nightstand while they sleep — and forget about actually remembering people’s phone numbers. That is a job we have outsourced to machines.

In this sense, says Goodman, we are already cyborgs. But digital devices connected to the Internet will continue to move inside our bodies, just as pacemakers and insulin pumps have. In his interview, Goodman discusses cases of computer hackers taking advantage of these devices’ connectivity to show how vulnerable we could soon become to their potentially destructive wishes. In one case, a hacker demonstrated he could release several weeks of insulin into a diabetic’s body, certain to cause a diabetic coma and death. In another, hackers induced epileptic seizures by hacking the Epilepsy Foundation’s webpage.

Continue reading “Implanted Medical Devices Save Our Lives And Tempt Computer Hackers” »

Apr 15, 2016

Ghost in the Shell and the transhumanist future of sexuality

Posted by in categories: military, security, surveillance, transhumanism

The sky above Osaka Bay is saturated in light pollution teeming from the neon-soaked metropolis below. Military bi-copters circle in patterns between the antenna towers of Niihama City’s looming skyscrapers as they survey the scene of an ongoing domestic security operation. Kneeling from atop the edge of one of these towers is a figure; a mauve-haired saboteur of the state clad in a leotard, side holster, and leather jacket. Combat boots and leggings hiked just past her knees with her upper thighs left exposed. An external HD cable juts from a small input jack indented at the base of her neck.

Her pupils dilate, sifting through the visual noise of an embedded surveillance feed while combing the room below for suspicious movements. She detaches the cable at her subordinate’s signal, stands upright and removes her clothing. She leans over the edge of the building, a smirk streaking across her otherwise stoic expression. A rappel line heaves sharply, suspending her body directly adjacent to that of her target, who is now only a trigger pull from annihilation.

Read more

Apr 12, 2016

Long-range secure quantum communication system developed

Posted by in categories: business, encryption, finance, information science, quantum physics, security

Scientists from ITMO University in Saint Petersburg, Russia have enabled the longer distance (250 Kilos) of secured data transmission occur via Quantum. Nice; and should be a wake up call to the US as well on advancing their efforts more.


A group of scientists from ITMO University in Saint Petersburg, Russia has developed a novel approach to the construction of quantum communication systems for secure data exchange. The experimental device based on the results of the research is capable of transmitting single-photon quantum signals across distances of 250 kilometers or more, which is on par with other cutting edge analogues. The research paper was published in the Optics Express journal.

Information security is becoming more and more of a critical issue not only for large companies, banks and defense enterprises, but even for small businesses and individual users. However, the data encryption algorithms we currently use for protecting our data are imperfect — in the long-term, their logic can be cracked. Regardless of how complex and intricate the algorithm is, getting round it is just the matter of time.

Continue reading “Long-range secure quantum communication system developed” »

Apr 10, 2016

Researchers: Attackers could use holes in Firefox add-ons to target your PC

Posted by in categories: computing, security

It goes without saying that any given piece of computer code—be it an app, a part of your operating system, or even a browser plug-in—may contain flaws that could leave your PC open to attack. But a team of researchers from Northwestern University have come across a new method of attack that can take advantage of holes in one or more installed Firefox add-ons.

According to the team’s research paper (PDF), this newly discovered attack “leverages capability leaks from legitimate extensions to avoid the inclusion of security-sensitive API calls within the malicious extension itself.”

Put another way: Firefox doesn’t enforce any isolation between the add-ons you install, as Ars Technica notes, which could potentially result in security problems. As a result of this lack of isolation, researchers say, an attacker could write a malicious Firefox add-on that appears harmless, but can use security flaws in other installed add-ons to do its bidding.

Continue reading “Researchers: Attackers could use holes in Firefox add-ons to target your PC” »