Menu

Blog

Archive for the ‘security’ category: Page 92

Nov 1, 2019

New Google Chrome Security Alert: Update Your Browsers As ‘High Severity’ Zero-Day Exploit Confirmed

Posted by in category: security

Google has confirmed that a high severity Chrome browser zero-day exploit exists in the wild — here’s what you need to know.

Oct 31, 2019

Researchers create quantum chip 1,000 times smaller than current setups

Posted by in categories: computing, information science, mobile phones, quantum physics, security

Researchers at Nanyang Technological University, Singapore (NTU Singapore) have developed a quantum communication chip that is 1,000 times smaller than current quantum setups, but offers the same superior security quantum technology is known for.

Most leading security standards used in secure communication methods—from withdrawing cash from the ATM to purchasing goods online on the smartphone—does not leverage quantum technology. The electronic transmission of the personal identification number (PIN) or password can be intercepted, posing a .

Roughly three millimeters in size, the tiny chip uses quantum communication algorithms to provide enhanced security compared to existing standards. It does this by integrating passwords within the information that is being delivered, forming a secure quantum key. After the information is received, it is destroyed along with the key, making it an extremely secure form of communication.

Oct 30, 2019

Faster, More Secure Communications Using Structured Light in Quantum Protocols

Posted by in categories: quantum physics, security

Structured light is a fancy way to describe patterns or pictures of light, but deservedly so as it promises future communications that will be both faster and more secure.

Quantum mechanics has come a long way during the past 100 years but still has a long way to go. In AVS Quantum Science, from AIP Publishing, researchers from the University of Witwatersrand in South Africa review the progress being made in using structured light in quantum protocols to create a larger encoding alphabet, stronger security and better resistance to noise.

“What we really want is to do quantum mechanics with patterns of light,” said author Andrew Forbes. “By this, we mean that light comes in a variety of patterns that can be made unique — like our faces.”

Oct 29, 2019

Structured light promises path to faster, more secure communications

Posted by in categories: computing, quantum physics, security

Hard light computers could be exponential.


Structured light is a fancy way to describe patterns or pictures of light, but deservedly so as it promises future communications that will be both faster and more secure.

Quantum mechanics has come a long way during the past 100 years but still has a long way to go. In AVS Quantum Science researchers from the University of Witwatersrand in South Africa review the progress being made in using structured light in quantum protocols to create a larger encoding alphabet, stronger security and better resistance to noise.

Continue reading “Structured light promises path to faster, more secure communications” »

Oct 26, 2019

Here is The Ocean Cleanup CEO Boyan Slat’s invention in action to cleanup by removing plastic from the oceans to save the world environment for the security of humanity and to preserve our wildlife for the future now

Posted by in categories: innovation, security

Read more

Oct 25, 2019

Future Consequences of Cryptocurrency Use: Systemic Investigation of Two Scenarios

Posted by in categories: bitcoin, business, complex systems, counterterrorism, cryptocurrencies, cybercrime/malcode, disruptive technology, economics, education, employment, encryption, finance, futurism, governance, government, hacking, innovation, law enforcement, open access, policy, privacy, security, strategy, terrorism

We face complexity, ambiguity, and uncertainty about the future consequences of cryptocurrency use. There are doubts about the positive and negative impacts of the use of cryptocurrencies in the financial systems. In order to address better and deeper the contradictions and the consequences of the use of cryptocurrencies and also informing the key stakeholders about known and unknown emerging issues in new payment systems, we apply two helpful futures studies tools known as the “Future Wheel”, to identify the key factors, and “System Dynamics Conceptual Mapping”, to understand the relationships among such factors. Two key scenarios will be addressed. In on them, systemic feedback loops might be identified such as a) terrorism, the Achilles’ heel of the cryptocurrencies, b) hackers, the barrier against development, and c) information technology security professionals, a gap in the future job market. Also, in the other scenario, systemic feedback loops might be identified such as a) acceleration of technological entrepreneurship enabled by new payment systems, b) decentralization of financial ecosystem with some friction against it, c) blockchain and shift of banking business model, d) easy international payments triggering structural reforms, and e) the decline of the US and the end of dollar dominance in the global economy. In addition to the feedback loops, we can also identify chained links of consequences that impact productivity and economic growth on the one hand, and shift of energy sources and consumption on the other hand.

Watch the full length presentation at Victor V. Motti YouTube Channel

Oct 25, 2019

Equity Group kick starts a 35 million trees planting campaign

Posted by in categories: employment, food, security, sustainability

You can protest about the Environment all you want, while some of us actually plant trees to heal it. Kenya is one country that has been instrumental in planting trees. Wangari Maathai had a coffin made of hyacinth, showing how real she was even in death. Ethiopia recently set a record planting trees. Some people talk, while others do. One Kenyan woman’s organization planted over 51 million trees, and still counting. #BeTheDifference


Equity Group has announced plans to implement an ambitious project to plant 35 million trees across the country within a year.

In an effort to conserve the environment, Equity has partnered with Kenya Forest Service (KFS) to promote Farm Forestry Initiatives.

Continue reading “Equity Group kick starts a 35 million trees planting campaign” »

Oct 22, 2019

Without encryption we will lose all privacy. This is our new battleground

Posted by in categories: computing, encryption, government, security, surveillance

And yet, in the midst of the greatest computer security crisis in history, the US government, along with the governments of the UK and Australia, is attempting to undermine the only method that currently exists for reliably protecting the world’s information: encryption. Should they succeed in their quest to undermine encryption, our public infrastructure and private lives will be rendered permanently unsafe.


The US, UK and Australia are taking on Facebook in a bid to undermine the only method that protects our personal information.

• Edward Snowden is a US surveillance whistleblower.

Continue reading “Without encryption we will lose all privacy. This is our new battleground” »

Oct 14, 2019

3D integrated metasurfaces stacking up for impressive holography

Posted by in categories: computing, encryption, engineering, holograms, nanotechnology, physics, security, transportation

Physicists and materials scientists have developed a compact optical device containing vertically stacked metasurfaces that can generate microscopic text and full-color holograms for encrypted data storage and color displays. Yueqiang Hu and a research team in Advanced Design and Manufacturing for Vehicle Body in the College of Mechanical and Vehicle Engineering in China implemented a 3D integrated metasurface device to facilitate miniaturization of the optical device. Using metasurfaces with ultrathin and compact characteristics, the research team designed optical elements by engineering the wavefront of light at the subwavelength scale. The metasurfaces possessed great potential to integrate multiple functions into the miniaturized optoelectronic systems. The work is now published on Light: Science & Applications.

Since existing research on multiplexing in the 2-D plane remains to fully incorporate capabilities of metasurfaces for multi-tasking, in the present work, the team demonstrated a 3D integrated metasurface device. For this, they stacked a hologram metasurface on a monolithic Fabry-Pérot (FP) cavity-based color filter microarray to achieve simultaneous cross-talk, polarization-independent and highly efficient full-color holography and microprint functions. The dual function of the device outlined a new scheme for data recording, security, encryption and information processing applications. The work on 3D integration can be extended to establish flat multi-tasking optical systems that include a variety of functional metasurface layers.

Metasurfaces open a new direction in optoelectronics, allowing researchers to design optical elements by shaping the wavefront of electromagnetic waves relative to size, shape and arrangement of structures at the subwavelength. Physicists have engineered a variety of metasurface-based devices including lenses, polarization converters, holograms and orbital angular momentum generators (OAM). They have demonstrated the performance of metasurface-based devices to even surpass conventional refractive elements to construct compact optical devices with multiple functions. Such devices are, however, withheld by shortcomings due to a reduced efficiency of plasmonic nanostructures, polarization requirements, large crosstalk and complexity of the readout for multiwavelength and broadband optical devices. Research teams can therefore stack 3D metasurface-based devices with different functions in the vertical direction to combine the advantages of each device.

Oct 12, 2019

These clothes use outlandish designs to trick facial recognition software into thinking you’re not a human

Posted by in categories: government, mobile phones, robotics/AI, security

Smile! You’re on camera — or you were at some point in the past few years — and now your face is public domain.

Facial recognition technology is everywhere, and only becoming more pervasive. It’s marketed as a security feature by companies like Apple and Google to prevent strangers from unlocking your iPhone or front door.

It’s also used by government agencies like police departments. More than half of adult Americans’ faces are logged in police databases, according to a study by Georgetown researchers. Facial recognition technology is used by governments across the globe to identify and track dissidents, and has been deployed by police against Hong Kong protesters.

Page 92 of 148First8990919293949596Last