Archive for the ‘security’ category: Page 127
Mar 11, 2016
Digital CMOS Camera Series Boosts Quantum Efficiency (QE) For Breakthrough Photon Detection Capability
Posted by Karen Hurst in categories: chemistry, nanotechnology, quantum physics, security
Digital CMOS camera with QE technology with improved photon detection capabilities — now this should interest to many medical departments, researchers, and even for security checkpoint screening.
Hamamatsu Corporation has again raised the bar in scientific CMOS camera performance with the 2016 version of the ORCA-Flash4.0 V2. The increased quantum efficiency (QE), now at a peak of 82%, increases the likelihood of detecting the faintest of signals, helping to answer the question “Is it there?” And, for brighter samples, higher QE translates into shorter exposure times without sacrificing image quality. The ORCA-Flash4.0 V2 opens up new possibilities for imaging in low conditions and improves signal to noise at all light levels.
Since its introduction and evolution, the ORCA-Flash4.0 series has become the favorite scientific CMOS camera of investigators everywhere, powering cutting-edge imaging research in every field from biology and chemistry to astrophysics and nanotechnology. The widespread appeal is due to the vast array of high-performance features: low read noise, large field of view, high dynamic range and fast frame rates. The newly enhanced QE of the “Flash V2” only serves to increase the power and versatility of this game-changing camera.
Mar 10, 2016
There are ways the FBI can crack the iPhone PIN without Apple doing it for them — By Peter Bright | Ars Technica
Posted by Odette Bohr Dienel in categories: privacy, security
“There may well be approaches that don’t require Apple to build a custom firmware to defeat some of the iPhone’s security measures.”
Mar 9, 2016
Biometrics Are Coming, Along With Serious Security Concerns
Posted by Karen Hurst in categories: privacy, security
Biometric technology can be used for everything from shopping apps to police work, but it brings with it a whole host of privacy concerns.
Mar 7, 2016
MIT’s new 5-atom quantum computer could make today’s encryption obsolete
Posted by Shailesh Prasad in categories: computing, encryption, quantum physics, security
Much of the encryption world today depends on the challenge of factoring large numbers, but scientists now say they’ve created the first five-atom quantum computer with the potential to crack the security of traditional encryption schemes.
In traditional computing, numbers are represented by either 0s or 1s, but quantum computing relies on atomic-scale units, or “qubits,” that can be simultaneously 0 and 1 — a state known as a superposition that’s far more efficient. It typically takes about 12 qubits to factor the number 15, but researchers at MIT and the University of Innsbruck in Austria have found a way to pare that down to five qubits, each represented by a single atom, they said this week.
Using laser pulses to keep the quantum system stable by holding the atoms in an ion trap, the new system promises scalability as well, as more atoms and lasers can be added to build a bigger and faster quantum computer able to factor much larger numbers. That, in turn, presents new risks for factorization-based methods such as RSA, used for protecting credit cards, state secrets and other confidential data.
Continue reading “MIT’s new 5-atom quantum computer could make today’s encryption obsolete” »
Mar 5, 2016
As Technology Barrels Ahead—Will Ethics Get Left in the Dust?
Posted by Karen Hurst in categories: bioengineering, biological, drones, encryption, ethics, finance, robotics/AI, security
Interesting Question to ask.
The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create new legislation. That’s because there really aren’t any existing laws which encompass technologies such as these. The battle is between security and privacy, with Silicon Valley fighting for privacy. The debates in Congress will be ugly, uninformed, and emotional. Lawmakers won’t know which side to pick and will flip flop between what lobbyists ask and the public’s fear du jour. And because there is no consensus on what is right or wrong, any decision they make today will likely be changed tomorrow.
This is a prelude of things to come, not only with encryption technologies, but everything from artificial intelligence to drones, robotics, and synthetic biology. Technology is moving faster than our ability to understand it, and there is no consensus on what is ethical. It isn’t just the lawmakers who are not well-informed, the originators of the technologies themselves don’t understand the full ramifications of what they are creating. They may take strong positions today based on their emotions and financial interests, but as they learn more, they too will change their views.
Continue reading “As Technology Barrels Ahead—Will Ethics Get Left in the Dust?” »
Mar 4, 2016
Quantum Computer Comes Closer to Cracking RSA Encryption
Posted by Karen Hurst in categories: computing, encryption, information science, quantum physics, security
Glad to see this article get published because it echoes many of the concerns established around China and Russia governments and their hackers having their infrastructures on Quantum before US, Europe, and Canada. Computer scientists at MIT and the University of Innsbruck say they’ve assembled the first five quantum bits (qubits) of a quantum computer that could someday factor any number, and thereby crack the security of traditional encryption schemes.
Shor’s algorithm performed in a system less than half the size experts expected.
Mar 2, 2016
Artificial Intelligence Risk — 12 Researchers Weigh in on the Danger’s of Smarter Machines
Posted by Karen Hurst in categories: biotech/medical, economics, mobile phones, robotics/AI, security
A realistic article on AI — especially around AI being manipulated by others for their own gain which I have also identified as the real risks with AI.
Artificial intelligence (AI), once the seeming red-headed stepchild of the scientific community, has come a long way in the past two decades. Most of us have reconciled with the fact that we can’t live without our smartphones and Siri, and AI’s seemingly omnipotent nature has infiltrated the nearest and farthest corners of our lives, from robo-advisors on Wall Street and crime-spotting security cameras, to big data analysis by Google’s BigQuery and Watson’s entry into diagnostics in the medical field.
In many unforeseen ways, AI is helping to improve and make our lives more efficient, though the reverse degeneration of human economic and cultural structures is also a potential reality. The Future of Life Institute’s tagline sums it up in succinct fashion: “Technology is giving life the potential to flourish like never before…or to self-destruct.” Humans are the creators, but will we always have control of our revolutionary inventions?
To much of the general public, AI is AI is AI, but this is only part truth. Today, there are two primary strands of AI development — ANI (Artificial Narrow Intelligence) and AGI (Artificial General Intelligence). ANI is often termed “weak AI” and is “the expert” of the pair, using its intelligence to perform specific functions. Most of the technology with which we surround ourselves (including Siri) falls into the ANI bucket. AGI is the next generation of ANI, and it’s the type of AI behind dreams of building a machine that achieves human levels of consciousness.
Mar 2, 2016
Latest attack against TLS shows the pitfalls of intentionally weakening encryption
Posted by Karen Hurst in categories: encryption, government, security
“For the third time in less than a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government”
This could have more than just security gap ripple effects; it could actually be a loophole for any claims/ lawsuits that consumers and others have with various organizations.
For the third time in under a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government.
Feb 28, 2016
IARPA seeks info on biometric attack detection tech
Posted by Karen Hurst in categories: government, privacy, security
Reminder to everyone who loves hearing about what NextGen Technologies that US Government has been working on: March 11th, US IARPA is hosting a conference on “Odin” (detection technologies to ensure biometric security systems can detect when someone is attempting to disguise their biometric identity.)
The Intelligence Advanced Research Projects Activity plans to hold a conference related to a biometric presentation attack detection programme called Odin.
The conference, to be held on 11 March in Washington, will be to provide information on Odin and the research problems the program aims to address, the agency noted.
Continue reading “IARPA seeks info on biometric attack detection tech” »