Blog

Archive for the ‘security’ category: Page 15

Feb 15, 2024

OpenAI Hiring Detective to Find Who’s Leaking Its Precious Info

Posted by in categories: robotics/AI, security

OpenAI is looking to hire an “insider risk investigator” to “fortify our organization against internal security threats.”

According to the company’s job listing, first spotted by MSPowerUser, the gumshoe is supposed to help the company safeguard its assets by “analyzing anomalous activities, promoting a secure culture, and interacting with various departments to mitigate risks.” Per the Wayback Machine, the job listing has been up since mid-January.

“You’ll play a crucial role in safeguarding OpenAI’s assets by analyzing anomalous activities, promoting a secure culture, and interacting with various departments to mitigate risks,” the listing reads. “Your expertise will be instrumental in protecting OpenAI against internal risks, thereby contributing to the broader societal benefits of artificial intelligence.”

Feb 13, 2024

Alert: CISA Warns of Active ‘Roundcube’ Email Attacks — Patch Now

Posted by in category: security

CISA has identified a medium-severity security flaw affecting Roundcube email software, categorized as CVE-2023–43770.

Feb 13, 2024

Why AI can’t replace air traffic controllers

Posted by in categories: biotech/medical, robotics/AI, security

An air traffic controller’s routine can be disrupted by an aircraft that requires special handling. This could range from an emergency to priority handling of medical flights or Air Force One. Controllers are given the responsibility and the flexibility to adapt how they manage their airspace.

The requirements for the front line of air traffic control are a poor match for AI’s capabilities. People expect air traffic to continue to be the safest complex, high-technology system ever. It achieves this standard by adhering to procedures when practical, which is something AI can do, and by adapting and exercising good judgment whenever something unplanned occurs or a new operation is implemented – a notable weakness of today’s AI.

Indeed, it is when conditions are the worst – when controllers figure out how to handle aircraft with severe problems, airport crises or widespread airspace closures due to security concerns or infrastructure failures – that controllers’ contributions to safety are the greatest.

Feb 10, 2024

Airport 4.0: The Future Of Airports Takes Flight

Posted by in categories: robotics/AI, security

Imagine stepping into an airport where queues are relics of the past, replaced by seamless journeys orchestrated by intelligent machines. This isn’t science fiction – it’s the dawn of Airport 4.0, the cognitive era where airports transform from transit hubs into dynamic, personalized experiences.

As a frequent traveler myself, I’ve spent countless hours navigating the labyrinthine world of airports. The frustration of long lines, the stress of security checks, the wasted time waiting – it’s all too familiar. But Airport 4.0 paints a radically different picture. Facial recognition whisks me past security, AI-powered apps anticipate my needs, and personalized recommendations guide me to hidden gems within the terminal. This isn’t just a convenience; it’s a paradigm shift that unlocks a world of possibilities. Today, as we stand on the brink of the cognitive era, I’m keen to share my insights on how Airport 4.0 is reshaping the future of air travel, making it not just a journey from A to B but an experience in its own right.

A new report on Future of Airports from Markets and Markets Foresighting team delves into what will be a future airport.

Feb 8, 2024

Endpoint security startup NinjaOne lands $231.5M at $1.9B valuation

Posted by in category: security

NinjaOne, a startup offering tools to manage and secure endpoints in enterprise settings, has raised $231.5 million at a $1.9 billion valuation.

Feb 6, 2024

The next wave of fraud should frighten banks and crypto firms alike

Posted by in categories: finance, robotics/AI, security

It’s possible the OnlyFake owner is exaggerating, and it’s also worth noting that counterfeiting documents is nothing new. The difference here, though, is that the firm’s software is capable of cranking out hundreds of fake, but very real looking, IDs. It feels like it’s a matter of time before both banks and crypto firms alike are swamped by a wave of bots seeking to open accounts that possess convincing fake IDs.

You can add to this an impending wave of AI-based tools that will be used to overcome the anti-fraud measures, such as voice-based authentication, used by banks and others. We are also seeing AI being used to carry out audacious new forms of robbery—including the jaw-dropping story this week of a criminal gang that persuaded some poor employee in Hong Kong to transfer $25 million of company funds during a Zoom meeting. It turned out that all the members on the Zoom call were AI-generated replicas of the employee’s boss and coworkers.

Feb 4, 2024

How to use Apple Vision Pro’s Optic ID authentication

Posted by in categories: privacy, security

The Apple Vision Pro uses Optic ID as biometric authentication for payments and certain visionOS actions. Here’s how it works, and how to use it.

Feb 4, 2024

BlackSky’s AI powered intelligence satellite will soon monitor Earth

Posted by in categories: robotics/AI, satellites, security

BlackSky is close to completing its SMART satellite network which uses AI to revolutionize global monitoring and security with unprecedented efficiency.


BlackSky has won Phase III of IARPA’s SMART program to develop the U.S. agency’s AI-driven satellites for global monitoring.

Feb 3, 2024

Biotech is the new focus in U.S.-China tech rivalry

Posted by in categories: biotech/medical, economics, food, security

The need to quash outbreaks, quickly create medicines, stress-proof crops and fend off other 21st century threats is providing a lucrative arena for biotech companies to sell their services.

Why it matters: But the infrastructure to support such ambitions is increasingly recognized by the U.S., China and other countries as a linchpin of national security and economic strategy, putting it at the center of geopolitics.

Jan 29, 2024

Recovering lossless propagation: HKU physicists overcoming optical loss in polariton system with synthetic complex frequency waves

Posted by in categories: computing, nanotechnology, physics, security

A collaborative research team co-led by Professor Shuang ZHANG, the Interim Head of the Department of Physics, The University of Hong Kong (HKU), along with Professor Qing DAI from National Center for Nanoscience and Technology, China, has introduced a solution to a prevalent issue in the realm of nanophotonics – the study of light at an extremely small scale. Their findings, recently published in the prestigious academic journal Nature Materials, propose a synthetic complex frequency wave (CFW) approach to address optical loss in polariton propagation. These findings offer practical solutions such as more efficient light-based devices for faster and more compact data storage and processing in devices such as computer chips and data storage devices, and improved accuracy in sensors, imaging techniques, and security systems.

Surface plasmon polaritons and phonon polaritons offer advantages such as efficient energy storage, local field enhancement, and high sensitivities, benefitting from their ability to confine light at small scales. However, their practical applications are hindered by the issue of ohmic loss, which causes energy dissipation when interacting with natural materials.

Over the past three decades, this limitation has impeded progress in nanophotonics for sensing, superimaging, and nanophotonic circuits. Overcoming ohmic loss would significantly enhance device performance, enabling advancement in sensing technology, high-resolution imaging, and advanced nanophotonic circuits.

Page 15 of 145First1213141516171819Last