Blog

Archive for the ‘security’ category: Page 20

Nov 28, 2023

AWS brings Amazon One palm-scanning authentication to the enterprise

Posted by in categories: computing, privacy, security, surveillance

It comes 3 years after Amazon debuted its ‘handy’ authentication service for consumers.

Amazon’s cloud computing subsidiary AWS (Amazon Web Services) has lifted the lid on a new palm-scanning identity service that allows companies to authenticate people when entering physical premises.

The announcement comes as part of AWS’s annual Re: Invent conference, which is running in Las Vegas for the duration of this week.

Continue reading “AWS brings Amazon One palm-scanning authentication to the enterprise” »

Nov 27, 2023

Researchers achieve zero-knowledge proof based on device-independent quantum random number beacon

Posted by in categories: blockchains, encryption, information science, quantum physics, security

Zero-knowledge proof (ZKP) is a cryptographic tool that allows for the verification of validity between mutually untrusted parties without disclosing additional information. Non-interactive zero-knowledge proof (NIZKP) is a variant of ZKP with the feature of not requiring multiple information exchanges. Therefore, NIZKP is widely used in the fields of digital signature, blockchain, and identity authentication.

Since it is difficult to implement a true random number generator, deterministic pseudorandom number algorithms are often used as a substitute. However, this method has potential security vulnerabilities. Therefore, how to obtain true random numbers has become the key to improving the security of NIZKP.

In a study published in PNAS, a research team led by Prof. Pan Jianwei and Prof. Zhang Qiang from the University of Science and Technology of China (USTC) of the Chinese Academy of Sciences, and the collaborators, realized a set of random number beacon public services with device-independent quantum as entropy sources and post-quantum cryptography as identity authentication.

Nov 26, 2023

HDIAC Podcast — Weaponizing Brain Science: Neuroweapons — Part 1 of 2

Posted by in categories: chemistry, neuroscience, science, security

https://www.hdiac.org/podcast/neuroweapons-part-1/

In part one of this two-part podcast, HDIAC analyst Mara Kiernan interviews Dr. James Giordano, a Professor in the department of Neurology and Biochemistry at Georgetown University Medical Center. The discussion begins with Dr. Giordano defining neuroweapons and explaining their applied technologies. He provides insight into the manner in which international weapons conventions govern the use neuroweapons and discusses the threats presented by neuroweapons in today’s environment. Dr. Giordano goes on to review the need for continuous monitoring, including his views regarding challenges and potential solutions for effectively understanding global developments in neuroweapon technologies.

Continue reading “HDIAC Podcast — Weaponizing Brain Science: Neuroweapons — Part 1 of 2” »

Nov 25, 2023

The Future Of AI Is At The Edge: Cloudflare Leads The Way

Posted by in categories: robotics/AI, security

Cloudflare, the leading content delivery network and cloud security platform, wants to make AI accessible to developers.


While developers can use JavaScript to write AI inference code and deploy it to Cloudflare’s edge network, it is possible to invoke the models through a simple REST API using any language. This makes it easy to infuse generative AI into web, desktop and mobile applications that run in diverse environments.

In September 2023, Workers AI was initially launched with inference capabilities in seven cities. However, Cloudflare’s ambitious goal was to support Workers AI inference in 100 cities by the end of the year, with near-ubiquitous coverage by the end of 2024.

Continue reading “The Future Of AI Is At The Edge: Cloudflare Leads The Way” »

Nov 24, 2023

Will quantum cryptography soon be essential for IoT security?

Posted by in categories: computing, encryption, quantum physics, security

As connectivity continues to expand and the number of devices on a network with it, IoT’s ambition of creating a world of connected things grows. Yet, with pros, comes the cons, and the flip side of this is the growing security challenges that come with it too.

Security has been a perennial concern for IoT since it’s utilisation beyond its use for basic functions like tallying the stock levels of a soda machine. However, for something of such interest to the industry, plans for standardisation remain allusive. Instead, piece meal plans to ensure different elements of security, like zero trust for identity and access management for devices on a network, or network segmentation for containing breaches, are undertaken by different companies according to their needs.

Yet with the advancement of technology, things like quantum computing pose a risk to classic cryptography methods which, among other things, ensures data privacy is secure when being transferred from device to device or even to the Cloud.

Nov 24, 2023

Ideas for Humanity’s Future Approach to Space

Posted by in categories: governance, security, space, sustainability

In its first 75 years, RAND helped shape how humankind thought about and used space for the benefit of humanity. And it intends to have a similar impact on the next 75 years of space sustainability, security, and governance. Researchers identified concepts worthy of future study.

Nov 23, 2023

[1hr Talk] Intro to Large Language Models

Posted by in categories: robotics/AI, security

This is a 1 hour general-audience introduction to Large Language Models: the core technical component behind systems like ChatGPT, Claude, and Bard. What they are, where they are headed, comparisons and analogies to present-day operating systems, and some of the security-related challenges of this new computing paradigm.
As of November 2023 (this field moves fast!).

Context: This video is based on the slides of a talk I gave recently at the AI Security Summit. The talk was not recorded but a lot of people came to me after and told me they liked it. Seeing as I had already put in one long weekend of work to make the slides, I decided to just tune them a bit, record this round 2 of the talk and upload it here on YouTube. Pardon the random background, that’s my hotel room during the thanksgiving break.

Continue reading “[1hr Talk] Intro to Large Language Models” »

Nov 22, 2023

Windows Hello auth bypassed on Microsoft, Dell, Lenovo laptops

Posted by in categories: computing, engineering, security

Security researchers bypassed Windows Hello fingerprint authentication on Dell Inspiron, Lenovo ThinkPad, and Microsoft Surface Pro X laptops in attacks exploiting security flaws found in the embedded fingerprint sensors.

Blackwing Intelligence security researchers discovered vulnerabilities during research sponsored by Microsoft’s Offensive Research and Security Engineering (MORSE) to assess the security of the top three embedded fingerprint sensors used for Windows Hello fingerprint authentication.

Continue reading “Windows Hello auth bypassed on Microsoft, Dell, Lenovo laptops” »

Nov 21, 2023

How AI Became A Cloud ‘Workload’

Posted by in categories: governance, robotics/AI, security

Good technologies disappear.


In the company’s cloud market study, almost all organizations say that security, reliability and disaster recovery are important considerations in their AI strategy. Also key is the need to manage and support AI workloads at scale. In the area of AI data rulings and regulation, many firms think that AI data governance requirements will force them to more comprehensively understand and track data sources, data age and other key data attributes.

“AI technologies will drive the need for new backup and data protection solutions,” said Debojyoti ‘Debo’ Dutta, vice president of engineering for AI at Nutanix. “[Many companies are] planning to add mission-critical, production-level data protection and Disaster Recovery (DR) solutions to support AI data governance. Security professionals are racing to use AI-based solutions to improve threat and anomaly detection, prevention and recovery while bad actors race to use AI-based tools to create new malicious applications, improve success rates and attack surfaces, and improve detection avoidance.”

Continue reading “How AI Became A Cloud ‘Workload’” »

Nov 21, 2023

A nanosatellite and a hot air balloon for emergency broadband anywhere

Posted by in categories: computing, internet, satellites, security

It is estimated that 95% of the planet’s population has access to broadband internet, via cable or a mobile network. However, there are still some places and situations in which staying connected can be very difficult. Quick responses are necessary in emergency situations, such as after an earthquake or during a conflict. So too are reliable telecommunications networks that are not susceptible to outages and damage to infrastructure, networks can be used to share data that is vital for people’s well-being.

A recent article, published in the journal Aerospace, proposes the use of nanosatellites to provide comprehensive and stable coverage in areas that are hard to reach using long-range communications. It is based on the bachelor’s and master’s degree final projects of Universitat Oberta de Catalunya (UOC) graduate David N. Barraca Ibort.

The paper is co-authored by Raúl Parada, a researcher at the Telecommunications Technological Center of Catalonia (CTTC/CERCA) and a course instructor with the UOC’s Faculty of Computer Science, Multimedia and Telecommunications; Carlos Monzo, a researcher and member of the same faculty; and Víctor Monzón, a researcher at the Interdisciplinary Center for Security Reliability and Trust at the University of Luxembourg.

Page 20 of 145First1718192021222324Last