Blog

Archive for the ‘security’ category: Page 50

Aug 31, 2022

Kazakhstan’s first NPP to be an international project

Posted by in categories: economics, nuclear energy, security

“In June, our delegation was in South Korea, in July we went to France. Negotiations are ongoing with Chinese suppliers. Based on the results of an in-depth study of international experience, nuclear technology suppliers will be involved. I repeat, this will be an international project,” he reaffirmed, adding that the results of this experience is under study.

“In principle, the construction of a nuclear power plant is a long process, it takes about eight years. Without nuclear power, we will not be able to ensure energy security for ourselves… We will need such generation — the whole world is moving towards decarbonisation. We must move to clean technologies, and nuclear generation is the answer to the challenge of the times,” he stressed.

He stressed that the safety of NPP operation is of paramount importance. “We will choose the technology that is the safest, and those suppliers who can complete all the work in a timely manner. Related areas of our economy will also develop around this industry. There will be a big positive effect on the development of our country as a whole.”

Aug 30, 2022

New highly efficient lead-bin binary perovskite photodetectors with fast response times

Posted by in categories: robotics/AI, security, transportation

Researchers at the University of Toronto and the Barcelona Institute of Science and Technology have recently created new solution-processed perovskite photodetectors that exhibit remarkable efficiencies and response times. These photodetectors, introduced in a paper published in Nature Electronics, have a unique design that prevents the formation of defects between its different layers.

“There is growing interest in 3D range imaging for autonomous driving and consumer electronics,” Edward H. Sargent told TechXplore. “We have worked as a team for years on finding new materials that enable light sensing technologies such as next-generation image sensors and striving to take these in a direction that could have a commercial and societal impact.”

Photodetectors, sensing devices that detect or respond to light, can have numerous highly valuable applications. For instance, they can be integrated in robotic systems, autonomous vehicles, , environmental sensing technology, fiber optic communication systems and security systems.

Aug 30, 2022

FBI: Hackers increasingly exploit DeFi bugs to steal cryptocurrency

Posted by in categories: cryptocurrencies, finance, internet, law enforcement, security

The U.S. Federal Bureau of Investigation (FBI) is warning investors that cybercriminals are increasingly exploiting security vulnerabilities in Decentralized Finance (DeFi) platforms to steal cryptocurrency.

“The FBI has observed cyber criminals exploiting vulnerabilities in the smart contracts governing DeFi platforms to steal investors’ cryptocurrency,” the federal law enforcement agency said.

“The FBI encourages investors who suspect cyber criminals have stolen their DeFi investments to contact the FBI via the Internet Crime Complaint Center or their local FBI field office.”

Aug 28, 2022

Why your org should plan for deepfake fraud before it happens

Posted by in categories: business, security

In the years ahead, technology will continue to evolve, and it will become harder to identify deepfakes. Indeed, as people and businesses take to the metaverse and the Web3, it’s likely that avatars will be used to access and consume a broad range of services. Unless adequate protections are put in place, these digitally native avatars will likely prove easier to fake than human beings.

However, just as technology will advance to exploit this, it will also advance to detect it. For their part, security teams should look to stay up to date on new advances in detection and other innovative technologies to help combat this threat. The direction of travel for deepfakes is clear, businesses should start preparing now.

David Fairman is the chief information officer and chief security officer of APAC at Netskope.

Aug 27, 2022

Quantum computing is an even bigger threat than artificial intelligence

Posted by in categories: blockchains, encryption, information science, quantum physics, robotics/AI, satellites, security

Given the potential scope and capabilities of quantum technology, it is absolutely crucial not to repeat the mistakes made with AI—where regulatory failure has given the world algorithmic bias that hypercharges human prejudices, social media that favors conspiracy theories, and attacks on the institutions of democracy fueled by AI-generated fake news and social media posts. The dangers lie in the machine’s ability to make decisions autonomously, with flaws in the computer code resulting in unanticipated, often detrimental, outcomes. In 2021, the quantum community issued a call for action to urgently address these concerns. In addition, critical public and private intellectual property on quantum-enabling technologies must be protected from theft and abuse by the United States’ adversaries.

https://urldefense.com/v3/__https:/www.youtube.com/watch?v=5…MexaVnE%24

There are national defense issues involved as well. In security technology circles, the holy grail is what’s called a cryptanalytically relevant quantum computer —a system capable of breaking much of the public-key cryptography that digital systems around the world use, which would enable blockchain cracking, for example. That’s a very dangerous capability to have in the hands of an adversarial regime.

Continue reading “Quantum computing is an even bigger threat than artificial intelligence” »

Aug 25, 2022

IoT Vulnerability Disclosures Up 57% in Six Months, Claroty Reveals

Posted by in categories: biotech/medical, internet, security

The number of vulnerability disclosures impacting extended internet of things (XIoT) devices increased by 57% in the first half of 2022 compared to the previous six months, according to a new report by Team82, the research team of cyber-physical systems (CPS) security firm Claroty.

The research also found that vendor self-disclosures increased by 69%. This would be a first for the industry, which usually relies more for disclosures on independent research teams. According to Team82, the trend indicates that more operational technology (OT), IoT, and internet of medical things (IoMT) vendors are establishing vulnerability disclosure programs and dedicating more resources to them.

Additionally, fully or partially remediated firmware vulnerabilities increased by 79% over the same time period, a significant improvement considering the relative challenges in patching firmware versus software vulnerabilities.

Aug 25, 2022

“Half of Twitter’s roughly 7,000 full-time workers have complete access to its code and user confidential data” Says its former chief security officer Peiter Zatko

Posted by in categories: robotics/AI, security

Twitter executives misled federal regulators and the company’s own board about “extreme and egregious shortcomings” in its defenses against hackers and its meager efforts to combat bots, said a former chief security officer Peiter Zatko.

What happens inside Twitter?

Continue reading “‘Half of Twitter’s roughly 7,000 full-time workers have complete access to its code and user confidential data’ Says its former chief security officer Peiter Zatko” »

Aug 23, 2022

Why composability is key to scaling digital twins

Posted by in categories: business, security, sustainability

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

Digital twins enable enterprises to model and simulate buildings, products, manufacturing lines, facilities and processes. This can improve performance, quickly flag quality errors and support better decision-making. Today, most digital twin projects are one-off efforts. A team may create one digital twin for a new gearbox and start all over when modeling a wind turbine that includes this part or the business process that repairs this part.

Ideally, engineers would like to quickly assemble more complex digital twins to represent turbines, wind farms, power grids and energy businesses. This is complicated by the different components that go into digital twins beyond the physical models, such as data management, semantic labels, security and the user interface (UI). New approaches for composing digital elements into larger assemblies and models could help simplify this process.

Aug 22, 2022

Apple security flaw may allow hackers full control of devices, company warns

Posted by in category: security

Apple has released security reports revealing major security flaws allowing hackers to complete control of a user’s iOS or macOS device.

Aug 20, 2022

DARPA seeks AI solutions for sourcing critical minerals

Posted by in categories: robotics/AI, security

DARPA has launched a competition to find AI solutions that can help with sourcing critical minerals.

Critical minerals are raw, non-fuel materials that are vital for manufacturing products that are essential to national security.

DARPA is teaming up with the US Geological Survey (USGS) to explore how machine learning and AI can accelerate critical mineral assessments.

Page 50 of 146First4748495051525354Last