Blog

Archive for the ‘security’ category: Page 57

May 11, 2022

How Austin Lured the Most Workers Back to Offices

Posted by in category: security

AUSTIN, Texas—Companies nationwide are struggling to get employees back in the office, but not in Austin.

These days, the city’s workforce is putting in more face time at offices than those in any other major U.S. metro area.

Austin offices are 59%-occupied—and cracked the 60% threshold last month—according to data from Kastle Systems, an office-security firm that records workers’ comings and goings by measuring badge swipes into skyscrapers and corporate campuses.

Continue reading “How Austin Lured the Most Workers Back to Offices” »

May 10, 2022

See how a huge 3D printer is going to build 200 concrete homes in Virginia’s tech hub within the next 5 years

Posted by in categories: security, transportation

Zack Mannheimer, the CEO of Alquist, predicts more US homes will be 3D printed than built “traditionally” within the next five years.


Imagine moving through airport security without having to take off your shoes or belt or getting pulled aside while your flight boards—while keeping all the precautions that ensure the safety of passengers and flight crews.

May 10, 2022

Automated threat recognition software could speed airport security

Posted by in categories: security, transportation

Imagine moving through airport security without having to take off your shoes or belt or getting pulled aside while your flight boards—while keeping all the precautions that ensure the safety of passengers and flight crews.

This is the challenge tackled by a team including researchers from Sandia National Laboratories—a challenge that led to development of the Open Threat Assessment Platform, which allows the Transportation Security Administration to respond more quickly and easily to threats to air travel safety.

“When we wanted to change how we screen in response to new threats,” said Andrew Cox, a Sandia R&D systems analyst who leads the OTAP project. “The technology was too rigid. TSA compensated by adding procedures. There’s a shoe bomber and you have to take your shoes off; liquid explosives arrived, and TSA had to limit liquids and gels.”

May 7, 2022

Google Releases Android Update to Patch Actively Exploited Vulnerability

Posted by in categories: mobile phones, security

Google releases monthly security patches for Android with fixes for 37 vulnerabilities in various components.

May 6, 2022

Spontaneous Magnetic Reversal of Monster Black Hole Sparks Enigmatic Outburst

Posted by in categories: biotech/medical, security

NASA’s Swift Observatory Tracks Potential Magnetic Flip of Monster Black Hole A rare and enigmatic outburst from an active galaxy 236 million light-years away may have been sparked by a magnetic reversal, a spontaneous flip of the magnetic field surrounding its central black hole. In a comprehen.


A device, created at Stevens Institute of Technology, uses millimeter-wave imaging — the same technology used in airport security scanners — to scan a patient’s skin to detect if they have skin cancer. Millimeter-wave rays harmlessly penetrate about 2mm into human skin, so the team’s imaging technology provides a clear 3D map of scanned skin lesions.

Continue reading “Spontaneous Magnetic Reversal of Monster Black Hole Sparks Enigmatic Outburst” »

May 6, 2022

Bye, bye, biopsy? Handheld device could painlessly identify skin cancers

Posted by in categories: biotech/medical, security

A device, created at Stevens Institute of Technology, uses millimeter-wave imaging — the same technology used in airport security scanners — to scan a patient’s skin to detect if they have skin cancer. Millimeter-wave rays harmlessly penetrate about 2mm into human skin, so the team’s imaging technology provides a clear 3D map of scanned skin lesions.

May 2, 2022

First Dream Chaser vehicle takes shape

Posted by in categories: security, space travel

WASHINGTON — Sierra Space says it is making good progress on its first Dream Chaser spaceplane as the company looks ahead to versions of the vehicle that can carry crews and perform national security missions.

The company provided SpaceNews with images of the first Dream Chaser, named Tenacity, being assembled at its Colorado headquarters. The vehicle’s structure is now largely complete, but there is still more work to install its thermal protection system and other components.

“We have the wings on now. It really looks like a spaceplane,” said Janet Kavandi, president of Sierra Space, during a panel at the AIAA ASCENDx Texas conference in Houston April 28, where she played a video showing work building the vehicle.

May 1, 2022

It’s not rocket science: Why Elon Musk’s Twitter takeover could be bad for privacy

Posted by in categories: Elon Musk, science, security

Apr 26, 2022

Urban-Air Port opens first functional eVTOL vertiport for delivery drones and flying taxis

Posted by in categories: drones, security

Builder of infrastructure for drone delivery and eVTOL air taxi vehicles, Urban-Air Port opens its first fully functional vertiport.


Urban-Air Port, the London-based developer of vertiports for delivery drones and electronic takeoff and landing (eVTOL) vehicles like air taxis, has opened the doors of its first functional aerial hub – one of 200 terminals it plans to build around the globe in the near future.

Continue reading “Urban-Air Port opens first functional eVTOL vertiport for delivery drones and flying taxis” »

Apr 11, 2022

Cloud server leasing can leave sensitive data up for grabs

Posted by in categories: business, computing, engineering, security, space

Renting space and IP addresses on a public server has become standard business practice, but according to a team of Penn State computer scientists, current industry practices can lead to “cloud squatting,” which can create a security risk, endangering sensitive customer and organization data intended to remain private.

Cloud squatting occurs when a company, such as your bank, leases space and IP addresses—unique addresses that identify individual computers or computer networks—on a public server, uses them, and then releases the space and addresses back to the public server company, a standard pattern seen every day. The public server company, such as Amazon, Google, or Microsoft, then assigns the same addresses to a second company. If this second company is a bad actor, it can receive information coming into the address intended for the original company—for example, when you as a customer unknowingly use an outdated link when interacting with your bank—and use it to its advantage—cloud squatting.

“There are two advantages to leasing server space,” said Eric Pauley, doctoral candidate in computer science and engineering. “One is a cost advantage, saving on equipment and management. The other is scalability. Leasing server space offers an unlimited pool of computing resources so, as workload changes, companies can quickly adapt.” As a result, the use of clouds has grown exponentially, meaning almost every website a user visits takes advantage of cloud computing.

Page 57 of 146First5455565758596061Last