Blog

Archive for the ‘security’ category: Page 9

May 27, 2024

Hackers target Check Point VPNs to breach enterprise networks

Posted by in category: security

Threat actors are targeting Check Point Remote Access VPN devices in an ongoing campaign to breach enterprise networks, the company warned in a Monday advisory.

Remote Access is integrated into all Check Point network firewalls. It can be configured as a client-to-site VPN for access to corporate networks via VPN clients or set up as an SSL VPN Portal for web-based access.

Check Point says the attackers are targeting security gateways with old local accounts using insecure password-only authentication, which should be used with certificate authentication to prevent breaches.

May 27, 2024

Computer scientists discover Vulnerability in Cloud Server Hardware used by AMD and Intel Chips

Posted by in categories: computing, security

Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.

Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using shared cloud computing resources.

Known as confidential computing, this approach protects sensitive data while it is being processed by isolating it in an area that is impenetrable to other users and even to the cloud provider. But computer scientists at ETH Zurich have now proved that it is possible for hackers to gain access to these systems and to the data stored in them.

May 24, 2024

Explainer: how ‘AI killer robots’ are threatening global security

Posted by in categories: robotics/AI, security

Think thank SIPRI and GlobalData analysts unpack how the use of AI by the militaries raises an urgent need for regulation.

May 24, 2024

Hacker defaces spyware app’s site, dumps database and source code

Posted by in categories: mobile phones, security

A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data.

As Vice reported three years ago, this stalkerware app was also found leaking real-time screenshots from Android phones.

Continue reading “Hacker defaces spyware app’s site, dumps database and source code” »

May 17, 2024

Security Checks Reaching Towards Your Brain

Posted by in categories: ethics, neuroscience, privacy, security

When Descartes said “I think therefore I am” he probably didn’t know that he was answering a security question. Using behavioral or physical characteristics to identify people, biometrics, has gotten a big boost in the EU. The Orwellian sounding HUMABIO (Human Monitoring and Authentication using Biodynamic Indicators and Behavioral Analysis) is a well funded research project that seeks to combine sensor technology with the latest in biometrics to find reliable and non-obtrusive ways to identify people quickly. One of their proposed methods: scanning your brain stem. That’s right, in addition to reading your retinas, looking at your finger prints, and monitoring your voice, the security systems of the future may be scanning your brain.

How could they actually read your brain? What kind of patterns would they use to authenticate your identity? Yeah, that haven’t quite figured that out yet. HUMABIO is still definitely in the “pre-commercial” and “proof of concept” phase. They do have a nice ethics manual to read, and they’ve actually written some “stories” that illustrate the uses of their various works in progress, but they haven’t produced a fieldable instrument yet. In fact, this aspect of the STREP (Specific Targeted Research Project) would hardly be remarkable if we didn’t know more about the available technology from other sources.

May 17, 2024

Scientists Step Toward Quantum Internet With Experiment Under the Streets of Boston

Posted by in categories: computing, finance, internet, quantum physics, security

A quantum internet would essentially be unhackable. In the future, sensitive information—financial or national security data, for instance, as opposed to memes and cat pictures—would travel through such a network in parallel to a more traditional internet.

Of course, building and scaling systems for quantum communications is no easy task. Scientists have been steadily chipping away at the problem for years. A Harvard team recently took another noteworthy step in the right direction. In a paper published this week in Nature, the team says they’ve sent entangled photons between two quantum memory nodes 22 miles (35 kilometers) apart on existing fiber optic infrastructure under the busy streets of Boston.

“Showing that quantum network nodes can be entangled in the real-world environment of a very busy urban area is an important step toward practical networking between quantum computers,” Mikhail Lukin, who led the project and is a physics professor at Harvard, said in a press release.

May 15, 2024

Study uncovers technologies that could unveil energy-efficient information processing and sophisticated data security

Posted by in category: security

Advanced information processing technologies offer greener telecommunications and strong data security for millions, a study led by University of Maryland (UMD) researchers revealed.

May 12, 2024

Remarks by Dr. Liz Sherwood-Randall Assistant to the President for Homeland Security on Countering Bioterrorism in an Era of Technology Convergence

Posted by in categories: security, terrorism

Ash carter exchange remarks as prepared.

I’m grateful to be here today with a group of kindred spirits focused on tackling some of the hardest problems we face at the intersection of technology and national security.

Ash Carter devoted his life to working in this arena, and many of you are here because of the impact he had on you and your careers.

May 11, 2024

Embedded Analytics Made Easy: Go From Concept to Launch in No Time

Posted by in categories: innovation, security

Looking to embed analytics in your products but daunted by the complexity and resource demands?Join us to discover how you can rapidly (in days/weeks) deliver value with modern analytics, boosting innovation and increasing revenue through data-driven solutions. Data Experts at Aimpoint Digital and Sigma will explain what modern embedded analytics means and how it:- Empowers developers to swiftly create visualizations and data apps on a composable platform.- Wins customers with extensive data exploration, database writeback, and robust security for multi-tenancy. Register today to leverage data for growth and operational excellence. Act now before losing your competitive edge.

May 11, 2024

Novel hybrid scheme speeds the way to simulating nuclear reactions on quantum computers

Posted by in categories: computing, nuclear energy, particle physics, quantum physics, security

The nuclear reactions that power the stars and forge the elements emerge from the interactions of the quantum mechanical particles, protons and neutrons. Explaining these processes is one of the most challenging unsolved problems in computational physics. As the mass of the colliding nuclei grows, the resources required to model them outpace even the most powerful conventional computers. Quantum computers could perform the necessary computations. However, they currently fall short of the required number of reliable and long-lived quantum bits. This research combined conventional computers and quantum computers to significantly accelerate the prospects of solving this problem.

The Impact

The researchers successfully used the hybrid computing scheme to simulate the scattering of two neutrons. This opens a path to computing nuclear reaction rates that are difficult or impossible to measure in a laboratory. These include reaction rates that play a role in astrophysics and national security. The hybrid scheme will also aid in simulating the properties of other quantum mechanical systems. For example, it could help researchers study the scattering of electrons with quantized atomic vibrations known as phonons, a process that underlies superconductivity.

Page 9 of 144First678910111213Last