Menu

Blog

Archive for the ‘internet’ category: Page 223

Aug 23, 2019

Employees connect nuclear plant to the internet so they can mine cryptocurrency

Posted by in categories: cryptocurrencies, internet, nuclear energy, security

Ukrainian authorities are investigating a potential security breach at a local nuclear power plant after employees connected parts of its internal network to the internet so they could mine cryptocurrency.

The investigation is being led by the Ukrainian Secret Service (SBU), who is looking at the incident as a potential breach of state secrets due to the classification of nuclear power plants as critical infrastructure.

Investigators are examining if attackers might have used the mining rigs as a pivot point to enter the nuclear power plant’s network and retrieve information from its systems, such as data about the plant’s physical defenses and protections.

Aug 22, 2019

Practical anonymous communication protocol developed for quantum networks

Posted by in categories: internet, quantum physics

The ability to securely transmit information over the internet is extremely important, but most of the time, eavesdroppers can still generally determine who the sender and receiver are. In some highly confidential situations, it is important that the sender’s and receiver’s identities remain anonymous.

Over the past couple of decades, researchers have been developing protocols for anonymously transmitting messages over classical networks, but similar protocols for are still in much earlier stages of development. The anonymity methods that have been proposed for quantum networks so far face challenges such as implementation difficulties or require that strong assumptions be made about the resources, making them impractical for use in the .

In a new paper, Anupama Unnikrishnan, Ian MacFarlane, Richard Yi, Eleni Diamanti, Damian Markham, and Iordanis Kerenidis, from the University of Oxford, MIT, Sorbonne University, the University of Paris and CNRS, have proposed the first practical for anonymous communication in quantum networks.

Aug 19, 2019

MIT Researchers Create Impressive Solution for Improved Wi-Fi Stream Buffering

Posted by in category: internet

Ever been frustrated waiting for your YouTube video to stream quickly? A team of experts from MIT has created a system that allows multiple Wi-Fi users to stream and buffer high-quality videos.

Aug 17, 2019

An iPhone App That Protects Your Privacy—For Real This Time

Posted by in categories: economics, internet, mobile phones

The data economy has too often betrayed its customers, whether it’s Facebook sharing data you didn’t even realize it had, or invisible trackers that follow you around the web without your knowledge. But a new app launching in the iOS App Store today wants to help you take back some control—without making your life harder.

Aug 17, 2019

A Tech Expert Says Google Chrome Has Become Spy Software

Posted by in categories: government, internet, surveillance

You open your browser to look at the Web. Do you know who is looking back at you?

Over a recent week of Web surfing, I peered under the hood of Google Chrome and found it brought along a few thousand friends. Shopping, news and even government sites quietly tagged my browser to let ad and data companies ride shotgun while I clicked around the Web.

This was made possible by the Web’s biggest snoop of all: Google. Seen from the inside, its Chrome browser looks a lot like surveillance software.

Aug 15, 2019

Security Researchers Show Hackers Can Take Over Some Cameras With Ransomware

Posted by in categories: cybercrime/malcode, internet

A group of security researchers has found that some cameras are vulnerable to ransomware attacks via Wi-Fi or hijacked computers (using the USB connection) that can render a camera and its photos entirely usage until a sum of money is paid to the hackers.

Check Point Software Technologies has shown (as seen in the video above) that Canon DSLRs (it’s not clear if other cameras are also affected) are susceptible to ransomware attacks, an increasingly common exploitation in which a hacker disables a device until the owner pays a ransom to regain control. As more and more electronics gain internet connectivity, these attacks are becoming more common, particularly since manufacturers typically don’t put the same sort of effort into fortifying the network security of small electronics as they do into computers. Canon released a statement in which they offered some barebones tips to avoid being susceptible to these attacks and noted that there have been no known instances of such an attack occurring. They did not indicate whether they plan to fix the vulnerabilities through firmware updates, so it probably doesn’t hurt to be a bit more careful to protect your photos.

Aug 14, 2019

This Hydroponic Farm Is Run Entirely By Robots

Posted by in categories: food, internet, robotics/AI, sustainability

Iron Ox has just opened its first fully automated farm in San Carlos, California. The company claims that their hydroponic system can produce 30 times the yield per acre of land comparing to traditional farms, while using 90% less water.

► Subscribe for more tech & culture videos: http://on.mash.to/subscribe
MORE FROM MASHABLE
‌• Video — https://youtu.be/6ElleCub6uM
‌• Video — https://youtu.be/jAu1ZsTCA64
‌• Video — https://youtu.be/W8T6fYt9-tA

Continue reading “This Hydroponic Farm Is Run Entirely By Robots” »

Aug 13, 2019

Why AIoT Is Emerging As The Future Of Industry 4.0

Posted by in categories: internet, robotics/AI

Two trends that are dominating the technology industry are the Internet of Things (IoT) and Artificial Intelligence (AI). But for industrial automation, these two technologies are much more than the buzzwords or trending topics. The convergence of AI and IoT will redefine the future of industrial automation. It is set to lead the Industry 4.0 revolution.

IoT and AI are two independent technologies that have a significant impact on multiple industry verticals. While IoT is the digital nervous system, AI becomes the brain that makes decisions which control the overall system. The lethal combination of AI and IoT brings us AIoT — Artificial Intelligence of Things — that delivers intelligent and connected systems that are capable of self-correcting and self-healing themselves.

To appreciate the promise of AIoT, we need to look at the evolution of connected systems.

Aug 4, 2019

Peter Thiel said that AI is a military technology that will primarily be used ‘by generals,’ but experts say that view is too pessimistic

Posted by in categories: biotech/medical, food, internet, military, robotics/AI

Tech billionaire Peter Thiel painted a gloomy picture of artificial intelligence in his NYT’s op-ed on Thursday, detailing the technology’s real value and purpose as primarily a military one.

“The first users of the machine learning tools being created today will be generals,” Thiel declared in his 1,200-word piece. “A.I. is a military technology.”

Thiel’s portrayal is a far cry from the optimistic view that many in Silicon Valley have embraced. Artificial intelligence has promised to give us the next, best Netflix recommendations, let us search the internet using our voices, and do away with humans behind the wheel. It’s also expected to have a huge impact in medicine and agriculture. But instead, Thiel says that AI’s real home is on the battlefield — whether that be in the physical or cyber worlds.

Aug 4, 2019

7 Chinese tech giants that are poised to be global power players

Posted by in categories: internet, quantum physics, robotics/AI

China has declared its ambition to dominate the technology sector from 5G and artificial intelligence to robotics and quantum computing. Joining the infrastructure firms on this year’s list are technology firms such as Alibaba, http://JD.com/, Tencent, Xiaomi, and BOE. Huawei was not included as it is a private entity.


China’s ambition to dominate the technology sector from 5G and artificial intelligence to robotics and quantum computing is bearing fruit.