Menu

Blog

Archive for the ‘security’ category

Jan 12, 2025

Mark Zuckerberg Says AI Could Soon Do The Work Of Meta’s Midlevel Engineers

Posted by in categories: business, government, robotics/AI, security, supercomputing

In today’s AI news, this year coding might go from one of the most sought-after skills on the job market to one that can be fully automated. Mark Zuckerberg said that Meta and some of the biggest companies in the tech industry are already working toward this on an episode of the Joe Rogan Experience on Friday.

In other advancements, NovaSky, a team of researchers based out of UC Berkeley’s Sky Computing Lab, released Sky-T1-32B-Preview, a reasoning model that’s competitive with an earlier version of OpenAI’s o1. “Remarkably, Sky-T1-32B-Preview was trained for less than $450,” the team wrote in a blog post, “demonstrating that it is possible to replicate high-level reasoning capabilities affordably and efficiently.”

And, no company has capitalized on the AI revolution more dramatically than Nvidia. The world’s leading high-performance GPU maker has used its ballooning fortunes to significantly increase investments in all sorts of startups but particularly in AI startups.

Continue reading “Mark Zuckerberg Says AI Could Soon Do The Work Of Meta’s Midlevel Engineers” »

Jan 11, 2025

Dr. Debra Whitman, Ph.D. — Chief Public Policy Officer, AARP — Author, The Second Fifty

Posted by in categories: economics, education, government, life extension, mathematics, policy, security

Exploring the most important questions we face as we age.


Dr. Debra Whitman, Ph.D. is Executive Vice President and Chief Public Policy Officer, at AARP (https://www.aarp.org/) where she leads policy development, analysis and research, as well as global thought leadership supporting and advancing the interests of individuals age 50-plus and their families. She oversees AARP’s Public Policy Institute, AARP Research, Office of Policy Development and Integration, Thought Leadership, and AARP International.

Continue reading “Dr. Debra Whitman, Ph.D. — Chief Public Policy Officer, AARP — Author, The Second Fifty” »

Jan 11, 2025

Dr. Nahid Bhadelia, MD — Founding Director, BU Center on Emerging Infectious Diseases (CEID)

Posted by in categories: biotech/medical, education, health, policy, security, surveillance

Improving Global Resilience Against Emerging Infectious Threats — Dr. Nahid Bhadelia, MD — Founding Director, Center on Emerging Infectious Diseases (CEID), Boston University.


Dr. Nahid Bhadelia, MD, MALD is a board-certified infectious diseases physician who is the Founding Director of BU Center on Emerging Infectious Diseases (https://www.bu.edu/ceid/about-the-cen…) as well an Associate Professor at the BU School of Medicine. She served the Senior Policy Advisor for Global COVID-19 Response for the White House COVID-19 Response Team in 2022–2023, where she coordinated the interagency programs for global COVID-19 vaccine donations from the United States and was the policy lead for Project NextGen, $5B HHS program aimed at developing next generation vaccines and treatments for pandemic prone coronaviruses. She also served as the interim Testing Coordinator for the White House MPOX Response Team. She is the Director and co-founder of Biothreats Emergence, Analysis and Communications Network (BEACON), an open source outbreak surveillance program.

Continue reading “Dr. Nahid Bhadelia, MD — Founding Director, BU Center on Emerging Infectious Diseases (CEID)” »

Jan 10, 2025

Navigating The Digital Frontier: The Security Of Modern Applications

Posted by in categories: business, security

The security of applications is not just a technical issue but a cornerstone of business integrity and continuity.

Jan 10, 2025

AI categorizes 700 million aurora images for better geomagnetic storm forecasting

Posted by in categories: particle physics, robotics/AI, security

The aurora borealis, or northern lights, is known for a stunning spectacle of light in the night sky, but this near-Earth manifestation, which is caused by explosive activity on the sun and carried by the solar wind, can also interrupt vital communications and security infrastructure on Earth. Using artificial intelligence, researchers at the University of New Hampshire have categorized and labeled the largest-ever database of aurora images that could help scientists better understand and forecast the disruptive geomagnetic storms.

The research, recently published in the Journal of Geophysical Research: Machine Learning and Computation, developed artificial intelligence and machine learning tools that were able to successfully identify and classify over 706 million images of auroral phenomena in NASA’s Time History of Events and Macroscale Interactions during Substorms (THEMIS) data set collected by twin spacecrafts studying the space environment around Earth. THEMIS provides images of the night sky every three seconds from sunset to sunrise from 23 different stations across North America.

“The massive dataset is a valuable resource that can help researchers understand how the interacts with the Earth’s magnetosphere, the protective bubble that shields us from charged particles streaming from the sun,” said Jeremiah Johnson, associate professor of applied engineering and sciences and the study’s lead author. “But until now, its huge size limited how effectively we can use that data.”

Jan 8, 2025

UN aviation agency investigating ‘potential’ security breach

Posted by in categories: security, transportation

On Monday, the United Nations’ International Civil Aviation Organization (ICAO) announced it was investigating what it described as a “reported security incident.”

Established in 1944 as an intergovernmental organization, this United Nations agency works with 193 countries to support the development of mutually recognized technical standards.

“ICAO is actively investigating reports of a potential information security incident allegedly linked to a threat actor known for targeting international organizations,” ICAO said in a statement.

Jan 8, 2025

Malicious Browser Extensions are the Next Frontier for Identity Attacks

Posted by in category: security

A recent campaign targeting browser extensions illustrates that they are the next frontier in identity attacks. Learn more about these attacks from LayerX Security and how to receive a free extension audit.

Jan 7, 2025

How we classify flood risk may give developers and home buyers a false sense of security

Posted by in categories: habitats, security

Common methods of communicating flood risk may create a false sense of security, leading to increased development in areas threatened by flooding.

This phenomenon, called the “safe development paradox,” is described in a new paper from North Carolina State University. Lead author Georgina Sanchez, a research scholar in NC State’s Center for Geospatial Analytics, said this may be an unintended byproduct of how the Federal Emergency Management Agency classifies areas based on their probability of dangerous flooding.

The findings are published in the journal PLOS ONE.

Jan 6, 2025

Quantum Teleportation Made Possible! Scientists Achieved Near-Perfect Results

Posted by in categories: computing, internet, quantum physics, security, space

Discover the groundbreaking world of quantum teleportation! Learn how scientists are revolutionizing data transfer using quantum entanglement, enabling secure, instant communication over vast distances. From integrating quantum signals into everyday internet cables to overcoming challenges like noise, this technology is reshaping our future. Explore the possibilities of a quantum internet and its role in computing and security. Watch our full video for an engaging dive into how quantum teleportation works and why it’s a game-changer for technology. Don’t miss out!

Paper link: https://journals.aps.org/prl/abstract

Continue reading “Quantum Teleportation Made Possible! Scientists Achieved Near-Perfect Results” »

Dec 27, 2024

AI’s Achilles’ Heel: Researchers Expose Major Model Security Flaw

Posted by in categories: robotics/AI, security

Researchers used electromagnetic signals to steal and replicate AI models from a Google Edge TPU with 99.91% accuracy, exposing significant vulnerabilities in AI systems and calling for urgent protective measures.

Researchers have shown that it’s possible to steal an artificial intelligence (AI) model without directly hacking the device it runs on. This innovative technique requires no prior knowledge of the software or architecture supporting the AI, making it a significant advancement in model extraction methods.

“AI models are valuable, we don’t want people to steal them,” says Aydin Aysu, co-author of a paper on the work and an associate professor of electrical and computer engineering at North Carolina State University. “Building a model is expensive and requires significant computing sources. But just as importantly, when a model is leaked, or stolen, the model also becomes more vulnerable to attacks – because third parties can study the model and identify any weaknesses.”

Page 1 of 14912345678Last