Menu

Blog

Archive for the ‘security’ category: Page 41

Jun 30, 2022

What is Shadow IT and why is it so risky?

Posted by in categories: internet, security

Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department. Users may resort to using shadow IT practices when they feel that existing IT policies are too restrictive or get in the way of them being able to do their jobs effectively.

An old school phenomenon

Shadow IT is not new. There have been countless examples of widespread shadow IT use over the years. In the early 2000s, for example, many organizations were reluctant to adopt Wi-Fi for fear that it could undermine their security efforts. However, users wanted the convenience of wireless device usage and often deployed wireless access points without the IT department’s knowledge or consent.

Jun 29, 2022

FCC commissioner urges TikTok be removed from Apple, Google stores over ‘unacceptable national security risk’

Posted by in category: security

FCC chief Brendan Carr urged the CEOs of Google and Apple to remove TikTok from their stores, arguing that Chinese “data harvesting” poses an “unacceptable national security risk.”

Jun 28, 2022

McMaster says AI can help beat adversaries, overcome ‘critical challenges’

Posted by in categories: policy, robotics/AI, security, sustainability

WASHINGTON — Artificial intelligence and related digital tools can help warn of natural disasters, combat global warming and fast-track humanitarian aid, according to retired Army Lt. Gen. H.R. McMaster, a onetime Trump administration national security adviser.

It can also help preempt fights, highlight incoming attacks and expose weaknesses the world over, he said May 17 at the Nexus 22 symposium.

The U.S. must “identify aggression early to deter it,” McMaster told attendees of the daylong event focused on autonomy, AI and the defense policy that underpins it. “This applies to our inability to deter conflict in Ukraine, but also the need to deter conflict in other areas, like Taiwan. And, of course, we have to be able to respond to it quickly and to maintain situational understanding, identify patterns of adversary and enemy activity, and perhaps more importantly, to anticipate pattern breaks.”

Jun 28, 2022

In Its Greatest Biology Feat Yet, AI Unlocks the Complex Proteins Guarding Our DNA

Posted by in categories: biotech/medical, genetics, information science, robotics/AI, security

Yet when faced with enormous protein complexes, AI faltered. Until now. In a mind-bending feat, a new algorithm deciphered the structure at the heart of inheritance—a massive complex of roughly 1,000 proteins that helps channel DNA instructions to the rest of the cell. The AI model is built on AlphaFold by DeepMind and RoseTTAfold from Dr. David Baker’s lab at the University of Washington, which were both released to the public to further experiment on.

Our genes are housed in a planet-like structure, dubbed the nucleus, for protection. The nucleus is a high-security castle: only specific molecules are allowed in and out to deliver DNA instructions to the outside world—for example, to protein-making factories in the cell that translate genetic instructions into proteins.

Continue reading “In Its Greatest Biology Feat Yet, AI Unlocks the Complex Proteins Guarding Our DNA” »

Jun 27, 2022

Self-sensing artificial muscle-based on liquid crystal elastomer and low-melting point alloys

Posted by in categories: bioengineering, biotech/medical, cyborgs, food, life extension, robotics/AI, security

Materials scientists and bioengineers at the intersection of regenerative medicine and bioinspired materials seek to develop shape-programmable artificial muscles with self-sensing capabilities for applications in medicine. In a new report now published in Science Advances, Haoran Liu and a team of researchers in systems and communications engineering at the Frontier Institute of Science and Technology, Jiaotong University, China, were inspired by the coupled behavior of muscles, bones, and nerve systems of mammals and other living organisms to create a multifunctional artificial muscle in the lab. The construct contained polydopamine-coated liquid crystal elastomer (LCE) and low-melting point alloys (LMPA) in a concentric tube or rod. While the team adopted the outer liquid crystal-elastomer to mimic reversible contraction and recovery, they implemented the inner low-melting point alloy for deformation locking and to detect resistance mechanics, much like bone and nerve functions, respectively. The artificial muscle demonstrated a range of performances, including regulated bending and deformation to support heavy objects, and is a direct and effective approach to the design of biomimetic soft devices.

Soft robotics inspired by the skeleton–muscle–nerve system

Scientists aim to implement biocompatibility between soft robotic elements and human beings for assisted movement and high load-bearing capacity; however, such efforts are challenging. Most traditional robots are still in use in industrial, agricultural and aerospace settings for high-precision sensor-based, load-bearing applications. Several functional soft robots contrastingly depend on materials to improve the security of human-machine interactions. Soft robots are therefore complementary to hard robots and have tremendous potential for applications. Biomimetic constructs have also provided alternative inspiration to emulate the skeleton-muscle-nerve system to facilitate agile movement and quick reaction or thinking, with a unique body shape to fit tasks and perform diverse physiological functions. In this work, Liu et al were inspired by the fascinating idea of biomimicry to develop multifunctional artificial muscles for smart applications.

Jun 24, 2022

Biometric authentication using breath

Posted by in categories: chemistry, privacy, robotics/AI, security

An artificial nose, which is combined with machine learning and built with a 16-channel sensor array was found to be able to authenticate up to 20 individuals with an average accuracy of more than 97%.

“These techniques rely on the physical uniqueness of each individual, but they are not foolproof. Physical characteristics can be copied, or even compromised by injury,” explains Chaiyanut Jirayupat, first author of the study. “Recently, human scent has been emerging as a new class of biometric authentication, essentially using your unique chemical composition to confirm who you are.”

The team turned to see if human breath could be used after finding that the skin does not produce a high enough concentration of volatile compounds for machines to detect.

Jun 24, 2022

More than 770 million records available through the Travis CI API: Anyone can extract tokens, secrets, and other credentials associated with services like GitHub, AWS, and Docker Hub

Posted by in category: security

Software development and testing platform Travis CI confirmed the second incident of exposing its users’ data in less than a year. On this occasion, the compromised records include authentication tokens that would allow access to platforms such as AWS, GitHub, and Docker Hub.

According to a report prepared by the firm Aqua Security, tens of thousands of user tokens would have been exposed through the Travis CI API, which contains more than 770 million records with multiple types of credentials belonging to users of free subscriptions.

Continue reading “More than 770 million records available through the Travis CI API: Anyone can extract tokens, secrets, and other credentials associated with services like GitHub, AWS, and Docker Hub” »

Jun 22, 2022

Sniffing out your identity with breath biometrics

Posted by in categories: mobile phones, privacy, robotics/AI, security

Biometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as fingerprint verification and facial recognition are now common features on many of our phones.

Now, researchers have developed a new potential odorous option for the security toolkit: your breath. In a report published in Chemical Communications, researchers from Kyushu University’s Institute for Materials Chemistry and Engineering, in collaboration with the University of Tokyo, have developed an olfactory sensor capable of identifying individuals by analyzing the compounds in their breath.

Combined with machine learning, this “artificial nose,” built with a 16-channel sensor array, was able to authenticate up to 20 individuals with an average accuracy of more than 97%.

Jun 21, 2022

Quantum Artificial Intelligence | My PhD at MIT

Posted by in categories: information science, quantum physics, robotics/AI, security

Algorithms, Shor’s Quantum Factoring Algorithm for breaking RSA Security, and the Future of Quantum Computing.

▬ In this video ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
I talk about my PhD research at MIT in Quantum Artificial Intelligence. I also explain the basic concepts of quantum computers, and why they are superior to conventional computers for specific tasks. Prof. Peter Shor, the inventor of Shor’s algorithm and one of the founding fathers of Quantum Computing, kindly agreed to participate in this video.

Continue reading “Quantum Artificial Intelligence | My PhD at MIT” »

Jun 20, 2022

Microsoft Lasers Music into Glass for 1000 Years of Storage

Posted by in categories: food, information science, media & arts, nanotechnology, robotics/AI, security

Philip Glass to release a short silence on the matter.


The music vault is a parallel project to the Global Seed Vault (opens in new tab), which keeps the seeds of today’s trees and plants safe for the future, just in case we need to rebuild agriculture for any reason. The vault is located on the island of Spitsbergen, Norwegian territory, within the Arctic circle. It lacks tectonic activity, is permanently frozen, is high enough above sea level to stay dry even if the polar caps melt, and even if the worst happens, it won’t thaw out fully for 200 years. Just to be on the safe side, the main vault is built 120m into a sandstone mountain, and its security systems are said to be robust. As of June 2021, the seed vault had conserved 1,081,026 different crop samples.

The music is to be stored in a dedicated vault in the same mountain used by the seed vault. The glass used is an inert material, shaped into platters 75mm (3 inches) across and 2mm (less than 1/8th of an inch) thick. A laser encodes data in the glass by creating layers of three-dimensional nanoscale gratings and deformations. Machine learning algorithms read the data back by decoding images and patterns created as polarized light shines through the glass. The silica glass platters are fully resistant to electromagnetic pulses and the most challenging of environmental conditions. It can be baked, boiled, scoured and flooded without degradation of the data written into the glass. Tests to see if it really does last many thousands of years, however, can be assumed to be ongoing.

Continue reading “Microsoft Lasers Music into Glass for 1000 Years of Storage” »

Page 41 of 134First3839404142434445Last