Toggle light / dark theme

Researchers from North Carolina State University and the University of Texas at Austin have developed a technique for detecting types of malware that use a system’s architecture to thwart traditional security measures. The new detection approach works by tracking power fluctuations in embedded systems.

“Embedded systems are basically any computer that doesn’t have a physical keyboard – from smartphones to Internet of Things devices,” says Aydin Aysu, co-author of a paper on the work and an assistant professor of electrical and computer engineering at NC State. “Embedded systems are used in everything from the voice-activated virtual assistants in our homes to industrial control systems like those used in . And that targets those systems can be used to seize control of these systems or to steal information.”

At issue are so-called micro-architectural attacks. This form of malware makes use of a system’s , effectively hijacking the hardware in a way that gives outside users control of the system and access to its data. Spectre and Meltdown are high-profile examples of micro-architectural malware.

Read more

You’ve never heard Dean Martin like this.

Researchers from the Harvard John A. Paulson School of Engineering and Applied Sciences transmitted a recording of Martin’s classic “Volare” wirelessly via a semiconductor laser—the first time a laser has been used as a radio transmitter.

In a paper published in the Proceedings of the National Academy of Sciences, the researchers demonstrated a laser that can emit microwaves wirelessly, modulate them, and receive external radio frequency signals.

Read more

Chinese technology companies are increasingly important and dynamic international actors. They are making critical contributions in a range of areas, from cutting edge research to enabling connectivity for developing countries. Yet, their rapid expansion and growing influence also bring a range of strategic and policy challenges. The Australian Strategic Policy Institute’s International Cyber Policy Centre has created a public database to map the global expansion of 12 key Chinese tech companies working across the telecommunications, internet & biotech sectors. It’s a tool for journalists, researchers, NGOs, policymakers and the interested public to better understand the enormous scale, complexity and increasing reach of some of China’s tech giants. On this website you’ll find:

Read more

University of Copenhagen researchers have developed a nanocomponent that emits light particles carrying quantum information. Less than one-tenth the width of a human hair, the miniscule component makes it possible to scale up and could ultimately reach the capabilities required for a quantum computer or quantum internet. The research result puts Denmark at the head of the pack in the quantum race.

Teams around the world are working to develop quantum technologies. The focus of researchers based at the Center for Hybrid Quantum Networks (Hy-Q) at the University of Copenhagen’s Niels Bohr Institute is on developing quantum communication technology based on light circuits, known as nanophotonic circuits. The UCPH researchers have now achieved a major advancement.

“It is a truly major result, despite the component being so tiny,” says Assistant Professor Leonardo Midolo, who has been working towards this breakthrough for the past five years.

Read more

Keith Comito, interviewed by Adam Ford at the Undoing Aging 2019 conference in Berlin, discusses why solving the diseases of old age is a powerful cause.


How can solving aging reduce suffering? What are some common objections to the ideas of solving aging? How does Anti-Aging stack up against other cause…

Read more

Imagine being able to play a song on your computer just by thinking of its title. Or transmitting your thoughts to a friend over the internet without uttering a word. Scientists have now invented a ‘sewing machine’ capable of stitching electrodes into the brain, which may one day help to make such things a reality.

Read more