БЛОГ

Archive for the ‘security’ category: Page 121

Jul 18, 2016

IBM Unveils New Cloud Blockchain Security Service

Posted by in categories: biotech/medical, bitcoin, security

I like this article because I have for years looked at options to address the counterfeiting issues which is a extremely costly criminal industry around diamonds and artwork. As we have seen with synthetic diamonds in their use in QC and medical technology there is a lot that technology can do in addressing the counterfeiting issues as well as registration & certification space. Also, could registered & embedded serialized stones be another form of id for the consumer who wears their accessory with the stone? I believe it can be.


IBM launches a new high security blockchain service that uses hardware to protect valuable data, with provenance startup Everledger as its first customer.

Read more

Jul 18, 2016

Researcher builds technology to control drone swarms with his mind

Posted by in categories: computing, drones, neuroscience, robotics/AI, security

About 5 years ago a friend of mine at Microsoft (Mitch S.) had a vision of making a new security model around drone swarms and a form of BMI technology. Glad to see the vision come true.


Scientists have discovered how to control multiple robotic drones using the human brain, an advance that can help develop swarms of search and rescue drones that are controlled just by thought.

Continue reading “Researcher builds technology to control drone swarms with his mind” »

Jul 18, 2016

Can we find a quantum-resistant algorithm before it’s too late?

Posted by in categories: computing, information science, internet, quantum physics, security

The warning from QuintessenceLabs’ CTO John Leisoboer is stark. “When sufficiently powerful quantum computers become generally available,” he says, “it’s guaranteed to break all existing cryptographic systems that we know of.”

In other words, he adds, “Everything that we’re doing today will be broken.”

It’s a sentiment echoed by Google’s Chrome security software engineer Matt Braithwaite who wrote in a blog post earlier this month that “a hypothetical, future quantum computer would be able to retrospectively decrypt any internet communication that was recorded today”.

Continue reading “Can we find a quantum-resistant algorithm before it’s too late?” »

Jul 11, 2016

Manoj Saxena talks Artificial Intelligence with Gigaom

Posted by in categories: finance, health, robotics/AI, security

Nice chime on QC.


Manoj Saxena is the executive chairman of CognitiveScale and a founding managing director of The Entrepreneurs’ Fund IV (TEF), a $100m seed fund focused exclusively on the cognitive computing space.

Saxena is also the chairman of Federal Reserve Bank of Dallas, San Antonio branch and Chairman, SparkCognition an Austin based cognitive security and safety analytics company.

Continue reading “Manoj Saxena talks Artificial Intelligence with Gigaom” »

Jul 11, 2016

Google Tests Post-Quantum Crypto

Posted by in categories: computing, internet, quantum physics, security

Good article overall; and yes QC is still evolving. However, to state Quantum networking is in its infancy is a wrong & misleading comment. Since 2009, Quantum Internet has been in beta at Los Alamos Labs. And, researchers will tell you that QC development can as far back as 1970s and the first official QC was introduced in 2009 when the first universal programmable quantum computer was introduced by University of Toronto’s Kim Luke.


Google has launched a two-year Chrome trial aimed at safeguarding the Internet against quantum computers, which security experts predict will shred all data.

Read more

Jul 8, 2016

Google to experiment with quantum computing-ready algorithms in Chrome

Posted by in categories: computing, information science, quantum physics, security

Google advances on QC with Chrome.


In preparation for a quantum computing future, Google is testing post-quantum algorithms in Chrome to ensure security in the future.

Read more

Jul 8, 2016

New security tool addresses Android app collusion threat

Posted by in category: security

As we reported last month app collusion, where apps work together to extract sensitive data, now represents a very real security risk to mobile devices.

To address this emerging threat, component technology firm Formaltech, today is releasing FUSE, a DARPA-funded tool that detects inter-application collusion and other vulnerabilities in Android apps.

The FUSE platform identifies potential security vulnerabilities and tracks information flow through multiple apps, revealing potential collusion between apps. The tool uses static binary analysis to detect vulnerabilities without requiring the source code of the apps, allowing security professionals to analyze third party apps without the need for vendor cooperation. It operates in the cloud, supporting Android app (APK) analysis from anywhere. Developers and testers can easily drill down into the FUSE interface when FUSE displays errors, warnings and informational alarms.

Read more

Jul 7, 2016

How do we improve security and e-governance? Toomas Hendrik Ilves

Posted by in categories: governance, security

“Estonia right now is one of the biggest champions of the digital single market in Europe.”

Read more

Jul 6, 2016

NSA to stand trial for spying on convicted bomber without warrant

Posted by in categories: government, internet, mobile phones, privacy, security, surveillance

You got to luv this one.


The security agency must defend itself in a US appeals court for violating the rights of a convicted bomber by supposedly illegally spying on him.

A US appeals court will weigh a constitutional challenge on Wednesday to a warrantless government surveillance program, brought by an Oregon man found guilty of attempting to detonate a bomb in 2010 during a Christmas tree-lighting ceremony.

Continue reading “NSA to stand trial for spying on convicted bomber without warrant” »

Jul 5, 2016

Quantum physics meets IT security

Posted by in categories: computing, government, quantum physics, security, singularity, space

Nice that they are trying to ensure this. However, as we integrate more tech into Biocomputing space and our efforts in achieving singularity; you will need some level of a medical/ or bio background.


It’s hard enough for IT security managers to keep with the latest in conventional computing. Cloud Security Alliance and the US government are trying to make sure you don’t need a physics degree, too.

Read more