БЛОГ

Archive for the ‘security’ category: Page 60

Feb 6, 2022

Your Cousin From Boston (Dynamics) :60

Posted by in categories: robotics/AI, security

**PARTY EDITION** Real robots. NO visual effects!

While working security at the Boston Dynamics robotics lab, Your Cousin From Boston gives a robot a Sam Adams. At least he brought a Wicked IPA Party Pack to share!

Feb 1, 2022

Over 20,000 data center management systems exposed to hackers

Posted by in categories: business, computing, security

Researchers have found over 20,000 instances of publicly exposed data center infrastructure management (DCIM) software that monitor devices, HVAC control systems, and power distribution units, which could be used for a range of catastrophic attacks.

Data centers house costly systems that support business storage solutions, operational systems, website hosting, data processing, and more.

The buildings that host data centers must comply with strict safety regulations concerning fire protection, airflow, electric power, and physical security.

Jan 29, 2022

Multiple clients for Sunflower Lab’s security drone-dock system

Posted by in categories: drones, robotics/AI, security

Sunflower Labs announces a flurry of client acquisitions of its security drone-in-dock Beehive System in both the US and Europe.


San Carlos-based Sunflower Labs has announced a spate of new clients for its automated Beehive System security drone-and-dock, in deals ranging from Switzerland to the US South.

Continue reading “Multiple clients for Sunflower Lab’s security drone-dock system” »

Jan 28, 2022

Silkworm security? Researchers create new authentication method using silk fibers

Posted by in categories: materials, security

Academics say the material could be used to create unclonable physical components suitable for supporting digital security.

Jan 27, 2022

Meta Is Making a Monster AI Supercomputer for the Metaverse

Posted by in categories: encryption, information science, internet, robotics/AI, security, supercomputing

Though Meta didn’t give numbers on RSC’s current top speed, in terms of raw processing power it appears comparable to the Perlmutter supercomputer, ranked fifth fastest in the world. At the moment, RSC runs on 6,800 NVIDIA A100 graphics processing units (GPUs), a specialized chip once limited to gaming but now used more widely, especially in AI. Already, the machine is processing computer vision workflows 20 times faster and large language models (like, GPT-3) 3 times faster. The more quickly a company can train models, the more it can complete and further improve in any given year.

In addition to pure speed, RSC will give Meta the ability to train algorithms on its massive hoard of user data. In a blog post, the company said that they previously trained AI on public, open-source datasets, but RSC will use real-world, user-generated data from Meta’s production servers. This detail may make more than a few people blanch, given the numerous privacy and security controversies Meta has faced in recent years. In the post, the company took pains to note the data will be carefully anonymized and encrypted end-to-end. And, they said, RSC won’t have any direct connection to the larger internet.

To accommodate Meta’s enormous training data sets and further increase training speed, the installation will grow to include 16,000 GPUs and an exabyte of storage—equivalent to 36,000 years of high-quality video—later this year. Once complete, Meta says RSC will serve training data at 16 terabytes per second and operate at a top speed of 5 exaflops.

Jan 25, 2022

Twin-field quantum key distribution (QKD) across an 830-km fibre

Posted by in categories: computing, encryption, internet, quantum physics, security

By using quantum key distribution (QKD), quantum cryptographers can share information via theoretic secure keys between remote peers through physics-based protocols. The laws of quantum physics dictate that photons carrying signals cannot be amplified or relayed through classical optical methods to maintain quantum security. The resulting transmission loss of the channel can limit its achievable distance to form a huge barrier to build large-scale quantum secure networks. In a new report now published in Nature Photonics, Shuang Wang and a research team in quantum information, cryptology and quantum physics in China developed an experimental QKD system to tolerate a channel loss beyond 140 dB across a secure distance of 833.8 km to set a new record for fiber-based quantum key distribution. Using the optimized four-phase twin-field protocol and high quality setup, they achieved secure key rates that were more than two orders of magnitude greater than previous records across similar distances. The results form a breakthrough to build reliable and terrestrial quantum networks across a scale of 1,000 km.

Quantum cryptography and twin-field quantum key distribution (QKD)

Quantum key distribution is based on fundamental laws of physics to distribute secret bits for information-theoretic secure communication, regardless of the unlimited computational power of a potential eavesdropper. The process has attracted widespread attention in the past three decades relative to the development of a global quantum internet, and matured to real-world deployment through optical-fiber networks. Despite this, wider applications of QKD are limited due to channel loss, limiting increase in the key rate and range of QKD. For example, photons are carriers of quantum keys in a QKD setup, and they can be prepared at the single-photon level to be scattered and absorbed by the transmission channel. The photons, however, cannot be amplified, and therefore the receiver can only detect them with very low probability. When transmitted via a direct fiber-based link from the transmitter to the receiver, the key rate can therefore decrease with transmission distance.

Jan 21, 2022

Meat-based vs Plant-based Diet for Longevity | David Sinclair and Lex Fridman

Posted by in categories: genetics, life extension, security

Lex Fridman Podcast full episode: https://www.youtube.com/watch?v=jhKZIq3SlYE
Please support this podcast by checking out our sponsors:
- Onnit: https://lexfridman.com/onnit to get up to 10% off.
- Clear: https://clearme.com/lexpod and use code LexPod to get 2 months free.
- National Instruments (NI): https://www.ni.com/perspectives.
- SimpliSafe: https://simplisafe.com/lex and use code LEX to get a free security camera.
- Linode: https://linode.com/lex to get $100 free credit.

GUEST BIO:
David Sinclair is a geneticist at Harvard and author of Lifespan.

Continue reading “Meat-based vs Plant-based Diet for Longevity | David Sinclair and Lex Fridman” »

Jan 21, 2022

Research demonstrates a new technique for improving long-distance quantum key distribution in a real-world field

Posted by in categories: particle physics, quantum physics, security

An experiment, performed by Istituto Nazionale di Ricerca Metrologica (INRIM) on 200 km of the Italian Quantum Backbone, in collaboration with Toshiba Europe, shows that coherent laser interferometry considerably improves the performances of quantum key distribution protocols in long-distance, real-world networks. The study has been published in Nature Communications.

Quantum Key Distribution (QKD) protocols enable cryptographic keys to be shared between distant parties with an intrinsic security guaranteed by the laws of quantum mechanics. This is made possible by the transmission of single photons, the elementary particles of which light is made of.

The interest for this subject extends well beyond the scientific community, and has now a strong strategic and commercial relevance. The European Commission, within the “European Quantum Communication Infrastructure” intitative, aims at integrating quantum key distribution technologies into specific services throughout the European Union within the next 10 years, and INRIM will take part in the design of this infrastructure with the OQTAVO project.

Jan 21, 2022

Cisco Issues Patch for Critical RCE Vulnerability in RCM for StarOS Software

Posted by in category: security

Cisco Systems has rolled out fixes for a critical security flaw affecting Redundancy Configuration Manager (RCM) for Cisco StarOS Software.


Google researchers detail two zero-day vulnerabilities reported in Zoom client software and MMR servers.

Jan 20, 2022

Android users can now disable 2G to block Stingray attacks

Posted by in categories: mobile phones, security

Google has finally rolled out an option on Android allowing users to disable 2G connections, which come with a host of privacy and security problems exploited by cell-site simulators.

The addition of the option was spotted by EFF (Electronic Frontier Foundation), which calls the development a victory for privacy protection.

Page 60 of 146First5758596061626364Last