БЛОГ

Archive for the ‘security’ category: Page 66

Apr 29, 2020

Las Vegas’ Venetian Resort will utilize thermal cameras, medics when it reopens

Posted by in categories: electronics, security

Thermal cameras sound like a great idea for folks who are looking for a false sense of security and/or lack a basic understanding of what being an asymptomatic carrier means…


When the Venetian Resort reopens following the lifting of Las Vegas’ stay-at-home order, it will empoy thermal screening and full-time medics.

Apr 24, 2020

America’s bomber force is facing a crisis

Posted by in categories: government, military, policy, security

The path forward begins with admitting the nation has a bomber shortfall. Retiring more aircraft exacerbates the problem. Nor is this just an Air Force problem. Bombers are national assets essential to our security strategy and must be prioritized accordingly. If other services have excess funds to invest in ideas like a 1,000-mile-range cannon when thousands of strike aircraft, various munitions and remotely piloted aircraft can fill the exact same mission requirements, it is time for a roles and missions review to direct funding toward the most effective, efficient options. Bombers would compete well in such an assessment. Ultimately, the solution demands doubling down on the B-21 program.

There comes a point where you cannot do more with less. Given the importance of bombers to the nation, rebuilding the bomber force is not an option — it is an imperative.

Retired U.S. Air Force Maj. Gen. Larry Stutzriem served as a fighter pilot and held various command positions. He concluded his service as the director of plans, policy and strategy at North American Aerospace Defense Command and U.S. Northern Command. He is currently the director of studies at the Mitchell Institute for Aerospace Studies, where Douglas Birkey is the executive director. Birkey researches issues relating to the future of aerospace and national security, and he previously served as the Air Force Association’s director of government relations.

Apr 23, 2020

Tesla to implement a key security feature ‘soon’

Posted by in categories: Elon Musk, security, sustainability, transportation

Tesla’s mobile app is one of the key parts of the Tesla ownership experience, and yet its security is lacking an important feature — two-factor authentication.

According to CEO Elon Musk, this will change in the near future.

When asked on Twitter whether there are any updates regarding two-factor authentication for the app, Musk said it’s “coming soon” (via Teslarati).

Apr 22, 2020

Video shows thief stole van Gogh painting with sledgehammer

Posted by in categories: biotech/medical, security

THE HAGUE, Netherlands (AP) — All it took was a few sturdy swings with a sledgehammer and a prized painting by Vincent van Gogh was gone.

A Dutch crime-busting television show has aired security camera footage showing how an art thief smashed his way through reinforced glass doors at a museum in the early hours of March 30. He later hurried out through the museum gift shop with a Vincent van Gogh painting tucked under his right arm and the sledgehammer in his left hand.

Police hope that publicizing the images will help them track down the thief who stole Van Gogh’s “The Parsonage Garden at Nuenen in Spring 1884” from the Singer Laren Museum while it was shut down due to coronavirus containment measures.

Apr 17, 2020

About the Event 201 exercise

Posted by in categories: biotech/medical, business, economics, finance, government, health, policy, security

Talk being ahead of the curve;


Event 201 was a 3.5-hour pandemic tabletop exercise that simulated a series of dramatic, scenario-based facilitated discussions, confronting difficult, true-to-life dilemmas associated with response to a hypothetical, but scientifically plausible, pandemic. 15 global business, government, and public health leaders were players in the simulation exercise that highlighted unresolved real-world policy and economic issues that could be solved with sufficient political will, financial investment, and attention now and in the future.

The exercise consisted of pre-recorded news broadcasts, live “staff” briefings, and moderated discussions on specific topics. These issues were carefully designed in a compelling narrative that educated the participants and the audience.

Continue reading “About the Event 201 exercise” »

Apr 14, 2020

New electronic cooling technology to enable miniaturization of quantum computers

Posted by in categories: computing, quantum physics, security

VTT researchers have successfully demonstrated a new electronic refrigeration technology that could enable major leaps in the development of quantum computers. Present quantum computers require extremely complicated and large cooling infrastructure that is based on mixture of isotopes of helium. The new electronic cooling technology could replace these cryogenic liquid mixtures and enable miniaturization of quantum computers.

In this purely electrical refrigeration method, and thermal isolation operate effectively through the same point like junction. In the experiment the researchers suspended a piece of silicon from such junctions and refrigerated the object by feeding electrical current from one junction to another through the piece. The current lowered the thermodynamic temperature of the silicon object as much as 40% from that of the surroundings. This could lead to the miniaturization of future quantum computers, as it can simplify the required cooling infrastructure significantly. The discovery has been published in Science Advances.

“We expect that this newly discovered electronic cooling method could be used in several applications from the miniaturization of quantum computers to ultra-sensitive radiation sensors of the security field,” says Research Professor Mika Prunnila from VTT Technical Research Centre of Finland.

Apr 10, 2020

Billions Of Google Chrome Users Now Have Another Surprising Option

Posted by in categories: bitcoin, internet, security

Google Chrome has dominated the internet browser market for the last decade with a staggering near-60% market share and users stretching into the billions.

Rivals to Google Chrome, including Apple’s Safari, Microsoft’s Edge (formerly known as Internet Explorer), and Mozilla’s Firefox have largely failed to convince users to switch—but browser choices are becoming more complex.

Users’ desire for greater security, better privacy, and an ill-defined need to “take back control” from the likes of Google and Microsoft has opened the door for alternatives—including blockchain-based privacy browser Brave, whose chief executive thinks Google “is going to be taken apart over coming years.”

Apr 8, 2020

Attackers can bypass fingerprint authentication with an ~80% success rate

Posted by in categories: mobile phones, security

Although hackers managed to defeat TouchID with a fake fingerprint less than 48 hours after the technology was rolled out in the iPhone 5S, fingerprint-based authentication over the past few years has become much harder to defeat. Today, fingerprints are widely accepted as a safe alternative over passwords when unlocking devices in many, but not all, contexts.

A study published on Wednesday by Cisco’s Talos security group makes clear that the alternative isn’t suitable for everyone—namely those who may be targeted by nation-sponsored hackers or other skilled, well-financed, and determined attack groups. The researchers spent about $2,000 over several months testing fingerprint authentication offered by Apple, Microsoft, Samsung, Huawei, and three lock makers. The result: on average, fake fingerprints were able to bypass sensors at least once roughly 80 percent of the time.

The percentages are based on 20 attempts for each device with the best fake fingerprint the researchers were able to create. The results may not be fully applicable to Apple products since they limit users to five attempts before asking for the PIN or password. Other products tested permitted significantly more or even an unlimited number of unsuccessful tries.

Apr 7, 2020

DARPA seeks enhanced low-light navigation performance for unmanned systems

Posted by in categories: robotics/AI, security

A new programme from the US Defense Advanced Research Projects Agency (DARPA) aims to address a key weakness of autonomous and semi-autonomous land systems: the need for active illumination to navigate in low-light conditions.

Unmanned systems rely on active illumination — anything that emits light or electromagnetic radiation, such as light detection and ranging (LIDAR) systems — to navigate at night or underground.

However, according to Joe Altepeter, programme manager in DARPA’s Defense Sciences Office, this approach creates significant security concerns, as such emissions could be detected by potential adversaries.

Apr 7, 2020

Email provider got hacked, data of 600,000 users now sold on the dark web

Posted by in category: security

Italian email provider Email.it confirms security breach.

Page 66 of 128First6364656667686970Last