БЛОГ

Archive for the ‘security’ category: Page 68

Feb 27, 2020

Eric Schmidt: I Used to Run Google. Silicon Valley Could Lose to China

Posted by in categories: economics, government, security

But in recent years, Americans — Silicon Valley leaders included — have put too much faith in the private sector to ensure U.S. global leadership in new technology. Now we are in a technology competition with China that has profound ramifications for our economy and defense — a reality I have come to appreciate as chairman of two government panels on innovation and national security. The government needs to get back in the game in a serious way.


We can’t win the technology wars without the federal government’s help.

Feb 24, 2020

The view of quantum threats – from the front lines

Posted by in categories: computing, encryption, quantum physics, security

Quantum computing might initially sound like a far-fetched futuristic idea, but companies such as Amazon, Google, and IBM are putting their weight behind it and preparations have begun. With quantum computing potentially within our reach, what will happen to our current security models and modern-day encryption? See what security experts are doing to prepare for quantum threats.

The future is here. Or just about. After a number of discoveries, researchers have proven that quantum computing is possible and on its way. The wider world did not pause long on this discovery: Goldman Sachs, Amazon, Google, and IBM have just announced their own intentions to embark on their own quantum developments.

Now that it’s within our reach we have to start seriously considering what that means in the real world. Certainly, we all stand to gain from the massive benefits that quantum capabilities can bring, but so do cybercriminals.

Feb 23, 2020

Philip Haney, DHS whistleblower, found dead, police say

Posted by in categories: biotech/medical, security, weapons

Department of Homeland Security (DHS) whistleblower Philip Haney was found dead in Amador County, Calif., on Friday, according to local authorities.

Haney, 66, “appeared to have suffered a single, self-inflicted gunshot wound,” the Amador County Sheriff’s Office said in a release. Sheriff and coroner Martin A. Ryan shared the initial details of the case.

“On February 21, 2020 at approximately 1012 hours, deputies and detectives responded to the area of Highway 124 and Highway 16 in Plymouth to the report of a male subject on the ground with a gunshot wound,” the release read.

Feb 21, 2020

Moscow deploys facial recognition technology for coronavirus quarantine

Posted by in categories: biotech/medical, robotics/AI, security, surveillance

Sobyanin said last month that the city had begun using facial recognition as part of its city security surveillance programme.

Kremlin spokesman Dmitry Peskov said he had not seen details of the actions being taken in Moscow but that measures to curb the spread of the coronavirus should not be discriminatory.

The clamp down on quarantine rules comes after a woman in St. Petersburg staged an elaborate escape from a hospital where she said she was being kept against her will.

Feb 21, 2020

LA hospital trades in badges for facial biometrics-only secure access control from Alcatraz AI

Posted by in categories: biotech/medical, privacy, robotics/AI, security

Martin Luther King Jr. Community Hospital in Los Angeles is using biometric facial recognition technology from Alcatraz AI to replace or augment badges for physical security and access control, the company has revealed to Biometric Update.

The Alcatraz AI 3D Rock Facial Authentication Platform was integrated with MLKCH’s access control system to strengthen identity verification procedures for its 70 security department employees. The hospital, which employs more than 2,000 people, considered biometric card reader options, and selected Alcatraz Rock to secure access to its security center.

“The security department was a natural place to start with coverage from the Alcatraz Rock and facial recognition access control,” says MLKCH Director of Support Services Mark Reed in a case study by Alcatraz 3D. “Our security department obviously has a huge role in maintaining a safe and secure hospital environment for patients, staff, and guests and therefore houses important employees and information. Controlling access to this security area is key and we wanted to ensure that only those individuals that are supposed to be coming and going are the ones that are actually coming and going. What better way is there to verify identity than with facial recognition?”

Feb 20, 2020

Mixed-signal hardware security thwarts powerful electromagnetic attacks

Posted by in categories: encryption, information science, internet, security

Security of embedded devices is essential in today’s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages.

When these computationally secure encryption algorithms are implemented on a physical hardware, they leak critical side-channel information in the form of power consumption or electromagnetic radiation. Now, Purdue University innovators have developed technology to kill the problem at the source itself—tackling physical-layer vulnerabilities with physical-layer solutions.

Continue reading “Mixed-signal hardware security thwarts powerful electromagnetic attacks” »

Feb 20, 2020

Who Should Know Where A Drone Pilot Is Located?

Posted by in categories: drones, mobile phones, security

As American drone operators try to understand how the U.S. Federal Aviation Administration’s (FAA) drone Remote Identification proposal would affect them, one of the most concerning issues is proving to be the requirement that every drone transmit the location of its pilot in near-real time.

The ability to locate a drone pilot is extremely useful for police, airports and other authorities to quickly resolve safety and security challenges, but we also understand why some drone pilots don’t want their location available to just anyone. DJI, like other companies innovating Remote ID systems, must follow the FAA’s lead on pilot location, so our demonstration solutions have made that information available to anyone with a smartphone. But that requirement isn’t final.

Now, two new developments are shining a spotlight on the FAA’s proposed pilot location requirement – and at just the right time when American drone pilots can make their voices heard about it.

Feb 16, 2020

PepsiCo: The Future Of Food

Posted by in categories: biotech/medical, business, food, life extension, security, sustainability

PepsiCo’s Senior VP of R&D, Dr. Ellen de Brabander, joins me on this ideaXme (http://radioideaxme.com/) episode to talk about running the R&D engine for a $200 billion company, the parallels between pharma and food in terms of increasing customization / personalization, and her future visions for the $8 trillion global food and beverage space — (Personal caveat — While I avoid processed foods, one cannot ignore the place at the table that “big food” will have in crafting and investing in the future of health, wellness, and longevity) — https://www.youtube.com/watch?v=tDSiVlKNnRA&t=1 #Ideaxme #Pepsi #Nutrition #Research #Science #Health #Wellness #Sustainablity #Longevity #FritoLay #Tropicana #QuakerOats #Gatorade #Aquafina #MountainDew #Doritos #Cheetos #Ruffles #Tostitos #Fritos #Biotech #LifeExtension #Aging #IraPastor #Bioquark #Regenerage


Ira Pastor, ideaXme exponential health ambassador, interviews Dr. Ellen de Brabander, Senior Vice President Research and Development at PepsiCo.

Continue reading “PepsiCo: The Future Of Food” »

Feb 16, 2020

Facebook boss calls for rules on ‘harmful content’

Posted by in category: security

Facebook boss Mark Zuckerberg has called for more regulation of harmful online content, saying it was not for companies like his to decide what counts as legitimate free speech.

Citing China, Mr Zuckerberg also warned excessive control risked stifling individual expression.

He was speaking at the Munich Security Conference in Germany.

Feb 14, 2020

Study unveils security vulnerabilities in EEG-based brain-computer interfaces

Posted by in categories: information science, robotics/AI, security

Brain-computer interfaces (BCIs) are tools that can connect the human brain with an electronic device, typically using electroencephalography (EEG). In recent years, advances in machine learning (ML) have enabled the development of more advanced BCI spellers, devices that allow people to communicate with computers using their thoughts.

So far, most studies in this area have focused on developing BCI classifiers that are faster and more reliable, rather than investigating their possible vulnerabilities. Recent research, however, suggests that algorithms can sometimes be fooled by attackers, whether they are used in computer vision, speech recognition, or other domains. This is often done using , which are tiny perturbations in data that are indistinguishable by humans.

Researchers at Huazhong University of Science and Technology have recently carried out a study investigating the security of EEG-based BCI spellers, and more specifically, how they are affected by adversarial perturbations. Their paper, pre-published on arXiv, suggests that BCI spellers are fooled by these perturbations and are thus highly vulnerable to adversarial attacks.

Page 68 of 128First6566676869707172Last