БЛОГ

Archive for the ‘security’ category: Page 86

Feb 21, 2020

Moscow deploys facial recognition technology for coronavirus quarantine

Posted by in categories: biotech/medical, robotics/AI, security, surveillance

Sobyanin said last month that the city had begun using facial recognition as part of its city security surveillance programme.

Kremlin spokesman Dmitry Peskov said he had not seen details of the actions being taken in Moscow but that measures to curb the spread of the coronavirus should not be discriminatory.

The clamp down on quarantine rules comes after a woman in St. Petersburg staged an elaborate escape from a hospital where she said she was being kept against her will.

Feb 21, 2020

LA hospital trades in badges for facial biometrics-only secure access control from Alcatraz AI

Posted by in categories: biotech/medical, privacy, robotics/AI, security

Martin Luther King Jr. Community Hospital in Los Angeles is using biometric facial recognition technology from Alcatraz AI to replace or augment badges for physical security and access control, the company has revealed to Biometric Update.

The Alcatraz AI 3D Rock Facial Authentication Platform was integrated with MLKCH’s access control system to strengthen identity verification procedures for its 70 security department employees. The hospital, which employs more than 2,000 people, considered biometric card reader options, and selected Alcatraz Rock to secure access to its security center.

“The security department was a natural place to start with coverage from the Alcatraz Rock and facial recognition access control,” says MLKCH Director of Support Services Mark Reed in a case study by Alcatraz 3D. “Our security department obviously has a huge role in maintaining a safe and secure hospital environment for patients, staff, and guests and therefore houses important employees and information. Controlling access to this security area is key and we wanted to ensure that only those individuals that are supposed to be coming and going are the ones that are actually coming and going. What better way is there to verify identity than with facial recognition?”

Feb 20, 2020

Mixed-signal hardware security thwarts powerful electromagnetic attacks

Posted by in categories: encryption, information science, internet, security

Security of embedded devices is essential in today’s internet-connected world. Security is typically guaranteed mathematically using a small secret key to encrypt the private messages.

When these computationally secure encryption algorithms are implemented on a physical hardware, they leak critical side-channel information in the form of power consumption or electromagnetic radiation. Now, Purdue University innovators have developed technology to kill the problem at the source itself—tackling physical-layer vulnerabilities with physical-layer solutions.

Continue reading “Mixed-signal hardware security thwarts powerful electromagnetic attacks” »

Feb 20, 2020

Who Should Know Where A Drone Pilot Is Located?

Posted by in categories: drones, mobile phones, security

As American drone operators try to understand how the U.S. Federal Aviation Administration’s (FAA) drone Remote Identification proposal would affect them, one of the most concerning issues is proving to be the requirement that every drone transmit the location of its pilot in near-real time.

The ability to locate a drone pilot is extremely useful for police, airports and other authorities to quickly resolve safety and security challenges, but we also understand why some drone pilots don’t want their location available to just anyone. DJI, like other companies innovating Remote ID systems, must follow the FAA’s lead on pilot location, so our demonstration solutions have made that information available to anyone with a smartphone. But that requirement isn’t final.

Now, two new developments are shining a spotlight on the FAA’s proposed pilot location requirement – and at just the right time when American drone pilots can make their voices heard about it.

Feb 16, 2020

PepsiCo: The Future Of Food

Posted by in categories: biotech/medical, business, food, life extension, security, sustainability

PepsiCo’s Senior VP of R&D, Dr. Ellen de Brabander, joins me on this ideaXme (http://radioideaxme.com/) episode to talk about running the R&D engine for a $200 billion company, the parallels between pharma and food in terms of increasing customization / personalization, and her future visions for the $8 trillion global food and beverage space — (Personal caveat — While I avoid processed foods, one cannot ignore the place at the table that “big food” will have in crafting and investing in the future of health, wellness, and longevity) — https://www.youtube.com/watch?v=tDSiVlKNnRA&t=1 #Ideaxme #Pepsi #Nutrition #Research #Science #Health #Wellness #Sustainablity #Longevity #FritoLay #Tropicana #QuakerOats #Gatorade #Aquafina #MountainDew #Doritos #Cheetos #Ruffles #Tostitos #Fritos #Biotech #LifeExtension #Aging #IraPastor #Bioquark #Regenerage


Ira Pastor, ideaXme exponential health ambassador, interviews Dr. Ellen de Brabander, Senior Vice President Research and Development at PepsiCo.

Continue reading “PepsiCo: The Future Of Food” »

Feb 16, 2020

Facebook boss calls for rules on ‘harmful content’

Posted by in category: security

Facebook boss Mark Zuckerberg has called for more regulation of harmful online content, saying it was not for companies like his to decide what counts as legitimate free speech.

Citing China, Mr Zuckerberg also warned excessive control risked stifling individual expression.

He was speaking at the Munich Security Conference in Germany.

Feb 14, 2020

Study unveils security vulnerabilities in EEG-based brain-computer interfaces

Posted by in categories: information science, robotics/AI, security

Brain-computer interfaces (BCIs) are tools that can connect the human brain with an electronic device, typically using electroencephalography (EEG). In recent years, advances in machine learning (ML) have enabled the development of more advanced BCI spellers, devices that allow people to communicate with computers using their thoughts.

So far, most studies in this area have focused on developing BCI classifiers that are faster and more reliable, rather than investigating their possible vulnerabilities. Recent research, however, suggests that algorithms can sometimes be fooled by attackers, whether they are used in computer vision, speech recognition, or other domains. This is often done using , which are tiny perturbations in data that are indistinguishable by humans.

Researchers at Huazhong University of Science and Technology have recently carried out a study investigating the security of EEG-based BCI spellers, and more specifically, how they are affected by adversarial perturbations. Their paper, pre-published on arXiv, suggests that BCI spellers are fooled by these perturbations and are thus highly vulnerable to adversarial attacks.

Feb 13, 2020

Quantum memories entangled over 50-kilometer cable

Posted by in categories: internet, particle physics, quantum physics, security

A team of researchers affiliated with several institutions in China has succeeded in sending entangled quantum memories over a 50-kilometer coiled fiber cable. In their paper published in the journal Nature, the group describes several experiments they conducted involving entangling quantum memory over long distances, the challenges they overcame, and problems still to be addressed.

Over the past several years, scientists have been working toward the development of a quantum internet—one very much the same as the present-day network, but with much stronger security. One such approach is based on the development of quantum keys that would allow parties to a private conversation to know that an interloper is eavesdropping, because doing so would change the state of the keys. But in such systems, measurements of the quantum state of the keys is required, which can be impacted by , making the approach nearly impractical.

Another approach involves using entangled particles to form a network—but this has proven to be difficult to implement because of the sensitivity of such particles and their short lifespan. But progress is being made. In this new effort, the researchers in China succeeded in entangling between buildings 20 kilometers apart and across 50 kilometers of coiled cable in their lab.

Feb 12, 2020

Spaceflight Industries to sell rideshare business to Japanese firms

Posted by in categories: business, satellites, security

WASHINGTON — Spaceflight Industries announced Feb. 11 it will sell its smallsat rideshare launch business to a pair of Japanese companies, allowing it to focus on its BlackSky geospatial business.

Spaceflight Industries said that Mitsui & Co., Ltd. and Yamasa Co., Ltd. will acquire its rideshare business, known as Spaceflight, Inc., for an undisclosed sum. Mitsui & Co. and Yamasa will own Spaceflight as a 50/50 joint venture. The companies said that they expect the deal to close in the second quarter of this year, after a review by the Committee on Foreign Investment in the United States (CFIUS) to examine any national security implications of the sale.

Spaceflight Industries said it will use the proceeds from the deal to accelerate the growth of BlackSky, its geospatial intelligence business that is developing a constellation of high-resolution imaging satellites. BlackSky has four satellites in orbit currently with another eight scheduled for launch this year.

Feb 11, 2020

These engineers are developing artificially intelligent hackers

Posted by in categories: robotics/AI, security

Circa 2016


In a sign of the autonomous security of the future, a $2m contest wants teams to build a system that can exploit rivals’ vulnerabilities while fixing its own.

Page 86 of 146First8384858687888990Last