Menu

Blog

Archive for the ‘security’ category: Page 5

Jun 23, 2024

Scientists Invent Smartphone Chip That Peers Through Barriers With Electromagnetic Waves

Posted by in categories: computing, mobile phones, security, transportation

For more than 15 years, a group of scientists in Texas have been hard at work creating smaller and smaller devices to “see” through barriers using medium-frequency electromagnetic waves — and now, they seem closer than ever to cracking the code.

In an interview with Futurism, electrical engineering professor Kenneth O of the University of Texas explained that the tiny new imager chip he made with the help of his research team, which can detect the outlines of items through barriers like cardboard, was the result of repeat advances and breakthroughs in microprocessor technology over the better half of the last two decades.

“This is actually similar technology as what they’re using at the airport for security inspection,” O told us.

Jun 22, 2024

Researchers achieve practical 3D tracking at record-breaking speeds

Posted by in categories: robotics/AI, security, surveillance

Researchers have developed a new 3D method that can be used to track fast-moving objects at unprecedented high speeds. The real-time tracking approach, which is based on single-pixel imaging, could be used to improve autonomous driving, industrial inspection and security surveillance systems.

Jun 19, 2024

Inside SingularityNET | June 2024

Posted by in categories: finance, robotics/AI, security, singularity, space

Watch June’s edition of Inside SingularityNET, featuring exciting news and insightful updates on our AGI R\&D, decentralized AI platform development, progressive decentralization, and broader ecosystem developments.

00:00 — Intro | AI Twin — Dr. Ben Goertzel.
00:48 — Dr. Matt Iklé | CSO — SingularityNET
04:09 — Sergey Shalyapin | CTO — SingularityNET
08:07 — Vita Potapova | Hyperon Project Manager — SingularityNET
13:19 — Alex Blagirev | SIO — SingularityNET
19:10 — Haley Lowy | Marketing Lead — SingularityNET
24:57 — Jan Horlings | CEO — Deep Funding.
31:23 — Esther Galfalvi | Decentralization Program Lead — SingularityNET
34:11 — Peter Elfrink | Community Lead — SingularityNET
35:52 — Stacey Engle | CEO — Twin Protocol.
39:45 — Jennifer Bourke | Marketing and Community Lead — NuNet.
45:02 — Jerry Hall | Marketing Lead — HyperCycle.
47:21 — Patrik Gudev l CEO — Jam Galaxy.
52:23 — Robin Spottiswoode l CTO — Jam Galaxy.
54:40 — Rebekah Pennington | Partnerships and Community — Yaya Labs.
56:03 — Kennedy Schaal | CEO — Rejuve. BIO

Continue reading “Inside SingularityNET | June 2024” »

Jun 15, 2024

MIT researchers ordered and combined parts of the 1918 pandemic influenza virus. Did they expose a security flaw?

Posted by in categories: biotech/medical, security

The authors of a new study were able to order all the synthetic genes necessary to reconstruct the 1918 pandemic influenza virus. Do their findings represent a security flaw in a critical area of biotechnology?

Jun 14, 2024

Google is making Chrome OS more like Android to deliver more AI features

Posted by in categories: mobile phones, robotics/AI, security

There are plenty of reasons why Google would be interested in going down this route. For example, closer integration would make Android handsets more compatible with Chromebooks. However, it appears the main reason for the move is to accelerate the delivery of AI features.

As the Mountain View-based firm explains, having Chrome OS lean more on Android’s tech stack will make it easier to bring new AI features to Chromebooks. The company adds that along with the change, it wants to maintain the “security, consistent look and feel, and extensive management capabilities” that users are acquainted with.

Google is working on the updates starting today, but notes that users won’t see the changes for a while. The tech giant claims that when everything is ready, the transition will be seamless.

Jun 13, 2024

Information-hiding camera: Optical technology conceals data in plain sight

Posted by in categories: innovation, security

Researchers at the University of California, Los Angeles (UCLA) have developed an innovative information-hiding camera to optically transform and conceal input images into ordinary-looking patterns, providing a powerful solution for visual information security. The work is published in the journal Science Advances.

Jun 11, 2024

Superbad — CIA Targeter Tracks Down #1 Enemy of Benghazi Attacks | SRS #116

Posted by in categories: security, terrorism

Sarah Adams (call sign: Superbad) is a former CIA Targeting Officer and author of Benghazi: Know Thy Enemy. Adams served as the Senior Advisor for the U.S. House of Representatives Select Committee on Benghazi. She conducted all-source investigations and oversight activities related to the 2012 Libya terrorist attacks and was instrumental in mitigating future security risks to U.S. personnel serving overseas. Adams remains one of the most knowledgeable individuals on active terrorism threats around the world.

Get Sarah’s intel briefing via the newsletter: https://shawnryanshow.com/pages/newsl

Continue reading “Superbad — CIA Targeter Tracks Down #1 Enemy of Benghazi Attacks | SRS #116” »

Jun 9, 2024

New PHP Vulnerability Exposes Windows Servers to Remote Code Execution

Posted by in categories: computing, security

Details have emerged about a new critical security flaw impacting PHP that could be exploited to achieve remote code execution under certain circumstances.

The vulnerability, tracked as CVE-2024–4577, has been described as a CGI argument injection vulnerability affecting all versions of PHP installed on the Windows operating system.

According to DEVCORE security researcher, the shortcoming makes it possible to bypass protections put in place for another security flaw, CVE-2012–1823.

Jun 9, 2024

Malicious VSCode extensions with millions of installs discovered

Posted by in category: security

A group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to “infect” over 100 organizations by trojanizing a copy of the popular ‘Dracula Official theme to include risky code. Further research into the VSCode Marketplace found thousands of extensions with millions of installs.

Visual Studio Code (VSCode) is a source code editor published by Microsoft and used by many professional software developers worldwide.

Microsoft also operates an extensions market for the IDE, called the Visual Studio Code Marketplace, which offers add-ons that extend the application’s functionality and provide more customization options.

Jun 9, 2024

AI firm Hugging Face discloses leak of secrets on its Spaces platform

Posted by in categories: robotics/AI, security

The disclosure notice also noted several security changes made to the Spaces platform in response to the leak, including the removal of org tokens to improve traceability and auditing capabilities, and the implementation of a key management service (KMS) for Spaces secrets.

Hugging Face said it plans to deprecate traditional read and write tokens “in the near future,” replacing them with fine-grained access tokens, which are currently the default.

Spaces users are recommended to switch their Hugging Face tokens to fine-grained access tokens if they are not already using them, and refresh any key or token that may have been exposed.

Page 5 of 142First23456789Last