Menu

Blog

Archive for the ‘security’ category: Page 116

Aug 4, 2016

Welcome to DARPA’s Cyber Grand Challenge

Posted by in categories: computing, robotics/AI, security

The ultimate test of wits in computer security occurs through open competition on the global Capture the Flag (CTF) tournament circuit. In CTF contests, experts reverse engineer software, probe its weaknesses, search for deeply hidden flaws, and create securely patched replacements.

On August 4, 2016, DARPA will hold the Cyber Grand Challenge, the world’s first all-computer CTF tournament. It will take place live on stage co-located with the DEF CON conference in Las Vegas. The public is invited to attend and observe as automated systems take the first steps towards a defensible, connected future.

Continue reading “Welcome to DARPA’s Cyber Grand Challenge” »

Aug 3, 2016

Would it be immoral to send out a generation starship?

Posted by in categories: biotech/medical, education, ethics, food, health, neuroscience, security, space travel

If human beings are ever to colonise other planets – which might become necessary for the survival of the species, given how far we have degraded this one – they will almost certainly have to use generation ships: spaceships that will support not just those who set out on them, but also their descendants. The vast distances between Earth and the nearest habitable planets, combined with the fact that we are unlikely ever to invent a way of travelling that exceeds the speed of light, ensures that many generations will be born, raised and die on board such a ship before it arrives at its destination.

A generation ship would have to be a whole society in microcosm, with hospitals and schools, living quarters and perhaps entertainment districts, a security force, maybe even a judiciary. It would need to be able to provide food for its crew, and that might require agriculture or aquaculture, perhaps even domestic animals (which might also be needed for the colonisation effort). Its design therefore presents a major challenge: not just to engineers but also to social scientists. How should the crew be selected and the environment structured to minimise interpersonal conflict? What size of population is optimal for it to remain committed to the single overarching project of colonising a new planet without too much of a risk of self-destructive boredom or excessive narrowing of the gene pool? Does mental health require that a quasi-natural environment be recreated within the ship (with trees, grass and perhaps undomesticated birds and small animals)?

As well as the technological and social challenges confronting the designers of such ships, there are fascinating philosophical and ethical issues that arise. The issue I want to focus on concerns the ethics of a project that locks the next generation into a form of living, the inauguration of which they had no say over, and that ensures their options are extremely limited.

Continue reading “Would it be immoral to send out a generation starship?” »

Aug 2, 2016

DARPA-Funded Project Could Develop New Technique for Wirelessly Monitoring Malicious Software on IoT Devices

Posted by in categories: internet, security

Could this help on the whole IoT security challenge — TBD.


A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.

The technique will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. These signals are produced by semiconductors, capacitors, power supplies and other components, and can currently be measured up to a half-meter away from operating IoT devices.

Continue reading “DARPA-Funded Project Could Develop New Technique for Wirelessly Monitoring Malicious Software on IoT Devices” »

Aug 2, 2016

Computers will be able to assess humans’ state of mind

Posted by in categories: biotech/medical, computing, robotics/AI, security

I see many uses for this such as provider services including front office & hospital admissions, security in assessing people in line or trying to gain entry, etc.


Machines are taking over more and more tasks. Ideally, they should also be capable to support the human in case of poor performance. To intervene appropriately, the machine should understand what is going on with the human. Fraunhofer scientists have developed a diagnostic tool that recognizes user states in real time and communicates them to the machine.

The camera firmly focuses on the driver’s eyes. If they are closed for more than one second, an alarm is triggered. This technique prevents the dangerous micro-sleep at the wheel. “It is not always as easy for a machine to detect what state the human is in, as it is in this case,” says Jessica Schwarz from the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE in Wachtberg, just south of Bonn.

Continue reading “Computers will be able to assess humans’ state of mind” »

Aug 2, 2016

Pass the hash for peace, love and security in the quantum computing age

Posted by in categories: computing, encryption, quantum physics, security

Excellent write up on a paper submitted to the International Association for Cryptologic Research, by a group of UK and Belgian researchers are offering up a dig-sig scheme to assist in the addressing of Digital signatures (one of the fundamental parts of cryptography) in a post-quantum world. Expect the heat to rise on QC security as China’s launch date nears for the new Quantum Satellite.


Boffins smokin’ idea to share parts of keys to cook quantum-proof crypto.

Read more

Jul 30, 2016

China, Russia vow measures to tackle THAAD deployment

Posted by in category: security

Beijing and Moscow have agreed that they will “proactively consider strengthening bilateral coordinating measures” to tackle the threat posed by the US and the Republic of Korea’s plan to deploy a powerful antimissile system on the Korean Peninsula.

The consensus was reached during the fourth China-Russia Northeast Asia security consultation in Mosow on Thursday, according to a news release of the Foreign Ministry on Friday.

Assistant Minister of Foreign Affairs Kong Xuanyou and Russian Deputy Foreign Minister Igor Morgulov co-chaired the meeting.

Read more

Jul 24, 2016

DARPA’s Cyber Grand Challenge Aims To Beat Viruses for Good

Posted by in categories: computing, robotics/AI, security

Get ready, set, GO!!!


The culmination of the Cyber Grand Challenge, the world’s first tournament of automated computer security systems hosted by DARPA, will take place next month in Las Vegas, Nevada.

Read more

Jul 24, 2016

An AI Watched 600 Hours of TV and Started to Accurately Predict What Happens Next

Posted by in categories: computing, information science, robotics/AI, security

MIT researchers have created an algorithm that hopes to understand human visual social cues and predict what would happen next. Giving AI the ability to understand and predict human social interaction could one day pave the way to efficient home assistant systems as well as intelligent security cameras that can call an ambulance or the police ahead of time.

MIT’s Computer Science and Artificial Intelligence Laboratory created an algorithm that utilizes deep learning, which enables artificial intelligence (AI) to use patterns of human interaction to predict what will happen next. Researchers fed the program with videos featuring human social interactions and tested it to see if it “learned” well enough to be able to predict them.

Continue reading “An AI Watched 600 Hours of TV and Started to Accurately Predict What Happens Next” »

Jul 21, 2016

MP scamsters find a way to clone thumbprint, beat biometric test

Posted by in categories: privacy, security

Why biometrics will need and form of id to properly perform security checks.


Impersonators in many cases apparently had used synthetic bandages bearing thumb impressions of actual candidates. “Traditionally, fingerprints were used as evidence in court cases and even in high-tech security systems. But revelations by those arrested for impersonation in Bihar are proving to the world of forensic sciences that creating forged, latent fingerprints is relatively easy,” claims Dr Anand Rai, whistle-blower in the MPPEB scam. In the past, Rai had requested STF officials to look into interrogation reports of 140 impersonators arrested by the Bihar police during a constable recruitment exam.

Source: http://timesofindia.indiatimes.com/city/bhopal/MP-scamsters-…311540.cms

Continue reading “MP scamsters find a way to clone thumbprint, beat biometric test” »

Jul 21, 2016

NYC’s next subway cars have WiFi and USB ports built-in

Posted by in categories: internet, security

The New York City subway system is gearing up for a major overhaul meant to bring a “modernized look and feel” to lighting, wayfinding and subway cars by the year 2020. At a press conference on Monday, Governor Andrew Cuomo announced the Metropolitan Transportation Authority’s $27 billion, five-year plan to add 1,025 new subway cars, more informative digital screens, better security features and — most importantly for anyone who needs to get some work done underground – WiFi and USB charging ports in the cars and stations.

“People want to work, and they want their device to work 24 hours a day,” Governor Cuomo during the event at the New York Transit Museum in Brooklyn. “They don’t want to have to look up. There has to be WiFi, and there need to be charging ports.”

In addition to free juice and an internet connection, the new subway cars will sport “full color digital customer information displays,” as well as new digital ad space. On a practical level, the cars will offer wider doors to expedite boarding times and up to 750 of new cars will feature an open-ended design that allows for more passenger space.

Continue reading “NYC’s next subway cars have WiFi and USB ports built-in” »