Menu

Blog

Archive for the ‘security’ category: Page 23

Sep 14, 2023

‘We Saw So Many Doctors’: A Mother Says ChatGPT Accurately Diagnosed Her Son’s Medical Condition After 17 Doctors Couldn’t

Posted by in categories: biotech/medical, robotics/AI, security

I hope this isn’t a duplicate but that’s amazing! I dunno if I shared the latest Google cloud security conference? It’s an hour and they’re using advanced AI and even collaborating with Israel I think.


After 17 medical consultations led to dead ends, a mother turned to ChatGPT for help. Then, AI came up with a diagnosis.

Sep 12, 2023

Machine learning masters massive data sets

Posted by in categories: biotech/medical, information science, robotics/AI, satellites, security, supercomputing

A machine-learning algorithm demonstrated the capability to process data that exceeds a computer’s available memory by identifying a massive data set’s key features and dividing them into manageable batches that don’t choke computer hardware. Developed at Los Alamos National Laboratory, the algorithm set a world record for factorizing huge data sets during a test run on Oak Ridge National Laboratory’s Summit, the world’s fifth-fastest supercomputer.

Equally efficient on laptops and supercomputers, the highly scalable solves hardware bottlenecks that prevent processing information from data-rich applications in , , social media networks, national security science and earthquake research, to name just a few.

“We developed an ‘out-of-memory’ implementation of the non-negative matrix factorization method that allows you to factorize larger than previously possible on a given hardware,” said Ismael Boureima, a computational physicist at Los Alamos National Laboratory. Boureima is first author of the paper in The Journal of Supercomputing on the record-breaking algorithm.

Sep 11, 2023

Human-plus-AI solutions mitigate security threats

Posted by in categories: business, robotics/AI, security

Fifty years ago, the average business transaction was pretty straightforward. Shoppers handed purchases directly to cashiers, business partners shook hands in person, and people brought malfunctioning machines to a repair shop across the street. The proximity of all participating parties meant that both customers and businesses could verify authority and authenticity with their own eyes.

Sep 10, 2023

Lithium discovery in US volcano could be biggest deposit ever found

Posted by in category: security

A world-beating deposit of lithium along the Nevada–Oregon border could meet surging demand for this metal, according to a new analysis.

An estimated 20 to 40 million tonnes of lithium metal lie within a volcanic crater formed around 16 million years ago. This is notably larger than the lithium deposits found beneath a Bolivian salt flat, previously considered the largest deposit in the world.

‘If you believe their back-of-the-envelope estimation, this is a very, very significant deposit of lithium,’ says Anouk Borst, a geologist at KU Leuven University and the Royal Museum for Central Africa in Tervuren, Belgium. ‘It could change the dynamics of lithium globally, in terms of price, security of supply and geopolitics.’

Sep 9, 2023

Apple zero-click iMessage exploit used to infect iPhones with spyware

Posted by in categories: mobile phones, security

Citizen Lab says two zero-days fixed by Apple today in emergency security updates were actively abused as part of a zero-click exploit chain (dubbed BLASTPASS) to deploy NSO Group’s Pegasus commercial spyware onto fully patched iPhones.

The two bugs, tracked as CVE-2023–41064 and CVE-2023–41061, allowed the attackers to infect a fully-patched iPhone running iOS 16.6 and belonging to a Washington DC-based civil society organization via PassKit attachments containing malicious images.

“We refer to the exploit chain as BLASTPASS. The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim,” Citizen Lab said.

Sep 5, 2023

Countdown to History: NASA’s OSIRIS-REx Preps for Epic Asteroid Delivery

Posted by in categories: security, space

A team led by NASA in Utah’s West Desert is in the final stages of preparing for the arrival of the first U.S. asteroid sample – slated to land on Earth in this month.

A mockup of NASA’s OSIRIS-REx (Origins, Spectral Interpretation, Resource Identification, and Security–Regolith Explorer) sample capsule was dropped last Wednesday from an aircraft and landed at the drop zone at the Department of Defense’s Utah Test and Training Range in the desert outside Salt Lake City. This was part of the mission’s final major test prior to the arrival of the actual capsule on September 24 with its sample of asteroid Bennu, collected in space almost three years ago.

Sep 4, 2023

A simpler way to connect quantum computers

Posted by in categories: computing, quantum physics, security

Researchers have a new way to connect quantum devices over long distances, a necessary step toward allowing the technology to play a role in future communications systems.

While today’s classical data signals can get amplified across a city or an ocean, quantum signals cannot. They must be repeated in intervals—that is, stopped, copied and passed on by specialized machines called quantum repeaters. Many experts believe these quantum repeaters will play a key role in future communication networks, allowing enhanced security and enabling connections between remote quantum computers.

A new Princeton study titled “Indistinguishable telecom band photons from a single erbium ion in the ” and published Aug. 30 in Nature, details the basis for a new approach to building quantum repeaters. It sends telecom-ready light emitted from a single ion implanted in a crystal. The effort was many years in the making, according to Jeff Thompson, the study’s principal author. The work combined advances in photonic design and .

Sep 4, 2023

Legal Liability for Insecure Software Might Work, but It’s Dangerous

Posted by in categories: business, government, law, security

Ensuring security in the software market is undeniably crucial, but it is important to strike a balance that avoids excessive government regulation and the burdens associated with government-mandated legal responsibility, also called a liability regime. While there’s no question the market is broken with regards to security, and intervention is necessary, there is a less intrusive approach that enables the market to find the right level of security while minimizing the need for heavy-handed government involvement.

Imposing a liability regime on software companies may go too far and create unintended consequences. The downsides of liability, such as increased costs, potential legal battles, and disincentives to innovation, can hinder the development of secure software without necessarily guaranteeing improved security outcomes. A liability regime could also burden smaller companies disproportionately and stifle the diversity and innovation present in the software industry.

Instead, a more effective approach involves influencing the software market through measures that encourage transparency and informed decision-making. By requiring companies to be fully transparent about their security practices, consumers and businesses can make informed choices based on their risk preferences. Transparency allows the market to drive the demand for secure software, enabling companies with robust security measures to potentially gain a competitive edge.

Sep 3, 2023

SELinux In Linux 6.6 Removes References To Its Origins At The US NSA

Posted by in categories: computing, privacy, security

Security Enhanced Linux (SELinux) has been part of the mainline kernel for two decades to provide a security module implementing access control security policies and is now widely-used for enhancing the security of production Linux servers and other systems. Those that haven’t been involved with Linux for a long time may be unaware that SELinux originates from the US National Security Agency (NSA). But now with Linux 6.6 the NSA references are being removed.

The United States National Security Agency worked on the original code around Security Enhanced Linux and was the primary original developer. The NSA has continued to contribute to SELinux over the years while with its increased adoption does see contributions from a wide range of individuals and organizations.

Sep 1, 2023

X plans to collect users’ biometric data, along with education and job history

Posted by in categories: education, government, policy, privacy, security

X, formerly known as Twitter, will begin collecting users’ biometric data, according to its new privacy policy that was first spotted by Bloomberg. The policy also says the company wants to collect users’ job and education history. The policy page indicates that the change will go into effect on September 29.

“Based on your consent, we may collect and use your biometric information for safety, security, and identification purposes,” the updated policy reads. Although X hasn’t specified what it means by biometric information, it is usually used to describe a person’s physical characteristics, such as their face or fingerprints. X also hasn’t provided any details about how it plans to collect it.

The company told Bloomberg that the biometrics are for premium users and will give them the option to submit their government ID and an image in order to add a verification layer. Biometric data may be extracted from both the ID and image for matching purposes, Bloomberg reports.

Page 23 of 142First2021222324252627Last