Menu

Blog

Archive for the ‘security’ category: Page 31

Apr 12, 2023

US begins study of possible rules to regulate AI like ChatGPT

Posted by in categories: education, policy, robotics/AI, security

WASHINGTON, April 11 (Reuters) — The Biden administration said Tuesday it is seeking public comments on potential accountability measures for artificial intelligence (AI) systems as questions loom about its impact on national security and education.

ChatGPT, an AI program that recently grabbed the public’s attention for its ability to write answers quickly to a wide range of queries, in particular has attracted U.S. lawmakers’ attention as it has grown to be the fastest-growing consumer application in history with more than 100 million monthly active users.

The National Telecommunications and Information Administration, a Commerce Department agency that advises the White House on telecommunications and information policy, wants input as there is “growing regulatory interest” in an AI “accountability mechanism.”

Apr 8, 2023

Researchers Discover Critical Remote Code Execution Flaw in vm2 Sandbox Library

Posted by in category: security

The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw that could be abused to break out of security boundaries and execute arbitrary shellcode.

The flaw, which affects all versions, including and prior to 3.9.14, was reported by researchers from South Korea-based KAIST WSP Lab on April 6, 2023, prompting vm2 to release a fix with version 3.9.15 on Friday.

“A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox,” vm2 disclosed in an advisory.

Apr 3, 2023

Graphene key for novel hardware security

Posted by in categories: encryption, robotics/AI, security

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, Penn State researchers have designed a way to make the encrypted keys harder to crack.

Led by Saptarshi Das, assistant professor of engineering science and mechanics, the researchers used graphene — a layer of carbon one atom thick — to develop a novel low-power, scalable, reconfigurable hardware security device with significant resilience to AI attacks. They published their findings in Nature Electronics today (May 10).

“There has been more and more breaching of private data recently,” Das said. “We developed a new hardware security device that could eventually be implemented to protect these data across industries and sectors.”

Mar 29, 2023

Google Duplex Will Change EVERYTHING… Here’s Why!

Posted by in categories: robotics/AI, security

In case you’re wondering how Google duplex actually works. Goodnight!


Google Duplex Will Change EVERYTHING… Here’s Why!Welcome back to Tech Craze, today on the channel we are going to catch sight of Everything you need to know about the google duplex. Google Duplex is a project launched in 1998 that is currently live in the majority of the US, along with some other parts of the world. At first, it allowed users to access an AI assistant to help make restaurant reservations. However, its use has since expanded to other functions as well.

Continue reading “Google Duplex Will Change EVERYTHING… Here’s Why!” »

Mar 28, 2023

Twitter’s source code leaked on GitHub, revealing proprietary information and security flaws

Posted by in category: security

The social media behemoth Twitter was recently dealt a significant setback when significant portions of its source code were published online and made public. The corporation proceeded promptly to notify GitHub, an online collaboration platform for software engineers, of a copyright violation in order to get the stolen code removed from the site. It is not known how long the code had been available online, although it seems to have been accessible to the public for a number of months.

Twitter has filed a petition with the United States District Court for the Northern District of California requesting that the court require GitHub to disclose the identity of the individual who is responsible for spreading the code as well as any other users that downloaded it.

Continue reading “Twitter’s source code leaked on GitHub, revealing proprietary information and security flaws” »

Mar 27, 2023

Android app from China executed 0-day exploit on millions of devices

Posted by in categories: computing, mobile phones, neuroscience, security

Can you imagine if we had computer/brain interfaces what would happen? We’ll need brain firewalls and antivirus.


Android apps digitally signed by China’s third-biggest e-commerce company exploited a zero-day vulnerability that allowed them to surreptitiously take control of millions of end-user devices to steal personal data and install malicious apps, researchers from security firm Lookout have confirmed.

The malicious versions of the Pinduoduo app were available in third-party markets, which users in China and elsewhere rely on because the official Google Play market is off-limits or not easy to access. No malicious versions were found in Play or Apple’s App Store. Last Monday, TechCrunch reported that Pinduoduo was pulled from Play after Google discovered a malicious version of the app available elsewhere. TechCrunch reported the malicious apps available in third-party markets exploited several zero-days, vulnerabilities that are known or exploited before a vendor has a patch available.

Continue reading “Android app from China executed 0-day exploit on millions of devices” »

Mar 25, 2023

The end of text-based passwords? ‘Transparent image moving’ provides a new solution

Posted by in categories: computing, mobile phones, security

It’s past time the world moves away from text-based passwords and verifications for mobile phones and starts embracing more secure image-based solutions, say computer scientists from the University of Surrey.

In a new study, Surrey scientists demonstrate an image-based authentication system called TIM (Transparent Image Moving) for mobile phones to help reduce the risk of shoulder surfing attacks. TIM requires users to select and move predefined images to a designated position for passing authentication checks, similar to those required for .

The proof-of-concept study found that 85% of TIM users believed it could help them to prevent password guessing and shoulder surfing attacks. The study also found that 71% of participants think TIM is a more usable image-based solution than others on the market. The research has been published in the Journal of Information Security and Applications.

Mar 25, 2023

Team devises crystal-clear solution to quantum computing puzzle

Posted by in categories: computing, quantum physics, security

University of Texas at Dallas researchers have developed a new approach that addresses challenges in the field of quantum computing and has the potential to revolutionize computing, communications and electronic security.

To make solid-state qubits, the basic information unit for quantum computers, a defect must be inserted into the to control the spin states of electrons. Creating and positioning the defect, however, especially in the most commonly used solid material——poses a major challenge.

UT Dallas researchers found that making qubits from thin, two-dimensional sheets of crystals called (TMDs) instead of diamond can solve this problem. Led by Dr. Kyeongjae Cho, professor of materials science and engineering in the Erik Jonsson School of Engineering and Computer Science, the researchers published their findings online Dec. 6 in Nature Communications.

Mar 24, 2023

JP Morgan to pilot payment services using palm or face recognition in the US

Posted by in categories: privacy, security

Following this trial, the bank will offer this service to its larger base of US merchant clients.

JP Morgan has announced plans to pilot biometric-based payments at select US retailers. It is one of the world’s largest payment-processing companies.

Pilot program roll-out.

Continue reading “JP Morgan to pilot payment services using palm or face recognition in the US” »

Mar 22, 2023

Nvidia builds quantum-classical computing system with Israel’s Quantum Machines

Posted by in categories: computing, economics, engineering, quantum physics, security

US gaming and computer graphics giant Nvidia has joined forces with an Israeli startup to roll out a new hardware system to connect the quantum computer with classical computers.

The new system, Nvidia DGX Quantum, built together with Israel’s Quantum Machines, a developer of a standard universal language for quantum computers, is expected to be first deployed at Israel’s quantum computing research center at the end of this year.

The quantum computing R&D center funded by the Israel Innovation Authority at an investment of NIS 100 million ($27 million), which is headed by Quantum Machines, was established to help Israel build a quantum computer and advance research in the field that would lead to future developments in economics, technology, security, engineering, and science.

Page 31 of 142First2829303132333435Last