Menu

Blog

Archive for the ‘security’ category: Page 48

Jul 30, 2022

Detecting Deepfake Video Calls Through Monitor Illumination

Posted by in categories: privacy, security

A new collaboration between a researcher from the United States’ National Security Agency (NSA) and the University of California at Berkeley offers a novel method for detecting deepfake content in a live video context – by observing the effect of monitor lighting on the appearance of the person at the other end of the video call.

Jul 29, 2022

Social Media Accounts Hijacked to Post Indecent Images

Posted by in category: security

UK police urges users to switch on two-factor authentication.

Jul 28, 2022

Twin physically unclonable functions (PUFs) based on carbon nanotube arrays to enhance the security of communications

Posted by in categories: computing, encryption, internet, nanotechnology, security

As the amount of data stored in devices and shared over the internet continuously increases, computer scientists worldwide are trying to devise new approaches to secure communications and protect sensitive information. Some of the most well-established and valuable approaches are cryptographic techniques, which essentially encrypt (i.e., transform) data and texts exchanged between two or more parties, so that only senders and receivers can view it in its original form.

Physical unclonable functions (PUFs), devices that exploit “random imperfections” unavoidably introduced during the manufacturing of devices to give physical entities unique “fingerprints” (i.e., trust anchors). In recent years, these devices have proved to be particularly valuable for creating , which are instantly erased as soon as they are used.

Researchers at Peking University and Jihua Laboratory have recently introduced a new system to generate cryptographic primitives, consisting of two identical PUFs based on aligned carbon nanotube (CNT) arrays. This system, introduced in a paper published in Nature Electronics, could help to secure communications more reliably, overcoming some of the vulnerabilities of previously proposed PUF devices.

Jul 28, 2022

A.I. Wars, The Fermi Paradox and Great Filters with David Brin

Posted by in categories: alien life, existential risks, nanotechnology, physics, robotics/AI, security

Why we need AI to compete against each other. Does a Great Filter Stop all Alien Civilizations at some point? Are we Doomed if We Find Life in Our Solar System?

David Brin is a scientist, speaker, technical consultant and world-known author. His novels have been New York Times Bestsellers, winning multiple Hugo, Nebula and other awards.
A 1998 movie, directed by Kevin Costner, was loosely based on his book The Postman.
His Ph.D in Physics from UCSD — followed a masters in optics and an undergraduate degree in astrophysics from Caltech. He was a postdoctoral fellow at the California Space Institute and the Jet Propulsion Laboratory.
Brin serves on advisory committees dealing with subjects as diverse as national defense and homeland security, astronomy and space exploration, SETI and nanotechnology, future/prediction and philanthropy. He has served since 2010 on the council of external advisers for NASA’s Innovative and Advanced Concepts group (NIAC), which supports the most inventive and potentially ground-breaking new endeavors.

Continue reading “A.I. Wars, The Fermi Paradox and Great Filters with David Brin” »

Jul 26, 2022

House intelligence committee speaks about new DNA bio-weapons

Posted by in categories: biotech/medical, security

US Rep Jason Crow, of the US House Intelligence Committee, warned that bio-weapons are being made that use a target’s DNA to only kill that person at a security forum on Friday.

Jul 21, 2022

Air-gapped systems leak data via SATA cable WiFi antennas

Posted by in categories: computing, internet, security

An Israeli security researcher has demonstrated a novel attack against air-gapped systems by leveraging the SATA cables inside computers as a wireless antenna to emanate data via radio signals.

Jul 17, 2022

These are the 20 most common passwords leaked on the dark web — make sure none of them are yours

Posted by in category: security

Mobile security firm Lookout has a new list of the 20 passwords most commonly found in leaked account information on the dark web. Some are surprisingly easy to guess.

Jul 16, 2022

Could China take over the Moon? Space security experts explain the reality

Posted by in categories: policy, security, space

Any control of the Moon would be temporary and localized.


In an op/ed space policy experts explain why China is unlikely to try exert power over the Moon.

Jul 15, 2022

Dr Rosamund Lewis MD — Head, WHO Smallpox Secretariat — Surveillance, Preparedness & Health Security

Posted by in categories: biotech/medical, government, health, security

Surveillance, Preparedness & Health Security In Critical Disease Emergencies — Dr. Rosamund Lewis, MD, Head, WHO Smallpox Secretariat, Technical Lead for Monkeypox.


Dr. Rosamund Lewis, MD, is Head, WHO Smallpox Secretariat, Emerging Diseases and Zoonoses Unit, World Health Emergencies Programme, at the World Health Organization in Geneva, Switzerland, leading on emergency preparedness and advising on health security for the agency in this very critical domain, including as technical lead for Monkeypox. She also holds an appointment as Adjunct Professor in the School of Epidemiology and Public Health, University of Ottawa.

Continue reading “Dr Rosamund Lewis MD — Head, WHO Smallpox Secretariat — Surveillance, Preparedness & Health Security” »

Jul 15, 2022

Attackers scan 1.6 million WordPress sites for vulnerable plugin

Posted by in category: security

Security researchers have detected a massive campaign that scanned close to 1.6 million WordPress sites for the presence of a vulnerable plugin that allows uploading files without authentication.

The attackers are targeting the Kaswara Modern WPBakery Page Builder, which has been abandoned by its author before receiving a patch for a critical severity flaw tracked as CVE-2021–24284.

The vulnerability would allow an unauthenticated attacker to inject malicious Javascript to sites using any version of the plugin and perform actions like uploading and deleting files, which could lead to complete takeover of the site.

Page 48 of 142First4546474849505152Last