Menu

Blog

Archive for the ‘security’ category: Page 75

Aug 26, 2020

White House announces creation of AI and quantum research institutes

Posted by in categories: quantum physics, robotics/AI, security

đŸ€” “The White House today detailed the establishment of 12 new research institutes focused on AI and quantum information science. Agencies including the National Science Foundation (NSF), U.S. Department of Homeland Security, and U.S. Department of Energy (DOE) have committed to investing tens of millions of dollars in centers intended to serve as nodes for AI and quantum computing study.

Laments over the AI talent shortage in the U.S. have become a familiar refrain. While higher education enrollment in AI-relevant fields like computer science has risen rapidly in recent years, few colleges have been able to meet student demand due to a lack of staffing. In June, the Trump administration imposed a ban on U.S. entry for workers on certain visas — including for high-skilled H-1B visa holders, an estimated 35% of whom have an AI-related degree — through the end of the year. And Trump has toyed with the idea of suspending the Optional Practical Training program, which allows international students to work for up to three years in the U.S.”


The White House announced the creation of AI and quantum research institutes funded by billions in venture and taxpayer dollars.

Continue reading “White House announces creation of AI and quantum research institutes” »

Aug 24, 2020

This piece was written as part of the Artificial Intelligence and International Stability Project at the Center for a New American Security

Posted by in categories: robotics/AI, security

This piece was written as part of the Artificial Intelligence and International Stability Project at the Center for a New American Security, an independent, nonprofit organization based in Washington, D.C. Funded by Carnegie Corporation of New York, the project promotes thinking and analysis on AI and international stability. Given the likely importance that advances in artificial intelligence could play in shaping our future, it is critical to begin a discussion about ways to take advantage of the benefits of AI and autonomous systems, while mitigating the risks. The views expressed here are solely those of the author and do not represent positions of IEEE Spectrum or the IEEE.


AI deception: when your artificial intelligence learns to lie.

Aug 23, 2020

New Vulnerability Could Put IoT Devices at Risk

Posted by in category: security

A new vulnerability targets Thales, a leading maker of IoT components. Learn how the X-Force Red team identified the security flaw and best practices for addressing the risk.

Aug 17, 2020

NASA’s Asteroid Mission Completes Final Test Before Sampling Run

Posted by in categories: security, space

While we were all busy watching the Perseverance rover head off on its journey to Mars, NASA’s asteroid sample mission has been gearing up for its big moment. The Origins, Spectral Interpretation, Resource Identification, Security, Regolith Explorer (OSIRIS-REx for short) has completed its final test approach of the surface. The next time it descends, OSIRIS-REx will scoop up pieces of the asteroid Bennu for return to Earth.

NASA launched OSIRIS-REx in 2016, sending it off to intercept 101955 Bennu, a carbonaceous asteroid about 1,610 feet (490 meters) in diameter. Bennu does get very close to Earth at points in its orbit — there’s even a small chance that it could impact the Earth in the next few centuries. Currently, it’s safely out of the way about 2 AU distant (an AU is the distance between Earth and the sun).

Continue reading “NASA’s Asteroid Mission Completes Final Test Before Sampling Run” »

Aug 11, 2020

Elon Musk Beats Jeff Bezos To U.S. Air Force Contract As Billionaire Space Race Blasts Off

Posted by in categories: Elon Musk, security, space travel

Musk has scored bragging rights in the battle of billionaires in space after his SpaceX rockets beat competition from Bezos’s Blue Origin to launch National Security payloads for the U.S. Air Force.

Aug 8, 2020

Hacker posts confidential Intel specs online

Posted by in category: security

Intel suffered a massive breach Thursday as 20 GB of internal documents were published online.

The confidential documents contain data on the internal designs of chipsets dating back to 2016.

The data were sent by an anonymous source to a Swiss software engineer, Till Kottmann, who specializes in uploading hacked documents. He does so, he has said, to encourage companies to exercise more caution concerning security and “to better find and assess potential issues.” But he admits he is also motivated to release unauthorized documents obtained from hackers “to free information” for all to see.

Aug 6, 2020

Intel investigating breach after 20GB of internal documents leak online

Posted by in category: security

US chipmaker Intel is investigating a security breach after earlier today 20 GB of internal documents, with some marked “confidential” or “restricted secret,” were uploaded online on file-sharing site MEGA.

The data was published by Till Kottmann, a Swiss software engineer, who said he received the files from an anonymous hacker who claimed to have breached Intel earlier this year.

Continue reading “Intel investigating breach after 20GB of internal documents leak online” »

Aug 4, 2020

DARPA Selects Teams for Work on Tunable Gamma Ray Inspection Technology

Posted by in categories: biotech/medical, security

Two California companies were selected for DARPA’s Gamma Ray Inspection Technology (GRIT) program and have begun work to develop a transportable, tunable source of gamma rays for a host of national security, industrial, and medical applications.

Lumitron Technologies and RadiaBeam Technologies started work on the GRIT program in April and are exploring novel approaches to achieve high-intensity, tunable, and narrow-bandwidth sources of gamma ray radiation in a compact, transportable form factor.

GRIT aims to provide a source of tunable, pure x-rays and gamma rays from tens of keV (kilo-electron volts) up through three MeV (mega-electron volts). Currently, tunable and narrow bandwidth gamma ray sources only exist at highly specialized user facilities best suited for basic research and are not able to support broad practical applications. Shrinking these photon sources to a transportable system is the major goal and challenge of the GRIT program.

Aug 4, 2020

Top 5 Countries to Adopt Facial Recognition Technology

Posted by in categories: business, finance, mobile phones, privacy, robotics/AI, security

Consumers are ending up increasingly responsive about sharing their data, as data integrity and security has turned into a developing concern. In any case, with the advent of nations teching up with facial recognition, even explorers need to truly begin thinking about what sort of data they could be reluctantly offering to nations, individuals and places.

Facial recognition innovation is a framework that is fit for identifying or confirming an individual from an advanced picture or a video frame. It works by comparing chosen facial highlights and faces inside a database. The technology is utilized in security frameworks and can be compared with different biometrics, for example, fingerprint or iris recognition frameworks. As of late, it has been grabbed and utilized as a business identification and advertising tool. The vast majority have a cell phone camera fit for recognizing features to perform exercises, for example, opening said a cell phone or making payments.

The worldwide market for facial recognition cameras and programming will be worth of an expected $7.8 billion, predicts Markets and Markets. Never again consigned to sci-fi films and books, the technology is being used in various vertical markets, from helping banks recognize clients to empowering governments to look out for criminals. Let’s look at some of the top countries adopting facial recognition technology.

Jul 29, 2020

How to hide from a drone – the subtle art of ‘ghosting’ in the age of surveillance

Posted by in categories: drones, security, surveillance

Drones of all sizes are being used by environmental advocates to monitor deforestation, by conservationists to track poachers, and by journalists and activists to document large protests. As a political sociologist who studies social movements and drones, I document a wide range of nonviolent and pro-social drone uses in my new book, “The Good Drone.” I show that these efforts have the potential to democratize surveillance.

But when the Department of Homeland Security redirects large, fixed-wing drones from the U.S.-Mexico border to monitor protests, and when towns experiment with using drones to test people for fevers, it’s time to think about how many eyes are in the sky and how to avoid unwanted aerial surveillance. One way that’s within reach of nearly everyone is learning how to simply disappear from view.

Page 75 of 142First7273747576777879Last