Menu

Blog

Archive for the ‘security’ category: Page 80

Apr 24, 2020

America’s bomber force is facing a crisis

Posted by in categories: government, military, policy, security

The path forward begins with admitting the nation has a bomber shortfall. Retiring more aircraft exacerbates the problem. Nor is this just an Air Force problem. Bombers are national assets essential to our security strategy and must be prioritized accordingly. If other services have excess funds to invest in ideas like a 1,000-mile-range cannon when thousands of strike aircraft, various munitions and remotely piloted aircraft can fill the exact same mission requirements, it is time for a roles and missions review to direct funding toward the most effective, efficient options. Bombers would compete well in such an assessment. Ultimately, the solution demands doubling down on the B-21 program.

There comes a point where you cannot do more with less. Given the importance of bombers to the nation, rebuilding the bomber force is not an option — it is an imperative.

Retired U.S. Air Force Maj. Gen. Larry Stutzriem served as a fighter pilot and held various command positions. He concluded his service as the director of plans, policy and strategy at North American Aerospace Defense Command and U.S. Northern Command. He is currently the director of studies at the Mitchell Institute for Aerospace Studies, where Douglas Birkey is the executive director. Birkey researches issues relating to the future of aerospace and national security, and he previously served as the Air Force Association’s director of government relations.

Apr 23, 2020

Tesla to implement a key security feature ‘soon’

Posted by in categories: Elon Musk, security, sustainability, transportation

Tesla’s mobile app is one of the key parts of the Tesla ownership experience, and yet its security is lacking an important feature — two-factor authentication.

According to CEO Elon Musk, this will change in the near future.

When asked on Twitter whether there are any updates regarding two-factor authentication for the app, Musk said it’s “coming soon” (via Teslarati).

Apr 22, 2020

Video shows thief stole van Gogh painting with sledgehammer

Posted by in categories: biotech/medical, security

THE HAGUE, Netherlands (AP) — All it took was a few sturdy swings with a sledgehammer and a prized painting by Vincent van Gogh was gone.

A Dutch crime-busting television show has aired security camera footage showing how an art thief smashed his way through reinforced glass doors at a museum in the early hours of March 30. He later hurried out through the museum gift shop with a Vincent van Gogh painting tucked under his right arm and the sledgehammer in his left hand.

Police hope that publicizing the images will help them track down the thief who stole Van Gogh’s “The Parsonage Garden at Nuenen in Spring 1884” from the Singer Laren Museum while it was shut down due to coronavirus containment measures.

Apr 17, 2020

About the Event 201 exercise

Posted by in categories: biotech/medical, business, economics, finance, government, health, policy, security

Talk being ahead of the curve;


Event 201 was a 3.5-hour pandemic tabletop exercise that simulated a series of dramatic, scenario-based facilitated discussions, confronting difficult, true-to-life dilemmas associated with response to a hypothetical, but scientifically plausible, pandemic. 15 global business, government, and public health leaders were players in the simulation exercise that highlighted unresolved real-world policy and economic issues that could be solved with sufficient political will, financial investment, and attention now and in the future.

The exercise consisted of pre-recorded news broadcasts, live “staff” briefings, and moderated discussions on specific topics. These issues were carefully designed in a compelling narrative that educated the participants and the audience.

Continue reading “About the Event 201 exercise” »

Apr 14, 2020

New electronic cooling technology to enable miniaturization of quantum computers

Posted by in categories: computing, quantum physics, security

VTT researchers have successfully demonstrated a new electronic refrigeration technology that could enable major leaps in the development of quantum computers. Present quantum computers require extremely complicated and large cooling infrastructure that is based on mixture of isotopes of helium. The new electronic cooling technology could replace these cryogenic liquid mixtures and enable miniaturization of quantum computers.

In this purely electrical refrigeration method, and thermal isolation operate effectively through the same point like junction. In the experiment the researchers suspended a piece of silicon from such junctions and refrigerated the object by feeding electrical current from one junction to another through the piece. The current lowered the thermodynamic temperature of the silicon object as much as 40% from that of the surroundings. This could lead to the miniaturization of future quantum computers, as it can simplify the required cooling infrastructure significantly. The discovery has been published in Science Advances.

“We expect that this newly discovered electronic cooling method could be used in several applications from the miniaturization of quantum computers to ultra-sensitive radiation sensors of the security field,” says Research Professor Mika Prunnila from VTT Technical Research Centre of Finland.

Apr 10, 2020

Billions Of Google Chrome Users Now Have Another Surprising Option

Posted by in categories: bitcoin, internet, security

Google Chrome has dominated the internet browser market for the last decade with a staggering near-60% market share and users stretching into the billions.

Rivals to Google Chrome, including Apple’s Safari, Microsoft’s Edge (formerly known as Internet Explorer), and Mozilla’s Firefox have largely failed to convince users to switch—but browser choices are becoming more complex.

Users’ desire for greater security, better privacy, and an ill-defined need to “take back control” from the likes of Google and Microsoft has opened the door for alternatives—including blockchain-based privacy browser Brave, whose chief executive thinks Google “is going to be taken apart over coming years.”

Apr 8, 2020

Attackers can bypass fingerprint authentication with an ~80% success rate

Posted by in categories: mobile phones, security

Although hackers managed to defeat TouchID with a fake fingerprint less than 48 hours after the technology was rolled out in the iPhone 5S, fingerprint-based authentication over the past few years has become much harder to defeat. Today, fingerprints are widely accepted as a safe alternative over passwords when unlocking devices in many, but not all, contexts.

A study published on Wednesday by Cisco’s Talos security group makes clear that the alternative isn’t suitable for everyone—namely those who may be targeted by nation-sponsored hackers or other skilled, well-financed, and determined attack groups. The researchers spent about $2,000 over several months testing fingerprint authentication offered by Apple, Microsoft, Samsung, Huawei, and three lock makers. The result: on average, fake fingerprints were able to bypass sensors at least once roughly 80 percent of the time.

The percentages are based on 20 attempts for each device with the best fake fingerprint the researchers were able to create. The results may not be fully applicable to Apple products since they limit users to five attempts before asking for the PIN or password. Other products tested permitted significantly more or even an unlimited number of unsuccessful tries.

Apr 7, 2020

DARPA seeks enhanced low-light navigation performance for unmanned systems

Posted by in categories: robotics/AI, security

A new programme from the US Defense Advanced Research Projects Agency (DARPA) aims to address a key weakness of autonomous and semi-autonomous land systems: the need for active illumination to navigate in low-light conditions.

Unmanned systems rely on active illumination — anything that emits light or electromagnetic radiation, such as light detection and ranging (LIDAR) systems — to navigate at night or underground.

However, according to Joe Altepeter, programme manager in DARPA’s Defense Sciences Office, this approach creates significant security concerns, as such emissions could be detected by potential adversaries.

Apr 7, 2020

Email provider got hacked, data of 600,000 users now sold on the dark web

Posted by in category: security

Italian email provider Email.it confirms security breach.

Mar 30, 2020

The Next Pandemic Will Be Arriving Shortly

Posted by in categories: biotech/medical, government, health, security

Circa 2018: In January 2017, while one of us was serving as a homeland security advisor to outgoing President Barack Obama, a deadly pandemic was among the scenarios that the outgoing and incoming U.S. Cabinet officials discussed in a daylong exercise that focused on honing interagency coordination and rapid federal response to potential crises. The exercise is an important element of the preparations during transitions between administrations, and it seemed things were off to a good start with a commitment to continuity and a focus on biodefense, preparedness, and the Global Health Security Agenda—an initiative begun by the Obama administration to help build health security capacity in the most critically at-risk countries around the world and to prevent the spread of infectious disease. But that commitment was short-lived.


Deadly diseases like Ebola and the avian flu are only one flight away. The U.S. government must start taking preparedness seriously.

Page 80 of 142First7778798081828384Last