Menu

Blog

Archive for the ‘security’ category: Page 88

Sep 30, 2019

Researchers invent low-cost alternative to Bitcoin

Posted by in categories: bitcoin, computing, cryptocurrencies, law, security

The cryptocurrency Bitcoin is limited by its astronomical electricity consumption and outsized carbon footprint. A nearly zero-energy alternative sounds too good to be true, but as School of Computer and Communication Sciences (IC) Professor Rachid Guerraoui explains, it all comes down to our understanding of what makes transactions secure.

To explain why the system developed in his Distributed Computing Lab (DCL) represents a paradigm shift in how we think about cryptocurrencies—and about digital trust in general—Professor Rachid Guerraoui uses a legal metaphor: all players in this new system are “innocent until proven guilty.”

Continue reading “Researchers invent low-cost alternative to Bitcoin” »

Sep 27, 2019

Unfixable Exploit Is the Latest Apple Security Upheaval

Posted by in categories: mobile phones, security

Security researcher Axi0mX published the exploit, called “checkm8,” Friday on Github. It affects every Apple device with an A5 through A11 chipset, meaning every iPhone model from 4S to X. Though it isn’t an all-in-one jailbreak on its own, the exploit provides an extensive foundation for researchers to build off of in customizing jailbreaks for every vulnerable model of device that would allow them to totally take over the unit, run software far beyond what Apple normally allows, and program apps to interact and share data in ways that Apple’s protections usually preclude.


Any iPhone device from 2011 to 2017 could soon be jailbroken, thanks to an underlying flaw that there’s no way to patch.

Sep 27, 2019

Jumping the gap may make electronics faster

Posted by in categories: biotech/medical, computing, mobile phones, security, transportation

A quasi-particle that travels along the interface of a metal and dielectric material may be the solution to problems caused by shrinking electronic components, according to an international team of engineers.

“Microelectronic chips are ubiquitous today,” said Akhlesh Lakhtakia, Evan Pugh University Professor and Charles Godfrey Binder Professor of Engineering Science and Mechanics, Penn State. “Delay time for signal propagation in metal-wire interconnects, electrical loss in metals leading to temperature rise, and cross-talk between neighboring interconnects arising from miniaturization and densification limits the speed of these chips.”

These are in our smartphones, tablets, computers and and they are used in hospital equipment, defense installations and our transportation infrastructure.

Sep 25, 2019

Algorithms could stop an ‘internet of things’ attack from bringing down the power grid

Posted by in categories: engineering, information science, internet, security

Last year, Princeton researchers identified a disturbing security flaw in which hackers could someday exploit internet-connected appliances to wreak havoc on the electrical grid. Now, the same research team has released algorithms to make the grid more resilient to such attacks.

In a paper published online in the journal IEEE Transactions on Network Science and Engineering, a team from Princeton’s Department of Electrical Engineering presented algorithms to protect against potential attacks that would spike demand from high-wattage devices such as air conditioners—all part of the “internet of things”—in an effort to overload the power grid.

“The cyberphysical nature of the grid makes this threat very important to counter, because a large-scale blackout can have very critical consequences,” said study author Prateek Mittal, an associate professor of electrical engineering.

Sep 24, 2019

Top 10 Artificial Intelligence (AI) Technologies In 2019

Posted by in categories: mobile phones, robotics/AI, security

The effects of Artificial Intelligence (AI) technologies have already been experienced by the people globally and the increasing utilization of technology has proven a revolutionary advancement in the current scenario of digitization. Knowledge reasoning, planning, machine learning, robotics, computer vision, and graphics are few of the most commonly used areas where the AI has exposed the potential to ease the result oriented operations. In addition to the above, the most common machinery i.e. smartphones are even now available with high-end AI rich features and functionalities. AI enabled smartphones can now be noticed in terms of learning the continued user behavior and applying the same itself, improved security of rich features and enhanced voice assistants exhibiting AI rich functionalities. However, the exposure of Artificial Intelligence like broadest technologies must not be limited up to improved machinery rich features along with process optimization and automation. There are the other best set of fields predicted to get benefit under the global hug of AI worldwide which are hereby mentioned below.

Sep 22, 2019

With Food Security Becoming One Of Our Biggest Challenges For Humankind’s Survival, What’s On The Menu For The 9 Billion People Inhabiting The World By 2050?

Posted by in categories: bioengineering, biological, climatology, security

Food security is one of the biggest challenges we’re facing as we move further into this century. Changing climate, pests, stress on water and land are all limiting our ability to produce sufficient amounts of food. making food production an issue.

Synthetic biology offers ways to help produce and supply enough safe and nutritious food sustainably for the estimated 9 billion people that will inhabit the planet by 2050.

Here are a few ways how.

Sep 19, 2019

Researchers Think It’s a Good Idea to Secure Your Phone Using the One Thing You Perpetually Lose

Posted by in categories: mobile phones, privacy, security

Apple’s FaceID authentication system started moving smartphone users away from relying on fingerprints to secure their mobile devices, which are arguably less secure. But researchers think they’ve come up with an even better biometric tool for protecting a device that uses a part of the body that’s nearly impossible to spoof: a user’s ear canals.

A team of researchers led by Zhanpeng Jin, an associate professor in the Department of Computer Science and Engineering in the University of Buffalo’s School of Engineering and Applied Sciences, created a new authentication tool called EarEcho, which is somewhat self-explanatory. The team modified a set of off the shelf earbuds with a tiny microphone that points inside the wearer’s ear, not out towards the world around them. It’s not there to pick up ambient sounds to facilitate a noise-canceling or feature, or even the wearer’s voice for making calls; the tiny mic is instead tuned to listen to the echo of sounds as they’re played and then propagate through the ear canal.

Sep 16, 2019

Was SHA-256 cracked? Don’t buy into retraction!

Posted by in categories: bitcoin, cryptocurrencies, encryption, government, hacking, internet, mathematics, military, privacy, security, software

SHA-256 is a one way hashing algorithm. Cracking it would have tectonic implications for consumers, business and all aspects of government including the military.

It’s not the purpose of this post to explain encryption, AES or SHA-256, but here is a brief description of SHA-256. Normally, I place reference links in-line or at the end of a post. But let’s get this out of the way up front:

One day after Treadwell Stanton DuPont claimed that a secret project cracked SHA-256 more than one year ago, they back-tracked. Rescinding the original claim, they announced that an equipment flaw caused them to incorrectly conclude that they had algorithmically cracked SHA-256.

All sectors can still sleep quietly tonight,” said CEO Mike Wallace. “Preliminary results in this cryptanalytic research led us to believe we were successful, but this flaw finally proved otherwise.

Continue reading “Was SHA-256 cracked? Don’t buy into retraction!” »

Sep 16, 2019

EU agency starts space sustainability initiative

Posted by in categories: business, security, space, sustainability

PARIS — The European Union’s equivalent of a foreign ministry is starting a new effort to promote the need for sustainable space operations, but that effort will not initially include any new regulation of European satellite operators.

Carine Claeys, special envoy for space and head of the Space Task Force for the European External Action Service, said in a Sept. 13 panel discussion at Euroconsult’s World Satellite Business Week that the Safety, Security and Sustainability of Outer Space (3SOS) public diplomacy initiative will promote “ethical conduct” in space amid concerns about orbital debris.

The acronym, she noted, has a second meaning. “It is also three times SOS,” she said, “to create the case and a sense of urgency.”

Sep 13, 2019

Researchers Have Issued A Serious Bitcoin Security Warning

Posted by in categories: bitcoin, cryptocurrencies, security

Bitcoin and cryptocurrency adoption has failed to live up to expectations over recent years and fears around scams, fraud, and theft have not helped.

The bitcoin price, after its epic 2017 bull run, slumped last year– though has rebounded in 2019, climbing back above $10,000 per bitcoin.

Now, researchers have warned a staggering four out of the first five results returned when asking Google for a “bitcoin qr generator” led to scam websites–potentially furthering negative public perception around bitcoin and cryptocurrency.

Page 88 of 142First8586878889909192Last