Advertisements


CyberLink upbeat about facial recognition applications

Digital multimedia software solution developer CyberLink is upbeat about the prospects of facial recognition applicaitons, according to company chairman and CEO Jau Huang......»»

Category: itSource:  digitimesFeb 26th, 2021

Cloudflare helps secure popular messaging applications

Cloudflare announced a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. When using end-to-end encryption messaging applications, a public-private key exchange encrypts messages to prot.....»»

Category: securitySource:  netsecurityRelated News15 hr. 27 min. ago

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Enlarge (credit: Getty Images) Certificate authorities and browser makers are planning to end the use of WHOIS data verifying domain ownership.....»»

Category: topSource:  arstechnicaRelated NewsSep 20th, 2024

Researchers build AI model database to find new alloys for nuclear fusion facilities

A study led by the Department of Energy's Oak Ridge National Laboratory details how artificial intelligence researchers have created an AI model to help identify new alloys used as shielding for housing fusion applications components in a nuclear fus.....»»

Category: topSource:  physorgRelated NewsSep 20th, 2024

Microplastics: Meant to last, just not forever and not in our bodies

Megan Hill is an assistant professor of chemistry and leader of the Hill Lab in Colorado State University's College of Natural Sciences. Her research leverages organic chemistry to design advanced polymeric materials for applications in sustainabilit.....»»

Category: topSource:  marketingvoxRelated NewsSep 19th, 2024

PlainID introduces identity security for Zscaler

PlainID announces the PlainID Authorizer for Zscaler, available via PlainID SaaS Authorization Management, centralizes policy management for Zscaler and SaaS applications and tools. Zscaler and other SASE (Secure Access Service Edge) solutions have m.....»»

Category: securitySource:  netsecurityRelated NewsSep 18th, 2024

Freshwater oysters could be key to developing stronger, "greener" adhesives

If you think oysters are just delicious seafood, think again. Freshwater oysters produce an adhesive that may hold the secret to developing more environmentally friendly glues with applications from dental care to construction and shipping. An intern.....»»

Category: topSource:  physorgRelated NewsSep 17th, 2024

Zirconium metals under extreme conditions found to deform in surprisingly complex ways

Materials are crucial to modern technology, especially those used in extreme environments like nuclear energy systems and military applications. These materials need to withstand intense pressure, temperature and corrosion. Understanding their lattic.....»»

Category: topSource:  physorgRelated NewsSep 17th, 2024

How a German peasant became the face of Nazi race laws

Many histories of Nazi Germany are accompanied by a photograph of two scientists measuring a man's facial features with a caliper. The picture is often contextualized, in these books, museums, and image archives as an illustration of the National Soc.....»»

Category: topSource:  physorgRelated NewsSep 16th, 2024

New infosec products of the week: September 13, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Druva, Huntress, Ketch, LOKKER, Tenable, Trellix, and Wing Security. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins T.....»»

Category: securitySource:  netsecurityRelated NewsSep 13th, 2024

Researchers solve long-standing mystery of alumina surface structure

Aluminum oxide (Al2O3), also known as alumina, corundum, sapphire, or ruby, is one of the best insulators used in a wide range of applications: in electronic components, as a support material for catalysts, or as a chemically resistant ceramic, to na.....»»

Category: topSource:  physorgRelated NewsSep 12th, 2024

Smartphone-based microscope rapidly reconstructs 3D holograms

Researchers have developed a new smartphone-based digital holographic microscope that enables precision 3D measurements. The highly portable and inexpensive microscope could help bring 3D measurement capabilities to a broader range of applications, i.....»»

Category: topSource:  physorgRelated NewsSep 11th, 2024

Tenable AI Aware provides exposure insight into AI applications, libraries and plugins

Tenable released AI Aware, advanced detection capabilities designed to surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management. Tenable AI Aware provides exposure insight into AI applica.....»»

Category: securitySource:  netsecurityRelated NewsSep 11th, 2024

Chemical chameleon reveals novel pathway for separating rare-earth metals

Researchers at the Department of Energy's Oak Ridge National Laboratory have found a chemical "chameleon" that could improve the process used to purify rare-earth metals used in clean energy, medical and national security applications......»»

Category: topSource:  theglobeandmailRelated NewsSep 9th, 2024

Scalable, multi-functional device lays groundwork for advanced quantum applications

Researchers have demonstrated a new multi-functional device that could help advance the scalability of solid-state color centers, enabling them to be used in larger and more complex quantum computers and networks. As efficient photon-spin interfaces,.....»»

Category: topSource:  theglobeandmailRelated NewsSep 9th, 2024

Red Hat Enterprise Linux AI extends innovation across the hybrid cloud

Red Hat Enterprise Linux (RHEL) AI is Red Hat’s foundation model platform, enabling users to develop, test, and run GenAI models to power enterprise applications. The platform brings together the open source-licensed Granite LLM family and Instruct.....»»

Category: securitySource:  netsecurityRelated NewsSep 9th, 2024

OpenZiti: Secure, open-source networking for your applications

OpenZiti is a free, open-source project that embeds zero-trust networking principles directly into applications. Example of an OpenZiti overlay network OpenZiti features “We created OpenZiti to transform how people think about connectivity. Whi.....»»

Category: securitySource:  netsecurityRelated NewsSep 9th, 2024

Found: 280 Android apps that use OCR to steal cryptocurrency credentials

Optical Character Recognition converts passwords shown in images to machine-readable text. Enlarge (credit: Getty Images) Researchers have discovered more than 280 malicious apps for Android that use optical character re.....»»

Category: topSource:  arstechnicaRelated NewsSep 6th, 2024

Theoretical research establishes unified way to quantify vital quantum properties

The foundation of nearly all quantum information applications—such as computation and communication—rely on the quantum properties of superposition and entanglement......»»

Category: topSource:  theglobeandmailRelated NewsSep 6th, 2024

Resecurity gains recognition in Frost & Sullivan’s 2024 Cyber Threat Intelligence report

Resecurity announced its recognition in the prestigious Frost & Sullivan’s Global Cyber Threat Intelligence 2024 report. This annual report is an essential indicator of market trends and highlights the most influential vendors and tools shaping.....»»

Category: securitySource:  netsecurityRelated NewsSep 6th, 2024

September 2024 Patch Tuesday forecast: Downgrade is the new exploit

I asked for a calm August 2024 Patch Tuesday in last month’s forecast article and that came to pass. The updates released were limited to the regular operating systems and all forms of Office applications. Six zero-day vulnerabilities were announce.....»»

Category: securitySource:  netsecurityRelated NewsSep 6th, 2024