-
Seeing Behind the Mask
There is a need for face recognition to be able to “see behind the mask” for security and safety. Researchers discusses the potential of new software which will allow facial recognition to work despite the mask you use.
-
-
Knocking Cloud Security Off Its Game
Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.
-
-
More Feelings of Misinformation, More News Avoidance
As people have more difficulty distinguishing fact from fiction in the United States, they are more likely to feel news fatigue and avoid news altogether, according to a new study. More than an unintentional avoidance because of lack of media exposure, the researchers say people actively avoid news.
-
-
Beware of AI-based Deception Detection, Warns Scientific Community
Artificial intelligence may soon help to identify lies and deception. If only it were as easy as with Pinocchio: Researchers warn against premature use.
-
-
What Is the CHIPS Act?
Extraordinary U.S. government incentives are proving popular with many large chipmakers, but it is too early to tell how much of the semiconductor industry can be lured back to the United States.
-
-
Why Japan Is Investing in Semiconductors Once More
Japan was once the world’s leading chip manufacturer. Now, concerns over supply chains and geopolitical tensions have prompted the government to provide funding for foreign firms and domestic manufacturers.
-
-
How Artificial Intelligence Can Transform U.S. Energy Infrastructure
Groundbreaking report provides ambitious framework for accelerating clean energy deployment while minimizing risks and costs in the face of climate change.
-
-
Computer Scientists Unveil Novel Attacks on Cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.
-
-
Assessment of Israeli Strike on Iran near Esfahan
The Israeli attack on the S-300 missile defense system deployed around Iran’s nuclear facility in Esfahan demonstrated the capability of Israeli stand-off weapons to target deep inside Iran, evading detection and air defenses, leaving Iran’s nuclear and military facilities more vulnerable to attack.
-
-
Deep Learning Model Helps in Crime Detection and Crime Hot Spot Prediction
New research has turned to emotional data alongside machine learning (ML) and deep learning (DL) techniques to develop technology that might one day help us better understand the criminal mind and perhaps even predict criminal activity so that it might be prevented.
-
-
This Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
-
-
15 Things You Don’t Know About Israel’s Air Defense Systems
Israel has sustained attacks from enemies throughout its history and has invested heavily in high tech defense technologies that are the envy of the world’s military.
-
-
DeFake Tool Protects Voice Recordings from Cybercriminals
In what has become a familiar refrain when discussing AI-enabled technologies, voice cloning is enabling increasingly sophisticated scams and deepfakes. The Federal Trade Commission held a Voice Cloning Challenge to encourage the development of technologies to prevent, monitor and evaluate malicious voice cloning.
-
-
Spyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora
Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.
-
-
Israel’s Cybersecurity Market is Maturing, and Just in Time
As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.
-
More headlines
The long view
Nuclear Has Changed. Will the U.S. Change with It?
By Christina Pazzanese
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Huge Areas May Face Possibly Fatal Heat Waves if Warming Continues
A new assessment warns that if Earth’s average temperature reaches 2 degrees C over the preindustrial average, widespread areas may become too hot during extreme heat events for many people to survive without artificial cooling.
Exploring the New Nuclear Energy Landscape
By Josh Blatt
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.