Slashdot: Hardware's Journal
 
[Most Recent Entries] [Calendar View]

Thursday, December 6th, 2018

    Time Event
    3:30a
    Quantum Computers Pose a Security Threat That We're Still Totally Unprepared For
    An anonymous reader quotes a report from MIT Technology Review: The world relies on encryption to protect everything from credit card transactions to databases holding health records and other sensitive information. A new report from the U.S. National Academies of Sciences, Engineering, and Medicine says we need to speed up preparations for the time when super-powerful quantum computers can crack conventional cryptographic defenses. The experts who produced the report, which was released today, say widespread adoption of quantum-resistant cryptography "will be a long and difficult process" that "probably cannot be completed in less than 20 years." It's possible that highly capable quantum machines will appear before then, and if hackers get their hands on them, the result could be a security and privacy nightmare. Today's cyberdefenses rely heavily on the fact that it would take even the most powerful classical supercomputers almost unimaginable amounts of time to unravel the cryptographic algorithms that protect our data, computer networks, and other digital systems. But computers that harness quantum bits, or qubits, promise to deliver exponential leaps in processing power that could break today's best encryption. The report cites an example of encryption that protects the process of swapping identical digital keys between two parties, who use them to decrypt secure messages sent to one another. A powerful quantum computer could crack RSA-1024, a popular algorithmic defense for this process, in less than a day. The U.S., Israel and others are working to develop standards for quantum-proof cryptographic algorithms, but they may not be ready or widely adopted by the time quantum computers arrive. "[I]t will take at least a couple of decades to get quantum-safe cryptography broadly in place," the report says in closing. "If that holds, we're going have to hope it somehow takes even longer before a powerful quantum computer ends up in a malicious hacker's hands."

    Read more of this story at Slashdot.

    Image
    10:00a
    24 Amazon Workers Sent To Hospital After Robot Accidentally Unleashes Bear Spray
    Joe_Dragon shares a report from ABC News: Twenty-four Amazon workers in New Jersey have been hospitalized after a robot accidentally tore a can of bear repellent spray in a warehouse, officials said. The two dozen workers were treated at five local hospitals, Robbinsville Township communications and public information officer John Nalbone told ABC News. One remains in critical condition and 30 additional workers were treated at the scene. The official investigation revealed "an automated machine accidentally punctured a 9-ounce bear repellent can, releasing concentrated Capsaican," Nalbone said. Capsaican is the major ingredient in pepper spray. The fulfillment center was given the all clear by Wednesday evening. "All of the impacted employees have been or are expected to be released from hospital within the next 24 hours. The safety of our employees is always our top priority and a full investigation is already underway. We'd like to thank all of the first responders who helped with today's incident," Amazon said in a statement Wednesday night.

    Read more of this story at Slashdot.

    Image
    9:02p
    Snapdragon 8cx Gives Windows Its Most Extreme Arm Chip Yet
    Qualcomm has announced the Snapdragon 8cx Compute Platform, a new flagship "Extreme" chipset for Windows on Arm notebooks, tablets, and 2-in-1s that promises more connectivity, more power, and battery life in excess of 25 hours. From a report: The new platform also debuts Qualcomm's new nomenclature for that ecosystem of devices, borrowing technologies from Snapdragon for smartphones but shaping them for ultraportable computing. It comes twelve months after Qualcomm announced its first Windows on Arm products. At last year's Snapdragon Summit, partners ASUS and HP revealed a Windows 10 notebook and 2-in-1, respectively, each running Microsoft's software on Qualcomm's Snapdragon 835. The Snapdragon 8cx Compute Platform won't replace the 850 -- or, indeed, be called the Snapdragon 1000 or Snapdragon 8180 as the rumors suggested -- but instead sit above it in the Windows on Arm ecosystem. Described as "a new tier of premium computing" by Qualcomm's Miguel Nunes, senior director of product management, ahead of the Snapdragon Summit 2018 at which SlashGear is Qualcomm's guest, it was also developed from the ground up with computing in mind. Its predecessors were, of course, mobile chipsets coopted into laptop use.

    Read more of this story at Slashdot.

    Image
    10:20p
    Eastern European Banks Were Attacked Via Backdoors Directly Connected To Local Networks, Report Finds
    An anonymous reader writes: Karspesky security researcher Sergey Golovanov writes about recent cybertheft incidents involving hardware backdoors planted by criminals. Each attack had a common springboard: an unknown device directly connected to the company's local network. In some cases, it was the central office, in others a regional office, sometimes located in another country. At least eight banks in Eastern Europe were the targets of the attacks, which caused damage estimated in the tens of millions of dollars. Hardware backdoors are cheap and immune to antivirus. A firmware modified OpenWrt based router can provide covert remote access, painless packet captures, and secure VPN connections with the flip of a switch. Will a flashlight and a ladder be common tools of computer security someday? After the cybercriminals entered a organization's building, connected a device to the local network and scanned the local network seeking to gain access to the resources, they proceeded to stage three. "Here they logged into the target system and used remote access software to retain access," writes Golovanov. "Next, malicious services created using msfvenom were started on the compromised computer. Because the hackers used fileless attacks (PDF) and PowerShell, they were able to avoid whitelisting technologies and domain policies. If they encountered a whitelisting that could not be bypassed, or PowerShell was blocked on the target computer, the cybercriminals used impacket, and winexesvc.exe or psexec.exe to run executable files remotely."

    Read more of this story at Slashdot.

    Image
    11:00p
    Tesla's Giant Battery In Australia Saved $40 Million During Its First Year, Report Says
    Last December, Tesla switched on the world's biggest lithium ion battery in South Australia to feed the country's shaky power grid for the first day of summer. Neoen, the owner of the giant battery system, released a new report for the first full year of operation and revealed that the energy storage system saved about $40 million over the last 12 months. Electrek reports: The energy storage capacity is managed by Neoen, which operates the adjacent wind farm. They contracted Aurecon to evaluate the impact of the project and they estimate that the "battery allows annual savings in the wholesale market approaching $40 million by increased competition and removal of 35 MW local FCAS constraint." It is particularly impressive when you consider that the massive Tesla Powerpack system cost only $66 million, according to another report from Neoen. Here are the key findings from the report: - Has contributed to the removal of the requirement for a 35 MW local Frequency Control Ancillary Service (FCAS), saving nearly $40 million per year in typical annual costs - Has reduced the South Australian regulation FCAS price by 75% while also providing these services for other regions - Provides a premium contingency service with response time of less than 100 milliseconds - Helps protect South Australia from being separated from the National Electricity Market - Is key to the Australian Energy Market Operator's (AEMO) and ElectraNet's System Integrity Protection Scheme (SIPS) which protects the SA-VIC Heywood Interconnector from overload

    Read more of this story at Slashdot.

    Image

    << Previous Day 2018/12/06
    [Calendar]
    Next Day >>

Slashdot: Hardware   About LJ.Rossia.org