Page 2,059«..1020..2,0582,0592,0602,061..2,0702,080..»

Probing The Inner Workings Of High-Fidelity Quantum Processors – Eurasia Review

The Science

Tiny quantum computing processors built from silicon have finally surpassed 99 percent fidelity in certain logic operations (gates). Quantum computers store information in the quantum state of a physical system (in this case, two silicon qubits) then manipulate the quantum state to perform a calculation in a manner that isnt possible on a classical computer. Fidelity is a measure of how close the final quantum state of the real-life qubits is to the ideal case. If the fidelity of logic gates is too low, calculations will fail because errors will accumulate faster than they can be corrected. The threshold for fault-tolerant quantum computing is over 99 percent.

Three research groups demonstrated more than 99 percent fidelity for if-then logic gates between two silicon qubits. This required precisely measuring failure rates, identifying the nature and cause of the errors, and fine-tuning the devices. The researchers used a technique calledgate set tomographyto achieve this in two of the three experiments. The technique combined the results of many separate experiments to create a detailed snapshot of the errors in each logic gate. The researchers were able to make a precise determination of the error generated by different sources and fine-tune the gates to achieve error rates below 1 percent.

Quantum computingmay be able to solve certain problems, such as predicting the behavior of new molecules, far faster than todays computers. To do so, researchers must build qubits, engineer precise couplings between them, and scale up systems to thousands or millions of qubits.

Researchers expect qubits made of silicon to scale up better than the qubits used in todays testbed quantum computers, which rely on either trapped ions or superconducting circuits. Achieving high-fidelity logic gates opens the door to silicon-based testbed quantum computers. It also demonstrates the power of detailed error characterization to help users pinpoint error modes then work around or eliminate them.

Qubits protected, controllable 2-state quantum systems lie at the heart of quantum computing. Quantum computing processors are built by assembling an array of at least two (and hopefully someday thousands or millions) of qubits, with an integrated control system that can perform logic gates on each qubitandbetween pairs of qubits. Their performance and capability are limited by errors in the logic gates. High-fidelity gates have low error rates. Once the error rate is less than a certain threshold which scientists believe to be about 1 percent quantum error correction can, in principle, reduce it even further. Beating this threshold in laboratory experiments is a major milestone for any qubit technology.

Whatkindsof errors are occurring is also a big deal for quantum error correction. Some errors are easier to eliminate or correct; others may be fatal. Quantum computing researchers from the Department of Energy (DOE)-fundedQuantum Performance Laboratoryworked with Australian experimental physicists to design a new kind of gate set tomography customized to a 3-qubit silicon qubit processor. They used it to measure the rates of 240 distinct types of possible errors on each of six logic gates. Of those possible errors, 95 percent did not occur in the experiments, and the remaining errors added up to less than 1 percent infidelity. Research groups in Japan and the Netherlands reported similar results simultaneously, with the Dutch group also using the DOE-fundedpyGSTigate set tomography software to confirm their demonstration.

Here is the original post:
Probing The Inner Workings Of High-Fidelity Quantum Processors - Eurasia Review

Read More..

Quantum Computing Market Key Players, Product and Production Information analysis and forecast to 2026 – Running Africa

The business intelligence report on the Quantum Computing market contains in-depth information about factors influencing revenue generation such as prevailing and current industry trends, challenges faced by businesses, and opportunities available over 2021-2026.

Esteemed researchers cite that Quantum Computing market is projected to grow at a rate of XX% over the stipulated timeframe. By 20XX, it is projected to amass a valuation USD XX.

The research literature analyses the vertical thoroughly by fragmenting it into various segments, including product types, application range, and regions. It provides exhaustive information about revenue garnered, sales, and factors affecting the development of each sub-market. Moreover, it makes inclusion of vast information regarding leading companies, highlighting their weaknesses and strengths, so as to help stakeholders elevate their position in this domain.

Request Sample Copy of this Report @ https://www.runningafrica.com/request-sample/3254

Main highlights of the market report:

Quantum Computing market segments covered in the report:

Regional bifurcation: North America, Europe, Asia-Pacific, South America, Middle East & Africa, South East Asia

Product gamut: Hardware , Software and Cloud Service

Application spectrum: Medical , Chemistry , Transportation , Manufacturing and Others

Competitive dashboard: D-Wave Solutions , IBM , Google , Microsoft , Rigetti Computing , Intel , Origin Quantum Computing Technology , Anyon Systems Inc. , Cambridge Quantum Computing Limited , ColdQuanta , 1QBit , Xanadu Quantum Technologies , Honeywell , Zapata Computing , Fujitsu , QC Ware and Ion Q

Reasons for buying this report:

The key questions answered in this report:

Significant Point Mentioned in theResearch report:

Major highlights of the Table of Contentsof the Quantum Computing market Size study:

Request Customization on This Report @ https://www.runningafrica.com/request-for-customization/3254

Originally posted here:
Quantum Computing Market Key Players, Product and Production Information analysis and forecast to 2026 - Running Africa

Read More..

Truman and Hruby 2022 fellows explore their p – EurekAlert

ALBUQUERQUE, N.M. Postdoctoral researchers who are designated Truman and Hruby fellows experience Sandia National Laboratories differently from their peers.

Appointees to the prestigious fellowships are given the latitude to pursue their own ideas, rather than being trained by fitting into the research plans of more experienced researchers. To give wings to this process, the four annual winners two for each category are 100 percent pre-funded for three years. This enables them, like bishops or knights in chess, to cut across financial barriers, walk into any group and participate in work by others that might help illuminate the research each has chosen to pursue.

The extraordinary appointments are named for former President Harry Truman and former Sandia President Jill Hruby, now the U.S. Department of Energy undersecretary for nuclear security and administrator of the National Nuclear Security Administration.

Truman wrote to the president of Bell Labs that he had an opportunity, in managing Sandia in its very earliest days, to perform exceptional service in the national interest. The President Harry S. Truman Fellowship in National Security Science and Engineering could be said to assert Sandias intention to continue to fulfill Trumans hope.

The Jill Hruby Fellowship in National Security Science and Engineering offers the same pay, benefits and privileges as the Truman. It honors former Sandia President Jill Hruby, the first woman to direct a national laboratory. While all qualified applicants will be considered for this fellowship, and its purpose is to pursue independent research to develop advanced technologies to ensure global peace, another aim is to develop a cadre of women in the engineering and science fields who are interested in technical leadership careers in national security.

The selectees are:

Alicia Magann: The quantum information science toolkit

To help speed the emergence of quantum computers as important research tools, Alicia Magann is working to create a quantum information science toolkit. These modeling and simulation algorithms should enable quantum researchers to hit the ground running with meaningful science as quantum computing hardware improves, she says.

Alicia Magann will explore the possibilities of quantum control in the era of quantum computing during her Truman fellowship at Sandia National Laboratories. (Photo courtesy Alicia Magann) Click on the thumbnail for a high-resolution image.

Her focus will extend aspects of her doctoral research at Princeton University to help explore the possibilities of quantum control in the era of quantum computing.

At Sandia, she will be working with Sandias quantum computer science department to develop algorithms for quantum computers that can be used to study the control of molecular systems.

Im most interested in probing how interactions between light and matter can be harnessed towards new science and technology, Magann said. How well can we control the behavior of complicated quantum systems by shining laser light on them? What kinds of interesting dynamics can we create, and what laser resources do we need?

A big problem, she says, is that its so difficult to explore these questions in much detail on conventional computers. But quantum computers would give us a much more natural setting for doing this computational exploration.

Her mentor, Mohan Sarovar, is an ideal mentor because hes knowledgeable about quantum control and quantum computing the two fields Im connecting with my project.

During her doctoral research, Magann was a DOE Computational Science Graduate Fellow and also served as a graduate intern in Sandias extreme-scale data science and analytics department, where she heard by word of mouth about the Truman and Hruby fellowships. She applied for both and was thrilled to be interviewed and thrilled to be awarded the Truman.

Technical journals in which her work has been published include Quantum, Physical Review A, Physical Review Research, PRX Quantum, and IEEE Transactions on Control Systems Technology. One of her most recent 2021 publications is Digital Quantum Simulation of Molecular Dynamics & Control in Physical Review Research.

Gabriel Shipley: Mitigating instabilities at Sandias Z machine

When people mentioned the idea to Gabe Shipley about applying for a Truman fellowship, he scoffed. He hadnt gone to an Ivy League school. He hadnt studied with Nobel laureates. What he had done, by the time he received his doctorate in electrical engineering from the University of New Mexico in 2021, was work at Sandia for eight years as an undergraduate student intern from 2013 and a graduate student intern since 2015. He wasnt sure that counted.

Gabriel Shipley, who broadened the use of a small pulsed power machine called Mykonos in a past internship, plans to investigate the origins and evolution of 3D instabilities in pulsed-power-driven implosions at Sandia National Laboratories powerful Z machine during his Truman fellowship. (Photo courtesy of Gabe Shipley) Click on the thumbnail for a high-resolution image.

The candidates for the Truman are rock stars, Shipley told colleague Paul Schmit. When they graduate, theyre offered tenure track positions at universities.

Schmit, himself a former Truman selectee and in this case a walking embodiment of positive reinforcement, advised, Dont sell yourself short.

That was good advice. Shipley needed to keep in mind that as a student, he led 75 shots on Mykonos, a relatively small Sandia pulsed power machine, significantly broadening its use. I was the first person to execute targeted physics experiments on Mykonos, he said. He measured magnetic field production using miniature magnetic field probes and optically diagnosed dielectric breakdown in the target.

He used the results to convince management to let him lead seven shots on Sandias premier Z machine, an expression of confidence rarely bestowed upon a student. I got amazing support from colleagues, he said. These are the best people in the world.

Among them is theoretical physicist Steve Slutz, who theorized that a magnetized target, preheated by a laser beam, would intensify the effect of Zs electrical pulse to produce record numbers of fusion reactions. Shipley has worked to come up with physical solutions that would best embody that theory.

With Sandia physicist Thomas Awe, he developed methods that may allow researchers to scrap external structures called Helmholtz coils to provide magnetic fields and instead create them using only an invented architecture that takes advantage of Zs own electrical current.

His Truman focus investigating the origins and evolution of 3D instabilities in pulsed-power-driven implosions would ameliorate a major problem with Z pinches if what he finds proves useful. Instabilities have been recognized since at least the 1950s as weakening pinch effectiveness. They currently limit the extent of compression and confinement achievable in the fusion fuel. Mitigating their effect would be a major achievement for everyone at Z and a major improvement for every researcher using those facilities.

Shipley has authored articles in the journal Physics of Plasmas and provided invited talks at the Annual Meeting of the APS Division of Plasma Physics and the 9th Fundamental Science with Pulsed Power: Research Opportunities and User Meeting. His most recent publication in Physics of Plasmas, Design of Dynamic Screw Pinch Experiments for Magnetized Liner Inertial Fusion, represents another attempt to increase Z machine output.

Sommer Johansen: Wheres the nitrogen?

Sommer Johansen received her doctorate in physical chemistry from the University of California, Davis, where her thesis involved going backward in time to explore the evolution of prebiotic molecules in the form of cyclic nitrogen compounds; her time machine consisted of combining laboratory spectroscopy and computational chemistry to learn how these molecules formed during the earliest stages of our solar system.

Sommer Johansen aims to improve models that demonstrate how burning bio-derived fuels affect the Earths planetary ecology and severe forest fires caused by climate change during her Hruby fellowship at Sandia National Laboratories. (Photo courtesy of Sommer Johansen) Click on the thumbnail for a high-resolution image.

Cyclic nitrogen-containing organic molecules are found on meteorites, but we have not directly detected them in space. So how were they formed and why havent we found where that happens? she asked.

That work, funded by a NASA Earth and Space Science Fellowship, formed the basis of publications in The Journal of Physical Chemistry and resulted in the inaugural Lewis E. Snyder Astrochemistry Award at the International Symposium on Molecular Spectroscopy. The work also was the subject of an invited talk she gave at the Harvard-Smithsonian Center for Astrophysics Stars & Planets Seminar in 2020.

At Sandia, she intends to come down to Earth, both literally and metaphorically, by experimenting at Sandias Combustion Research Facility in Livermore on projects of her own design.

She hopes to help improve comprehensive chemical kinetics models of the after-effects on Earths planetary ecology of burning bio-derived fuels and the increasingly severe forest fires caused by climate change.

Every time you burn something that was alive, nitrogen-containing species are released, she says. However, the chemical pathways of organic nitrogen-containing species are vastly under-represented in models of combustion and atmospheric chemistry, she says. We need highly accurate models to make accurate predictions. For example, right now it isnt clear how varying concentrations of different nitrogenated compounds within biofuels could affect efficiency and the emission of pollutants, she said.

Johansen will be working with the gas-phase chemical physics department, studying gas-phase nitrogen chemistry at Sandias Livermore site under the mentorship of Lenny Sheps and Judit Zdor. UC Davis is close to Livermore, and the Combustion Research Facility there was always in the back of my mind. I wanted to go there, use the best equipment in the world and work with some our fields smartest people.

She found particularly attractive that the Hruby fellowship not only encouraged winners to work on their own projects but also had a leadership and professional development component to help scientists become well-rounded. Johansen had already budgeted time outside lab work at UC Davis, where for five years she taught or helped assistants teach a workshop for incoming graduate students on the computer program Python. We had 30 people a year participating, until last year (when we went virtual) and had 150.

The program she initiated, she says, became a permanent fixture in my university.

Alex Downs: Long-lived wearable biosensors

As Alex Downs completed her doctorate at the University of California, Santa Barbara, in August 2021, she liked Sandia on LinkedIn. The Hruby postdoc listing happened to show up, she said, and it interested her. She wanted to create wearable biosensors for long duration, real-time molecular measurements of health markers that would be an ongoing measurement of a persons well-being. This would lessen the need to visit doctors offices and labs for evaluations that were not only expensive but might not register the full range of a persons illness.

Alex Downs hopes to create wearable biosensors that gather real-time molecular measurements from health markers and would lessen the need to visit doctors offices and labs for evaluations during her Hruby fellowship at Sandia National Laboratories. (Photo courtesy of Alex Downs) Click on the thumbnail for a high-resolution image.

Her thesis title was Electrochemical Methods for Improving Spatial Resolution, Temporal Resolution, and Signal Accuracy of Aptamer Biosensors.

She thought, Theres a huge opportunity here for freedom to explore my research interests. I can bring my expertise in electrochemistry and device fabrication and develop new skills working with microneedles and possibly other sensing platforms. That expertise is needed because a key problem with wearable biosensors is that in the body, they degrade. To address this, Downs wants to study the stability of different parts of the sensor interface when its exposed to bodily fluids, like blood.

I plan not only to make the sensors longer lasting by improved understanding of how the sensors are impacted by biofouling in media, I will also investigate replacing the monolayers used in the present sensor design with new, more fouling resistant monolayers, she said.

The recognition element for this type of biosensor are aptamers strands of DNA that bind specifically to a given target, such as a small molecule or protein. When you add a reporter to an aptamer sequence and put it down on a conductive surface, you can measure target binding to the sensor as a change in electrochemical signal, she said.

The work fits well with Sandias biological and chemical sensors team, and when Downs came to Sandia in October, she was welcomed with coffee and donuts from her mentor Ronen Polsky, an internationally recognized expert in wearable microneedle sensors. Polsky introduced her to other scientists, told her of related projects and discussed research ideas.

Right now, meeting with people all across the Labs has been helpful, she said. Later, I look forward to learning more about the Laboratory Directed Research and Development review process, going to Washington, D.C. and learning more about how science policy works. But right now, Im mainly focused on setting up a lab to do the initial experiments for developing microneedle aptamer-based sensors, Downs said.

Sandia National Laboratories is a multimission laboratory operated by National Technology and Engineering Solutions of Sandia LLC, a wholly owned subsidiary of Honeywell International Inc., for the U.S. Department of Energys National Nuclear Security Administration. Sandia Labs has major research and development responsibilities in nuclear deterrence, global security, defense, energy technologies and economic competitiveness, with main facilities in Albuquerque, New Mexico, and Livermore, California.

Sandia news media contact: Neal Singer, nsinger@sandia.gov, 505-977-7255

See original here:
Truman and Hruby 2022 fellows explore their p - EurekAlert

Read More..

An orange revolution filled with chess, space and machines – DutchNews.nl – DutchNews.nl

24oranges.nl, the blog that is now a column, continues to bring you odd and fun Dutch things pressed for your pleasure.

My grandmother was Ukrainian and my grandfather was Belarusian. During the Russian Revolution, they both fled to Canada. One thing that was passed down from them to me was playing chess, taught to me when I was three years old. The Old Slavic word for chess, (shahmat), comes from the Persian for the king [shah] is dead and its also where checkmate comes from.

Playing chess outside is increasingly becoming a Dutch thing in part thanks to Jess Medina Molina, the founder of Urban Chess. One day while jogging, he thought there should be chess tables outdoors. He began convincing local councils to install chess tables in parks, some of which are also wheelchair accessible.

Inspired by his daughter who had trouble with arithmetic, Medina Molina learned about how chess had a positive effect on childrens brains. Chess helps overcome loneliness, improves problem-solving skills and makes people get out more. On April 2 in Apeldoorn, Park Zuidbroek will inaugurate its new chess board. Medina Molina is also pushing for some chess tables in Amsterdams Vondelpark.

A galaxy near you

An international team of researchers led by Dutch PhD student Martijn Oei has discovered a radiogalaxy that is at least 16 million light-years long, making it the largest structure made by a galaxy to this day. This is a ginormous deal because scientists had never seen a structure this big made by a single galaxy. It also disproves some long-held hypotheses about the growth of radio galaxies.

Named Alcyoneus, the radio giant is three billion light-years away from Earth. Alcyoneus was a giant that fought against Heracles and other Olympians for supremacy over the cosmos. Despite the mind-boggling distance, the giant looms as large in the sky as the moon, an indication that the structure had to have a record length. What has given Alcyoneus its record length, still remains a mystery.

From Bletchley Park to Alan Turingpark

Speaking of cracking codes, the port city of IJmuiden, home to one of the largest sea locks in the world, recently opened the Alan Turingpark, named after British mathematician, computer scientist and cryptanalist Alan Turing who was instrumental in helping defeat the Germans in WWII. Turing was also a gay man who was mistreated by the state, making him a tragic symbol for LGBTQIA emancipation.

Remy and the Machines

Harpist Remy van Kesteren, considered one of the worlds best harpists, is currently touring Dutch theatres with 30 robots. Remy & The Analogue Robot Orchestra is made up of music boxes controlled by Remy while hes at the harp.

The idea came to him six years ago at music festival Into The Great Wide Open on the island of Vlieland where he met robot builder Jurjen Alkema. They clicked, and the rest is music. The orchestra plays their own compositions and covers.

The DutchNews.nl team would like to thank all the generous readers who have made a donation in recent weeks. Your financial support has helped us to expand our coverage of the coronavirus crisis into the evenings and weekends and make sure you are kept up to date with the latest developments.

DutchNews.nl has been free for 14 years, but without the financial backing of our readers, we would not be able to provide you with fair and accurate news and features about all things Dutch. Your contributions make this possible.

If you have not yet made a donation, but would like to, you can do so via Ideal, credit card or Paypal.

Read the original here:
An orange revolution filled with chess, space and machines - DutchNews.nl - DutchNews.nl

Read More..

Trend Micro Internet Security – Wikipedia

Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security program developed by Trend Micro for the consumer market. According to NSS Lab comparative analysis of software products for this market in 2014, Trend Micro Internet Security was fastest in responding to new internet threats.[1]

In addition to anti-malware and web threat protection, the premium version of this software includes compatibility for PCs, Macs, Android or iOS mobile devices; parental controls; identity theft prevention; a privacy scanner for major social networking sites; and 25 GB of cloud storage.[2]

Features in Trend Micro Internet Security 2015 include:[2][3]

The software also includes:

Trend Micro Premium Security includes additional features, including:

AV-Comparatives awarded Trend Micro a three-star Advanced + ratingthe highest ranking given by the organizationin AV-Comparatives Whole Product Dynamic Real-World Protection Test for 2014.[4]

AV-TEST in October 2014 gave Trend Micro Internet Security 2015 a score of 17 out of a possible 18 points.[5]

Trend Micro Maximum Security scored the highest success rate in blocking malware downloads in NSS Labs 2014 Consumer Endpoint Protection test focused on Socially Engineered Malware. The results were based on continuous series of tests to determine the participants effectiveness against socially engineered malware. NSS Labs is an independent network testing facility, security and consultancy organization. NSS Labs also found that Trend Micro had the quickest time in adding protection against unknown threats - less than 15 minutes.[1]

In January 2016 it was discovered that the consumer version of Trend Micro AV allowed any website visited by its users to execute arbitrary code or read all browser passwords on the Windows PC it purportedly protected. A patch was later issued to close the issue.[6]

In June 2014, AV-Test published results for its mobile security endurance tests, which assessed more than 30 apps over a six-month period. Trend Micros mobile security tied for the highest overall score of 13 out of 13 points.[7]

Previous versions include:

As of January 2015, Trend Micro supported Trend Micro Internet Security versions 19/2011 and higher.[8]

PC-cillin 2000 and earlier versions were virus scanners without any additional features. PC-cillin 2002 and 2003 were stand-alone virus scanners which also included a firewall component and improved on the softwares scanning and virus detection engine. Newer versions of Trend Micro Internet Security offer additional features such as spyware protection, antispam and an integrated firewall along with an improved scanning and virus detection engine and enhanced heuristics. PC-cillin 2003 was the last stand-alone antivirus product offered by Trend Micro until 2007, when the company released a standalone anti-malware product that offered protection from malicious software including viruses, spyware, and adware.

Read moreTrend Micro HomePage

The rest is here:
Trend Micro Internet Security - Wikipedia

Read More..

Cyber security expands at IC with Duo authentication – Ithaca College The Ithacan

Ithaca College staff, students and faculty can expect to find an extra step when logging into Zoom and Formstack Forms. Duo Multi-Factor Authentication (MFA) will now be required to prevent accounts from being compromised.

The changes were announced over Intercom, with Zoom requiring Duo MFA on March 17. Formstacks Duo MFA implementation was originally scheduled for March 16, but was pushed back to March 21. When logging in, students will now be expected to answer a phone call or go into the Duo app in order to log into Zoom. Ithaca College is one of more than 300 educational institutions that uses Duo MFA for its programs.

MFA is an electronic authentication method that is gaining popularity with companies including Bank of America, Facebook and Microsoft. For security purposes, it requires users to use two or more identity verification factors in order to gain access to a website or application. This multi-step verification process helps to reinforce security, while usernames and passwords remain vulnerable to cyber-attacks and being stolen by third parties.

While Zoom was highly utilized during the COVID-19 pandemic, it also experiences a form of cyber-attack known as Zoombombing, a practice in which internet trolls hijack calls inserting lewd, obscene, racist, misogynistic, homophobic, Islamophobic or antisemitic material. Zoombombings have occured during classes at the college in the past. Proven methods to prevent this include not sharing Personal Meeting IDs when hosting public events, asking users to provide their email address when registering for an event and MFA.

At IC, we will continue to add Duo protection to systems wherever login is required, while also continuing enhancements to our single sign-on systems to reduce how often individuals are prompted to authenticate, Jason Youngers, information security officer for Information Security and Access Management said via email.

While there have been no immediate threats to security in these programs, David Weil, chief information officer for Information Technology, said the changes were made because of MFAs ability to deter hacking and to better protect all student, staff and faculty accounts.

It really has been shown to be a very strong deterrent to having an account be compromised, Weil said. And industry best practices is really recommending that wherever possible, you should put MFA in front of all logins it really is another layer of protection.

Duos move to Zoom and Formstack was news to some students. Senior Nicholas Isaacs said he was surprised to find out that he would be required to use Duo to log into Zoom. For Isaacs, the change is not entirely welcome.

I just think its too many extra steps, Isaacs said. I think that both platforms have enough security but I can see why the college is doing it. But from a practical standpoint, its really not the best.

For some students, the process of logging in with MFA is tedious. Whenever sophomore Devan Adegbile was without her phone, she said logging into websites became more difficult.

Sometimes I just quickly want to look something up [on Degree Works] on my computer and I need to get my phone, but its all the way in a different room, so its a little inconvenient for me, Adgebile said.

Isaacs similarly said the process of moving between computer and phone to login has created problems for him in the past. In one instance, Isaacs said he was unable to login because his phone had died and he was not able to access Duo Mobile.

Theres been cases where my phones been off and [I] havent been able to get in, Isaacs said. I have to charge my phone before I can get in and I just couldnt get into the account, so that was a big inconvenience. But other than that, if you have your phone on, then maybe [logging in is] 30 seconds more at most.

Duo offers a way to speed up the login process by allowing users to remain logged in for 90 days. Whenever a user is asked to use Duo, Weil said it was to ensure the person using the device is who they say they actually are.

On my computer that Im using right now, I have not been asked to use Duo at all today, Weil said. If I were to use a different machine, its going to be Oh, I dont know who you really are, let me challenge it. I know it can be a little frustrating, but its using intelligence behind the scenes its not just arbitrarily asking.

For sophomore Jesus Burgos, using Duo is just another part of his login process which is why he said he did not mind the addition of Duo to Zoom and Formstack. Instead, he saw it as an opportunity to further prevent Zoombombings.

If you get hacked or if someone knows your password, that doesnt mean theyre going to be able to get into your account, Burgos said. I hope that people here are more mature and that [Zoombombings] wouldnt happen in Zoom meetings and at Ithaca College.

More:
Cyber security expands at IC with Duo authentication - Ithaca College The Ithacan

Read More..

The hard truth behind Biden’s cyber warnings – POLITICO

Security experts have expressed the most worry about hacks on the energy and finance industries. However, each of the nations crucial sectors is at risk in some way.

We should consider every sector vulnerable, said Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, during a three-hour call this week with around 13,000 participants from multiple industries on the Russian hacking threat. In some ways, we should assume that disruptive cyber activity will occur.

Inevitably, some attack will break through if an adversary like Russia puts enough resources behind it.

If a nation state brings its A-Team, the ability to be 100 percent effective on defense is not always there, said Senate Intelligence Chair Mark Warner (D-Va.), pointing to concerns around the energy and financial sectors. So how do we stay resilient, even if the bad guys get in?

President Joe Biden warned this week that Russian cyberattacks on American companies were coming, citing evolving intelligence that Vladimir Putin was considering using his nations cyber abilities against targets in the United States.

Those warnings came amid a scramble by CISA and other agencies to urge businesses and other potential targets to harden their defenses, along with continued calls from Congress for tougher deterrence against Russian hacking. Attempting to fill that gap, Biden warned Putin during a summit meeting last summer that we will respond if Moscow attacks the United States critical infrastructure.

But critical covers a ton of territory: The Department of Homeland Security has applied that term to 16 sectors of the economy, including dams, transportation, water plants, health care, energy, the financial industry and government. Both criminal and Kremlin-backed Russian hackers have gone after targets in those fields for more than a decade.

The U.S. hammered that message Thursday, when the Justice Department unsealed indictments against three Russian spies it accused of seeking to breach more than 500 energy-related entities, including the U.S. Nuclear Regulatory Commission and a nuclear power plant in Kansas.

The Biden administrations public alarms about the threats cite the risk of retaliation from a desperate Putin, as victory eludes his forces in Ukraine and Western sanctions devastate Russias economy. But the alerts have focused more on some industries than others.

Were really focusing right now on what we call the lifeline sectors, specifically the communications sector, the transportation sector, the energy sector, the water sector, and then of course the financial services sector, Easterly said during the call this week.

These are some of the areas where the United States is vulnerable:

The U.S. has thousands of power plants, hundreds of thousands of miles of electrical transmission lines and millions of miles of pipelines carrying natural gas, oil or fuels like gasoline. Russia has taken notice, said the FBI, which cautioned in a recent alert to industry partners that hackers there had scanned the computer networks of at least five U.S. energy groups.

Russia has shown its ability to turn out the lights in Ukraine, where cyberattacks in 2015 and 2016 temporarily cut off power in parts of the country. A Russian-based criminal hacking group created similar mischief in the U.S. last spring, when a ransomware attack on Colonial Pipeline cut off gasoline deliveries for much of the U.S. East Coast.

Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure such as disrupting an electrical distribution network for at least a few hours.

U.S. intelligence communitys Worldwide Threat Assessment, 2019

In 2019, the U.S. intelligence community said in an unclassified assessment that Russia has the capability to disrupt electrical distribution centers in the United States for at least a few hours. One of the DOJ indictments unsealed Thursday detailed an unsuccessful effort by Russian hackers to attack a U.S. energy company with a type of malware that would have given them access to certain control systems.

The one to me at the top of the list is energy, said Jim Richberg, a former U.S. national intelligence manager for cyber and current public cybersecurity executive at Fortinet. The reality is if you take away power, none of the other 15 officially designated critical infrastructure are going to work.

Not all parts of the U.S. energy supply face equal oversight of their cybersecurity practices: The electricity sector has long faced mandatory cyber standards, for example, while the oil and gas pipeline industry is sparring with federal regulators over the governments first-ever attempt to impose similar requirements for those companies.

Cybersecurity experts generally consider financial institutions to be ahead of other industries in their defenses against hacking, in part because they are highly regulated. Cyberattacks that significantly harm banks or other financial companies including insurers, stock or commodity exchanges, payments systems or financial market utilities are relatively rare, according to the Financial Services Information Sharing and Analysis Center, a global cyber information clearinghouse for the industry.

But as financial services increasingly shift online, those risks have accelerated. FS-ISAC raised its threat level from guarded to elevated three times in 2021, up from the once-a-year that was typical in the previous five years.

That threat level is once again elevated, but not yet considered high or severe, FS-ISAC chief executive Steven Silberstein said in a statement Thursday.

This means that the financial sector is in a state of heightened cybersecurity awareness and is taking extra steps to strengthen cyber defenses, he said. At this time, the sector is not seeing any significant increase of attack activity directly attributable to any origin.

The Covid-19 pandemic helped shine a light on vulnerabilities in hospitals and other health-care companies.

The sector is an attractive target for hackers given its trove of valuable information, and because the need to remain operating means that hospitals facing a ransomware attack feel the pressure to pay.

Our organizations are continuously being probed and scanned from Russia, China, Iran and North Korea thousands of times a day, literally, whether its a small critical access hospital or the largest systems.

John Riggi, the national adviser for cybersecurity and risk at the American Hospital Association.

Amid a hacking surge, nearly 50 million people in the U.S. saw their sensitive health data breached in 2021, more than triple 2018s total, according to a POLITICO analysis of data from the Department of Health and Human Services. In addition to being overwhelmed with patients during the pandemic, health care organizations often have meager cybersecurity budgets, according to the most recent Healthcare Information and Management Systems Society cybersecurity survey.

Our organizations are continuously being probed and scanned from Russia, China, Iran and North Korea thousands of times a day, literally, whether its a small critical access hospital or the largest systems, John Riggi, the national adviser for cybersecurity and risk at the American Hospital Association, said last month.

A direct attack on U.S. health care organizations which could threaten patients lives would be more likely if more countries get involved in the war in Ukraine, or if sanctions cripple Russia, experts say.

If NATO gets involved, or if somehow the U.S. gets involved, thats going to change the whole dynamic, said Mac McMillan, CEO of the cybersecurity firm CynergisTek. Russia is being careful not to do anything overtly to the United States at the moment.

These essentials are also vulnerable, as shown in an unsuccessful cyberattack last year on a Florida water treatment plant, in which unidentified hackers tried to inject poisonous levels of lye into a citys water supply. Months later came a ransomware attack on JBS Foods, the worlds largest meat processing company, which contributed to a spike in U.S. consumer prices for pork and other meats. The company eventually agreed to pay $11 million to the hackers, whom authorities identified as a Russian criminal hacker gang.

The JBS attack came after years of warnings that food and agriculture companies werent keeping up with proper cybersecurity protocols, even as the industrys day-to-day operations increasingly relied on the internet and automation. Cybersecurity measures have been mostly voluntary across the massive sector, with virtually no federal rules in place. And while other industries that have formed information-sharing collectives to coordinate their responses to potential cyber threats, the food industry disbanded its group in 2008.

Russias ongoing invasion of Ukraine is a stark reminder that we must protect our ag producers from outside threats that could interrupt the United States food security and critical supply chains, said Sen. Steve Daines (R-Mont.). We need to be doing everything we can to proactively support and defend Americas producers which in turn strengthens our national security.

Air, transit, train, ship and even car travel have also shown themselves vulnerable to various forms of hacking, some more plausible than others.

For aviation, the possible targets include airports flight information display boards, vendor payment systems, parking meters or any technology that can connect to public Wi-Fi, according to a recent report from the Institute for Critical Infrastructure Technology. Airlines booking systems or flight manifests are particularly vulnerable, as shown by repeated computer failures that lead to mass flight cancellations, while hackers have also stolen personal passenger data.

As technology makes planes more interconnected, the Government Accountability Office warned in a 2020 report that critical data used by cockpit systems could be altered, and that malevolent hackers could seek to disrupt flight operations with various types of attacks on navigational data.

In 2017, the giant Danish shipping company Maersk was one of many businesses around the globe crippled by a massive cyberattack later blamed on Russia. And as car manufacturers look toward a future of self-driving cars, the lack of federal regulations around the security of autonomous vehicles could become a security hazard.

The most at-risk targets include small businesses and local governments, which often have little funding for cyber defenses and lack the expertise to counter large hacking outfits. A spree of ransomware attacks in 2019 mired the governments of almost two dozen small towns in Texas, while a Small Business Administration survey found that 88 percent of companies believed they were vulnerable to a cyberattack.

We have a major challenge ahead, and that is to help businesses, particularly small businesses, local governments that are small get prepared for this, Sen. Ron Wyden (D-Ore.), a member of the Senate Intelligence Committee, said Wednesday.

But a determined adversary can penetrate even large companies and federal agencies. That became apparent after the discovery in late 2020 of a sophisticated cyber-espionage campaign blamed on Russian foreign intelligence, which compromised at least 12 federal agencies and 100 private companies.

If you have 3,000 servers if youre a large organization, its easy to gain access to a low-value server or something thats unpatched, said Jonathan Reiber, a top Pentagon cyber official during the Obama administration and current senior director for cybersecurity strategy and policy at AttackIQ. You cant patch every vulnerability right now, today, its not possible.

You have to assume the adversary is going to break past the perimeterso the first step is to assume breach and plan for known threats, Reiber said.

Kate Davidson, Ben Leonard, Meredith Lee, Tanya Snyder, Oriana Pawlyk and Alex Daugherty contributed to this report.

Continue reading here:
The hard truth behind Biden's cyber warnings - POLITICO

Read More..

Avast antivirus | What it is, features, functions and more – New America Media

In the search for internet security, every system is on the hunt for the best safeguard programming for its users. Several types of malware situations can cause great danger to ones devices. This also happens because of the grand level of the page's protection. Thankfully, these issues create a list of consequences that can be avoidable nowadays. Above all, with the use of effectively programmed tools, it can be easier to detect software issues related to dangerous external agents. And on the subject, one of the most effective software existing is Avast Antivirus software.

Avast Antivirus is a protective software with a strong sense of practical internet safety. In addition, its system comes with freeware and paid versions, with s great diversity of functions and features. Here well explain these topics in the best way possible

In between its main functions, Avast Antivirus counts with:

The free version of Avast Antivirus also combines the most advanced cybersecurity system, based on AI. In other words, this system counts with a threat detection network thats made a safer program for over 435 million users. This also allows the system to protect its users from cyberattacks in real-time. In addition, the real-time feature of this system can get to detect every type of malware for its immediate blocking. And at the same time, it analyses the users PC for its complete assuring and security.

Avast Antivirus has got a lot of great functions to offer regardless of the device, including:

For general reasons, Avast Antivirus is still a solid choice for malware treatment on devices. Therefore, it comes with great permanent choices for users for its economical and operational processes. Although theres still a vast variety of antivirus software to choose from, Avast Antivirus will always grant strong virus disinfectant tasks. In a specific sense, Avast Antivirus brings out a safe computing system to boost the devices functionality and effectiveness.

See the article here:
Avast antivirus | What it is, features, functions and more - New America Media

Read More..

Vladimir Putin increases security after invasion of Ukraine: No mobile phone, no internet, and his own army – Marca English

A month after the start of the war in Ukraine and with Russian troops showing no mercy to the civilian population, Vladimir Putin is living in a parallel world. The president, given his past as a spy for the KGB, wants to control everything and fears for his security.

During the war, Russia has been accused of countless war crimes, including the use of unauthorised weapons and executions of civilians.

All of this has been orchestrated by Putin who, according to the BBC, has increased his security amid fears of attacks against him. The Russian Presidential Security Service, which reports to Russia's Federal Security Service (FSO), is responsible for his protection and that of his entourage.

Among the many measures that the Russian leader has in place, the fact that his entourage is divided into four circles stands out.

The first is made up of his bodyguards, the second of guards who go unnoticed in public, the third is in charge of surrounding the perimeter, and the last is made up of snipers posted on building tops.

The BBC has also revealed that Vladimir Putin does not like helicopters, so he travels in a motorcade of motorcyclists, black cars and trucks. On his way, traffic is stopped and any drones are prevented from flying over the area.

To reinforce his security, Putin has his own personal 'army', known as Rosgvardia and supported by the Russian National Guard.

"It's a huge number, security units for presidents in the US are nowhere near that number," Stephen Hall, an academic expert on Russia at the University of Bath in the UK, told the BBC.

Given the scale of Russia's actions in Ukraine, Vladimir Putin trusts no one and fears he will be poisoned. For this reason, the president has his own taster, who is responsible for tasting food before he does.

Such is the former KGB spy's obsession that, at toasts, he usually drinks from a bottle brought to him by his team and not from the one drunk by the rest, as Mark Galeotti explains in BBC's Mark Galeotti.

Another sign that Putin's paranoia has only increased with each passing day is that he does not use mobile phones or the internet. He is afraid of being tracked and all the documentation he handles is on paper, to prevent outside agencies such as the CIA from spying on him.

In recent months, Putin's public appearances have also declined, largely because of the pandemic. But everything has worsened since the start of the war, since which the Russian is rarely seen and his circle is increasingly closed.

Continue reading here:
Vladimir Putin increases security after invasion of Ukraine: No mobile phone, no internet, and his own army - Marca English

Read More..

What is Session Hijacking and How to Prevent It – TheWindowsClub

This article is about Session Hijacking and the ways to prevent it. But before we proceed with it, let me first tell you what a Session is.The total time you devote to your internet activity is called a Session. A session starts as soon as you log into a website or a service and ends when you end the connection or shut down your computer system. All your internet activity details are stored in a session temporarily.

When a Session is a time when you are on the internet, Session hijacking means an attack over your internet session and the most common example one can give here is that, when you are using internet banking to check your bills or to do some transaction, an attacker can take over your internet session and hijack it. Session hijacking is usually done using web applications or browser sessions.A session hijacker can get complete access to your session and can do anything you could do on that website.

Lets learn about a few more examples of Session Hijacking so that you can avoid them.

Session Hijacking can be done in three different types

In the Active session hijacking, the attacker attacks your active internet connection, which means, hijacking your internet session while you are logged in and the other is passive session hijacking wherein the attacker monitors your session and steals the information exchanged between you and the server. In a hybrid hijack, the attackers monitor the network session and then attack as soon as they find the way.

Read:What are Cloud Security Challenges, Threats and Issues

Session Hijacking undoubtedly is one of the most common cyber-crime and is pretty scary too, but we can certainly prevent it with some simple measures. These attacks can really bring some terrible consequences for business organizations including data theft, financial losses, and much more.

As we can see most of the attacks happen through malicious links, the best way to prevent these attacks is to be watchful and check if a doubtful link is safe or not. The attackers use very catchy and tempting phrases like, click on this link to claim your prize or they may try to scare you by saying, Is this you in this video,to trick you but you should not click on any link until it is from a verified and legitimate sender.

Organizations can add certain encryptions to avoid such session hijacking on their official websites and accounts. Certificates like SSL (Secure Sockets Layer) and TLS (Transport Layer Security) safeguard your data online and also make your internet connectin secure enough for the attackers to enter.

HTTPS (Hypertext transfer protocol secure) is a better and more secure version of HTTP. Especially the websites that require login details. HTTPS makes sure that the website has the SSL and TLS certification throughout the session and ensures the increased security of data transfer. Also, popular web browsers like Google Chrome flag all the non-HTTPS websites as unsafe, and you get a warning message too.

Make sure that your PC and the operating system are updated regularly. Protect your PC from viruses by using good antivirus software. Also, keep updating and patching your web browsers on a regular basis.

Make sure that you log out of all your active internet sessions after you are done with the work there. While most of the banking websites end the session automatically at a set time, you should also log out of the shopping websites when not in use.

This is actually the best thing you can do to avoid session hijacking. Avoid using public WiFi and public computers, especially to access your banking websites or any website that requires your login credentials. If you have to use public WiFi, make a VPN (Virtual Private Network) to make sure that no one intrudes.

A session is said to be hijacked when an attacker intrudes in your session and takes full control. The attackers most of the time impersonate themselves like you and steal all your important data stored on the webserver.

Read: Internet Security article and tips for Windows users

Yes, a VPN established the internet connection through a private tunnel and hides your IP address. It also keeps your internet activity secret making it almost impossible for the attackers to intrude.

Go here to read the rest:
What is Session Hijacking and How to Prevent It - TheWindowsClub

Read More..