433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Mirai Bot now incroporating (malformed?) DrayTek Vigor Router Exploits, (Sun, Mar 16th)

Last October, Forescout published a report disclosing several vulnerabilities in DrayTek routers. According to Forescount, about 700,000 devices were exposed to these vulnerabilities [1]. At the time, DrayTek released firmware updates for affected routers [2]. Forescout also noted that multiple APTs targeting devices.
http://news.poseidon-us.com/TJYtlS

Quantum spin model made from nanographene molecules

Researchers have experimentally recreated another fundamental theoretical model from quantum physics, which goes back to the Nobel Prize laureate Werner Heisenberg. The basis for the successful experiment is made of tiny carbon molecules known as nanographenes. This synthetic bottom-up approach enables versatile experimental research into quantum technologies, which could one day help drive breakthroughs in the field.
http://news.poseidon-us.com/TJYXJL

Researchers develop computational tools to safeguard privacy without degrading voice-based cognitive markers

Digital voice recordings contain valuable information that can indicate an individual’s cognitive health, offering a non-invasive and efficient method for assessment. Research has demonstrated that digital voice measures can detect early signs of cognitive decline by analyzing features such as speech rate, articulation, pitch variation and pauses, which may signal cognitive impairment when deviating from normative patterns. However, voice data introduces privacy challenges due to the personally identifiable information embedded in recordings, such as gender, accent and emotional state, as well as more subtle speech characteristics that can uniquely identify individuals. These risks are amplified when voice data is processed by automated systems, raising concerns about re-identification and potential misuse of data.
http://news.poseidon-us.com/TJYXJ9

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup algorithm for post-quantum encryption Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the task of general encryption, which safeguards internet traffic and stored data alike. … More → The post Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books appeared first on Help Net Security.
http://news.poseidon-us.com/TJYSKh

Tiny component for record-breaking bandwidth

A modulator has now broken the terahertz mark. The ultrafast component efficiently transmits large volumes of data into the fiber-optic network in a short space of time.
http://news.poseidon-us.com/TJY6Lp