From Silicon To Software

Archive for 2017

 

Machine Learning Finds New Exoplanets in Existing NASA Database

Using previously studied data from NASA’s Kepler Space Telescope, a Google machine learning algorithm discovered two new planets orbiting a nearby star already known to have six planets. At a total of eight planets, that system matches our own solar system. It also begs a question: How many other planetary systems might be hiding in previously analyzed data?

Continue Reading...

Posted in Artificial Intelligence, Machine Learning | Comments Off on Machine Learning Finds New Exoplanets in Existing NASA Database

 

Mirai IoT Botnet Co-Creators Plead Guilty

For their involvement in creating and distributing the Mirai IoT-based botnet, Paras Jha, Josiah White, and Dalton Norman each admitted on Wednesday to one count of conspiracy in plea agreement in Alaska. A botnet is traditionally defined as a network of compromised computers that can be remotely controlled to mount large-scale attacks such as a distributed denial-of-service (DDoS) attack on a website. Mirai was the first botnet to compromise and remotely control internet of things (IoT) devices in a large-scale attack on internet services.

Continue Reading...

Posted in Internet of Things, Malware, Security | Comments Off on Mirai IoT Botnet Co-Creators Plead Guilty

 

Synopsys Surveys Find Agreement in Application Security Across Europe and Asia

Two new surveys from Synopsys find there is general alignment among C-level IT professionals, managers, and executives in Europe and in Asia in terms of application security concerns and mitigations. Although the percentages differ by region, the order in which concerns and solutions ranked generally agreed.

Continue Reading...

Posted in Application Security, Security | Comments Off on Synopsys Surveys Find Agreement in Application Security Across Europe and Asia

 

A Cure for Medical Device Vulnerabilities May Be Coming

Despite years of evidence from researchers that some medical devices in homes and in healthcare facilities may contain serious vulnerabilities, such has the ability to manipulate insulin pumps and pacemakers wirelessly, there has been little acknowledgement from the industry. Unlike the automotive industry, which addressed a wide variety of cybersecurity issues soon after the infamous Cherokee Jeep Hack in the summer of 2015, medical devices have remained rife with potentially life-threatening vulnerabilities. That is about to change.

Continue Reading...

Posted in Automotive, Healthcare, Security | Comments Off on A Cure for Medical Device Vulnerabilities May Be Coming

 

NIST Validates Synopsys Cryptography IP Software Library

Chip designers can use Synopsys technology to accelerate Cryptographic Module Validation Program (CMVP) and Federal Information Processing Standard (FIPS) 140-2 certification for applications requiring high levels of security. FIPS 140-2 validation is only required if a hardware security module is to be sold to the U.S. government and if it uses cryptography in a security system that handles sensitive but unclassified information. However, it can also be a powerful security product differentiator in the commercial market.

Continue Reading...

Posted in Cryptography, IP | Comments Off on NIST Validates Synopsys Cryptography IP Software Library

 

White House Updates U.S. Zero Day Software Vulnerability Policy

Zero days are simply software vulnerabilities for which there is no public patch or workaround. They have value because they can allow remote code exploitation or electronic surveillance without detection for long periods of time. On Wednesday, White House Cybersecurity Coordinator, Rob Joyce, issued updated guidance how the U.S. handles zero days.

Continue Reading...

Posted in Malware, Security | Comments Off on White House Updates U.S. Zero Day Software Vulnerability Policy

 

Challenges Remain for AI

In the movies, artificial intelligence (AI) is often represented as an android, a human-like robot. In reality, AI will be mostly in the background, anticipating our needs based on prior experience in terms of autonomous driving, healthcare, even financial services.

Continue Reading...

Posted in Artificial Intelligence, Automotive, EDA | Comments Off on Challenges Remain for AI

 

Are We There Yet? Level-Setting Autonomous Vehicles

Automakers are still years away from the ideal of fully autonomous, self-driving vehicles, but significant progress toward that goal is evident today.

Continue Reading...

Posted in Artificial Intelligence, Automotive | Comments Off on Are We There Yet? Level-Setting Autonomous Vehicles

 

Recent Ransomware Attacks Produce Tangible Financial (and Possibly Human) Costs

In recent financial reports, some global organizations are now reporting losses averaging $300 million USD as the result of malicious software first spread in early 2017.

Continue Reading...

Posted in Malware | Comments Off on Recent Ransomware Attacks Produce Tangible Financial (and Possibly Human) Costs

 

Intelligent Transit Systems Tops 2017 US-CERT Risk Concerns

In its annual emerging technology domains risk survey, the Department of Homeland Security’s Computer Emergency Readiness Team (CERT) and the Software Engineering Institute at Carnegie Mellon University identified intelligent transit systems as their top domain for future high-priority analysis. The report also identifies machine learning and smart robotics as related dependencies and areas of interest as well.

Continue Reading...

Posted in Automotive, Robotics | Comments Off on Intelligent Transit Systems Tops 2017 US-CERT Risk Concerns