Straightforward Security
440 views | +0 today
Follow
 
Rescooped by Infospectives from Amazing Science
onto Straightforward Security
Scoop.it!

Scientists have made light appear to break Newton’s third law

Scientists have made light appear to break Newton’s third law | Straightforward Security | Scoop.it

Laser pulses have been made to accelerate themselves around loops of optical fibre-  which seems to go against Newton’s 3rd law. This states that for every action there is an equal and opposite reaction. This new research exploits a loophole with light that makes it appear to have mass.

 

Under Newton’s third law of motion, if we imagine one billiard ball striking another upon a pool table, the two balls will bounce away from each other. If one of the billiard balls had a negative mass, then the collision of the two balls would result in them accelerating in the same direction. This effect could be used in a diametric drive, where negative and positive mass interact for a continuously propulsive effect. Such a drive also relies on the assumption that negative mass has negative inertia. 

 

Quantum mechanics however states that matter cannot have a negative mass. Negative mass is not the same as antimatter, as even antimatter has positive mass. Negative mass is a hypothetical concept of matter where mass is of opposite sign to the mass of normal matter. Negative mass is used in speculative theories, such as the construction of wormholes. Should such matter exist, it would violate one or more energy conditions and show strange properties. No material object has ever been found that can be shown by experiment to have a negative mass.

 

Experimental physicist Ulf Peschel and his colleagues at the University of Erlangen-Nuremberg in Germany have now made a diametric drive using effective mass.. Photons travelling at the speed of light have no rest mass. Shining pulses of light into layered materials like crystals means some of the photons can be reflected backwards by one layer and forwards by another. This delays part of the pulse and interferes with the rest of the pulse as it passes more slowly through the material.

 

When a material such as layered crystals slows the speed of the light pulse in proportion to its energy, it is behaving as if it has mass. This is called effective mass, which is the mass that a particle appears to have when responding to forces. Light pulses can have a negative effective mass depending on the shape of their light waves and the structure of the crystal material that the light waves are passing through. To get a pulse to interact with material with a positive effective mass means finding a crystal that is so long that it can absorb the light before different pulses show a diametric drive effect.

 

Peschel therefore created a series of laser pulses in two loops of fibre-optic cable to get around these requirements. The pulses were split between the loops at a contact point and the light kept moving around each light in the same direction.


Via Dr. Stefan Gruenwald
Infospectives's insight:

Anyone in the market for a man-made wormhole?

more...
No comment yet.
Straightforward Security
Collecting new InfoSec news, useful content and anything that helps to demystify security for you me and the board. For more on infospectives visit our award winning blog http://infospectives.co.uk
Curated by Infospectives
Your new post is loading...
Your new post is loading...
Scooped by Infospectives
Scoop.it!

Contract for cybersecurity awarded by federal agencies

Contract for cybersecurity awarded by federal agencies | Straightforward Security | Scoop.it
The Office of Personnel Management and Department of Defense awarded a cybersecurity contract.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Physical Security Remains Key Factor in Cyber Protection for Critical Infrastructure

Physical Security Remains Key Factor in Cyber Protection  for Critical Infrastructure | Straightforward Security | Scoop.it
NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets. A major utility company in the United States, whom we will call UTILCO, completed a large merger. As the operations were being combined, UTILCO wanted to have a system that allowed its corporate security managers to use job roles to decide who has access to specific facilities and how much area access they should have within those facilities.
Infospectives's insight:

It could arguably have stopped Stuxnet - Physical security and critical national infrastructure - is too long spent focussing on the cyber horizon?

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Data Breaches by the Numbers | SecurityWeek.Com

Data Breaches by the Numbers | SecurityWeek.Com | Straightforward Security | Scoop.it
A quantitative analysis confirms the rising tide of breaches and gives us insight into how they are happening.
Infospectives's insight:

As with all security breach statistics, bring your pinch of salt, but some handy headlines to reuse.

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Threat Modeling 101: Top 10 Traps You Don’t Want to Fall Into

Threat Modeling 101: Top 10 Traps You Don’t Want to Fall Into | Straightforward Security | Scoop.it
Tripwire recently hosted Adam Shostack who shared with us how threat modeling can drive security through your product, service or system.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Is lack of consumer awareness of cyber security costing companies? | Information Age

Is lack of consumer awareness of cyber security costing companies? | Information Age | Straightforward Security | Scoop.it
The commercial world needs to be teaching consumers that cyber security is their responsibility too
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Why is Uber hiring hackers?

Why is Uber hiring hackers? | Straightforward Security | Scoop.it
The ride-sharing company has hired the two security researchers who demonstrated how to remotely hack a Jeep Cherokee last month.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

How to Address the PCI DSS Requirements for Data Encryption in Transit Using Amazon VPC

How to Address the PCI DSS Requirements for Data Encryption in Transit Using Amazon VPC | Straightforward Security | Scoop.it
How to Address the PCI DSS Requirements for Data Encryption in Transit Using Amazon VPC http://t.co/BVRK2GK9nM
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Data retention and the end of Australians' digital privacy

Data retention and the end of Australians' digital privacy | Straightforward Security | Scoop.it
The government's Orwellian new surveillance regime is set to render privacy a thing of Australia's past, writes Quentin Dempster.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Domain hijacking spear-phisher foiled by the last line of defense—paranoia

Domain hijacking spear-phisher foiled by the last line of defense—paranoia | Straightforward Security | Scoop.it
An Ars editor's paranoia is all that prevents a successful spear phish—this time.
Infospectives's insight:

In praise of paranoia - or as I'd prefer to call it: A rationally secure default to deny'(outside your circle of verified trust of course).

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Data protection clarity needed says expert as German watchdogs outline reform ... - Out-Law.com

Data protection clarity needed says expert as German watchdogs outline reform ... - Out-Law.com | Straightforward Security | Scoop.it
The Information Daily
Data protection clarity needed says expert as German watchdogs outline reform ...
Out-Law.com
Munich-based IT and data protection law expert Marc L.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

4 Common Scenarios for Dormant Functionality in Malware

4 Common Scenarios for Dormant Functionality in Malware | Straightforward Security | Scoop.it
A recent blog post published by Lastline identifies four common scenarios in which dormant functionality may manifest in malware.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Vendor Risk Management Is Broken

Vendor Risk Management Is Broken | Straightforward Security | Scoop.it
Risks are only put on paper and not properly vetted. Experts find that companies are often ignoring much of the basics of managing vendor risk.
Infospectives's insight:

Does your vendor security risk management activity stop after assessment results are logged?

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Hardened Linux stalwarts grsecurity pull the pin after legal fight

Hardened Linux stalwarts grsecurity pull the pin after legal fight | Straightforward Security | Scoop.it
Multi-billion company accused of ripping off name and code, still doing security wrong
Infospectives's insight:

How the people with the biggest legal stick beat sense, value and security

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Fraudsters using credentials harvested from massive breaches, study finds

Fraudsters using credentials harvested from massive breaches, study finds | Straightforward Security | Scoop.it
Digital identities are being exploited on a routine basis by sophisticated cybercriminals, says a just released ThreatMetrix study.
Infospectives's insight:

Are we really surprised (as Neira Jones wryly remarked). What may surprise us is how far we've got to go to help customers tackle this risk and deal with the fallout from scooped data. 

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Could Emoji Passcodes be Safer for Online Bank Users?

Could Emoji Passcodes be Safer for Online Bank Users? | Straightforward Security | Scoop.it
Don't be surprised if some banking apps start to ask you for your emoji passcode sooner rather than later.
Infospectives's insight:

Security and an opportunity to graphically represent your opinion of the institution you are accessing? What do the pros think?

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

More companies add cyber security pros to boardrooms

More companies add cyber security pros to boardrooms | Straightforward Security | Scoop.it
LOS ANGELES — The board of directors at construction and engineering company Parsons Corp. needed to fill a seat two years ago. Naturally, they wanted someone with communication and leadership skills. They also needed someone new: an expert to help
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

​User data manifesto seeks to give people control of their data | ZDNet

​User data manifesto seeks to give people control of their data | ZDNet | Straightforward Security | Scoop.it
A European-led effort defines the basic rights for users over their personal data.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Speed of Patching Versus Breach Likelihood

Speed of Patching Versus Breach Likelihood | Straightforward Security | Scoop.it
I am a big fan of the Verizon DBIR.  I was just reading this interview with Mike Denning  from Verizon on Deloitte's web site about this year's report.  The whole article is worth reading, but I wa...
Infospectives's insight:

Balance in all things, including patching and related statistics says Mr Bell

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

U.S. court hands win to NSA over metadata collection

U.S. court hands win to NSA over metadata collection | Straightforward Security | Scoop.it
A U.S. appeals court on Friday threw out a judge's ruling that would have blocked the National Security Agency from collecting phone metadata under a controversial program that has raised privacy
Infospectives's insight:

NSA scoping phone metadata - US appeals court overturns ban

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Full text: Leading US academics urge Silicon Valley to be cautious in dealing with Modi government

Full text: Leading US academics urge Silicon Valley to be cautious in dealing with Modi government | Straightforward Security | Scoop.it
Digital India initiative ignores key questions about the collection of personal information and the near-certainty that such systems will be used to enhance surveillance, says statement.
Infospectives's insight:

Caution urged over Digital India: When privacy, security, commerce, politics, ethics and civil liberties intersect: 

more...
No comment yet.
Scooped by Infospectives
Scoop.it!

INSIGHT: Do CEOs understand information security risk? - Computerworld New Zealand

INSIGHT: Do CEOs understand information security risk? - Computerworld New Zealand | Straightforward Security | Scoop.it
"CEOs and executive boards need to ensure that information security is consistently on their agenda."
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

When Business Culture Eats Cybersecurity For Breakfast - Part One

When Business Culture Eats Cybersecurity For Breakfast - Part One | Straightforward Security | Scoop.it
Wild Speculation & IT Transformation - A four-part story of budget cuts, blamestorming, breaches and massive bumps in the road to mature security.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

Ashley Madison Chief Steps Down After Data Breach

Ashley Madison Chief Steps Down After Data Breach | Straightforward Security | Scoop.it
The change came after hackers stole the online dating service’s data and released personal information related to more than 30 million accounts.
more...
No comment yet.
Scooped by Infospectives
Scoop.it!

A rare detailed look inside the IRS’s massive data breach, via a security expert who was a victim

A rare detailed look inside the IRS’s massive data breach, via a security expert who was a victim | Straightforward Security | Scoop.it
The story of how hackers stole 334,000 Americans' personal data, filed fake tax returns, and walked off with $50 million in rebates.
more...
No comment yet.