UPDATED 16:44, 26 NOV 2015 BY KIRSTIE MCCRUM Humai are hopeful that their science fiction work may become science fact in just 30 years from now A technology company says it’s working on a project which would allow a human’s… Read More ›
Technology
Selling students Social Security numbers and other personal information, is OK.
No Harm, No Foul in Student Info Sales By JACK BOUBOUSHIAN CHICAGO (CN) – College-bound students cannot show they were harmed by the ACT and College Board’s sale of their Social Security numbers and other personal information, the Seventh Circuit… Read More ›
Voters Sue Georgia Official for Data Breach
By KEVIN LESSMILLER ATLANTA (CN) – Georgia Secretary of State Brian Kemp disclosed the social security numbers and birthdates of more than 6 million voters and did not notify them, voters claim in court. Elise Piper and Yvette… Read More ›
A network of artificial neurons learns to use human language
PUBLIC RELEASE: 11-NOV-2015 A computer simulation of a cognitive model entirely made up of artificial neurons learns to communicate through dialogue starting from a state of tabula rasa UNIVERSIT?I SASSARI A group of researchers from the University of Sassari… Read More ›
Every Website You Visit To Be Recorded ( UK )
Under new spying powers, police and security services will be able to see what websites a person has visited without a warrant. 01:57, UK,Wednesday 04 November 2015 By Tom Cheshire, Technology Correspondent The web browsing history of every person… Read More ›
Researchers find vulnerabilities in use of certificates for Web security
Public Release: 28-Oct-2015 Study finds website admins not revoking certificates, browsers not checking certificate revocation status University of Maryland Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being transmitted… Read More ›
To infinity and beyond: Light goes infinitely fast with new on-chip material
Public Release: 19-Oct-2015 Harvard University IMAGE: In this zero-index material — made of silicon pillar arrays embedded in a polymer matrix and clad in gold film — there is no phase advance. Instead zero-index material creates a constant… Read More ›
Most complete human brain model to date is a ‘brain changer’
Public Release: 18-Aug-2015 Scientist: Once licensed, model likely to accelerate study of Alzheimer’s, autism, more Ohio State University COLUMBUS, Ohio – Scientists at The Ohio State University have developed a nearly complete human brain in a dish that equals the… Read More ›
Spying goes Mainstream: Windows 10 Spies on Everything You Do
Monday, 03 August 2015 We can see the lines forming of people rushing to buy Windows 10. Included in Microsoft’s new 12,000-word service agreement, which goes into effect August 1, is the following excerpt from the privacy policy: “We… Read More ›
Virginia Tech scientist develops model for robots with bacteria-controlled brains
Public Release: 16-Jul-2015 Understanding the biochemical sensing between organisms could have far reaching implications in ecology, biology, and robotics Virginia Tech Forget the Vulcan mind-meld of the Star Trek generation — as far as mind control techniques go, bacteria is… Read More ›
More Than One Million Fingerprints Stolen in Federal Personnel Data Hack
In what one former NSA official has called “probably the biggest counterintelligence threat in my lifetime,” 1.1 million fingerprints were stolen in the hack of the federal government’s Office of Personnel Management, which compromised the data belonging to 21.5… Read More ›
21.4 million Social Security additional numbers found hacked
Tens of Millions Implicated in Data Breach, OPM says WASHINGTON – The Office of Personnel Management confirmed a new cybersecurity breach Thursday that exposed 21.4 million Social Security numbers. This breach is separate from one OPM announced in April… Read More ›
Was the Stock Market brought down by a cyberattack ?
Editors Note: There are many rumors flying around currently at the unusual coincidences that occurred prior to the shut down. While I am not going to add directly to the speculation such as the photo present by the IBT. I… Read More ›
Do insect societies share brain power?
Public Release: 16-Jun-2015 Social brains may have evolved very differently in insects than in vertebrates Drexel University PHILADELPHIA (June 16, 2015) – The society you live in can shape the complexity of your brain–and it does so differently for social… Read More ›
First full genome of a living organism assembled using technology the size of smartphone
“the methods lay the groundwork for using it to sequence genomes in increasingly more complex organisms, eventually including humans” Public Release: 15-Jun-2015 Ontario Institute for Cancer Research TORONTO, June 15 — Researchers in Canada and the U.K. have for… Read More ›
Hacked US Security Clearances Are Giving Beijing Insanely Personal Information About American Citizens
By Jeff Stone @JeffStone500 j.stone@ibtimes.com on June 12 2015 2:20 PM EDT Hackers believed to be from China hacked into the U.S. Office of Personnel Management and lurked there for at least a year. It’s just the latest infiltration into… Read More ›
Injectable electronics
“demonstrated that the scaffolds could be used to create “cyborg” tissue” Public Release: 8-Jun-2015 New system holds promise for basic neuroscience, treatment of neuro-degenerative diseases Harvard University It’s a notion that might be pulled from the pages of science-fiction… Read More ›
Artificial intelligence discovers planarian regeneration model
Public Release: 4-Jun-2015 PLOS An artificial intelligence system has for the first time reverse-engineered the regeneration mechanism of planaria–the small worms whose extraordinary power to regrow body parts has made them a research model in human regenerative medicine. The discovery… Read More ›
The White House draws the line against CRISPR/Cas9-designed embryos
“The full implications of such a step could not be known until a number of generations had inherited the genetic changes made–and choices made in one country could affect all of us.” May 27, 2015 | By John Carroll… Read More ›
With one false tweet, computer-based Hack Crash led to real panic
Public Release: 20-May-2015 More attention must be paid to social media’s connection with financial decision making, says UB researcher University at Buffalo BUFFALO, N.Y. – A false tweet from a hacked account owned by the Associated Press (AP) in 2013… Read More ›
ISIS preparing total cyber war on critical US systems
DEBKAfile May 18, 2015, 9:39 PM (IDT) Hooded hackers released a video Monday stating that the Islamic State in Iraq and Syria was preparing to wage all-out “electronic” war on the US and Europe, but the war has not… Read More ›
FBI probe claims hacker controlled flight through plane’s Wi-Fi
Security researcher Chris Roberts has told special agents he has repeatedly managed to access such things as the engine systems from his seat The FBI are investigating claims a prominent computer hacker was able to take control of a… Read More ›
Combining computer vision and brain computer interface for faster mine detection
Public Release: 4-May-2015 University of California – San Diego IMAGE: Subjects in the study viewed images while wearing an EEG headset. Credit: Neuromatters Computer scientists at the University of California, San Diego, have combined sophisticated computer vision algorithms and a… Read More ›
At least 29 million health records breached by overt criminal activity
Public Release: 14-Apr-2015 Increase seen in data breaches of health information The JAMA Network Journals Between 2010 and 2013, data breaches of protected health information reported by HIPAA-covered entities increased and involved approximately 29 million records, with most data breaches… Read More ›
Mystery radio bursts from outside solar system follow Mathematical pattern
Mysterious radio wave flashes from far outside the galaxy are proving tough for astronomers to explain. Is it pulsars? A spy satellite? Or an alien message? BURSTS of radio waves flashing across the sky seem to follow a mathematical pattern…. Read More ›
Tiny bio-robot is a germ suited-up with graphene quantum dots
Public Release: 24-Mar-2015 University of Illinois at Chicago Caption Graphene quantum dots deposited on a sporating bacteria produces a graphene coated spore. Upon attachment of electrodes across the cell, a bio-electronic device is produced that is highly sensitive to humidity…. Read More ›
UK GOVERNMENT claims they are legally justified to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime.
UK GOVERNMENT CLAIMS POWER FOR BROAD, SUSPICIONLESS HACKING OF COMPUTERS AND PHONES Wednesday, March 18, 2015 The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they… Read More ›
DOD Secrets Don’t Shield ‘StingRays’ in Buffalo
By ADAM KLASFELD (CN) – The fact that so-called “StingRays” derive from military technology is no reason for the Erie County Sheriff’s Office to stonewall information on how the device tracks New Yorkers’ cellphones, a Buffalo judge ruled on… Read More ›
You forgot to Wash the WayBack Machine
EEV: This one goes out to the community who only washed half the board to the Russia hacker site: exposed.su You shut down the site, but left the Archives ??? https://web.archive.org/web/20130316053725/http://exposed.su/
Your privacy online: Health information at serious risk of abuse
Public Release: 23-Feb-2015 Annenberg research uncovers privacy risks from surfing health web sites University of Pennsylvania Annenberg School for Communication There is a significant risk to your privacy whenever you visit a health-related web page. An analysis of over 80,000… Read More ›
Chinese Hackers may of used the Anthem Data Breach as a back-door way to spy on U.S. defense officials, corporations and others, according to wire reports.
LOS ANGELES (CN) – Anthem Blue Cross allowed hackers to steal personal information from 80 million customers, a class action claims in Federal Court. Two such class actions were filed in Los Angeles Thursday and another in Birmingham, Ala. Federal… Read More ›
Researchers determine how the brain controls robotic grasping tools
Findings could lead to assistive technologies benefitting the disabled University of Missouri-Columbia COLUMBIA, Mo. – Grasping an object involves a complex network of brain functions. First, visual cues are processed in specialized areas of the brain. Then, other areas… Read More ›
UCI, fellow chemists find a way to unboil eggs
Public Release: 26-Jan-2015 Ability to quickly restore molecular proteins could slash biotechnology costs Irvine, Calif., Jan. 23, 2015 – UC Irvine and Australian chemists have figured out how to unboil egg whites – an innovation that could dramatically reduce costs… Read More ›
China is trying to deny it stole the plans for the Lockheed’s F-35 Joint Strike Fighter
2015-01-20 13:28:33 BEIJING, Jan. 20 (Xinhuanet) — According to a report carried in the Australian Associated Press, U.S. National Security Agency whistle-blower Edward Snowden has claimed that Chinese spies stole a huge volume of data related to Lockheed’s F-35 Joint… Read More ›
Phone Data Collection by United States Reauthorized
Monday, January 12, 2015 By WILLIAM DOTINGA (CN) – The Foreign Intelligence Surveillance Court reauthorized the federal government’s bulk collection of telephone metadata last month, according to a declassified order made public by the director of National Intelligence on… Read More ›
Researchers work to counter a new class of coffee shop hackers
– Studying Side-channel Emission Issues If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wifi, think again. The bad guys may be able to see what… Read More ›
‘Radiogenetics’ seeks to remotely control cells and genes
It’s the most basic of ways to find out what something does, whether it’s an unmarked circuit breaker or an unidentified gene — flip its switch and see what happens. New remote-control technology may offer biologists a powerful way to… Read More ›
Scientists in China, US, Israel review the worldwide rise of the ‘network of networks’
Interdependence of Different Infrastructure Sectors The interdisciplinary field of network science has attracted enormous attention in the past 10 years, although most results have been obtained by analyzing isolated networks. However many real-world networks interact with and depend on… Read More ›
Secret Malware in European Network Traced to NSA & GCHQ
Tuesday, 25 November 2014 Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical… Read More ›
Cockroach Cyborgs Use Microphones to Detect, Trace Sounds
November 6, 2014 North Carolina State University researchers have developed technology that allows cyborg cockroaches, or biobots, to pick up sounds with small microphones and seek out the source of the sound. The technology is designed to help emergency personnel… Read More ›
Hacking Gmail with 92 Percent Success
UCR Today: Android Hacking// UC Riverside assistant professor is among group that develops novel method to attack apps on Android, and likely other, operating systems By Sean Nealon on August 20, 2014 illustration of smart phones and skull… Read More ›
Edward Snowden’s not a one-off: US.gov hunts new secret doc leaker
Poor old Julian Assange – whistleblower went straight to Glenn Greenwald It appears former NSA contractor Edward Snowden is not the only leaker of secret US documents around, as the US government searches for another whistleblower in the aftermath of… Read More ›
FBI: We found US MILITARY AIRCRAFT INTEL during raid on alleged Chinese hacker
Accused of targeting F-22, F-35 and C-17 planes By Darren Pauli Posted in Security, 14th July 2014 07:29 GMT FBI: We found US MILITARY AIRCRAFT INTEL during raid on alleged Chinese hacker F-35 translated document allegedly stolen and shipped to… Read More ›
Scientists wipe out malaria-carrying mosquitoes in the lab by creating male-only offspring
Scientists have modified mosquitoes to produce sperm that will only create males, pioneering a fresh approach to eradicating malaria. In a study published in the journal Nature Communications, scientists from Imperial College London have tested a new genetic method that… Read More ›
DARPA crazytech crew want to create HUMAN-FREE cyber defence systems
No need to call an infosec specialist – the machines will sort it all out By Jasper Hamill American secret squirrel military research outfit DARPA has launched a competition to find the autonomous cyber-defence systems of the future. More than… Read More ›
How to erase a memory — and restore it
Researchers at the University of California, San Diego School of Medicine have erased and reactivated memories in rats, profoundly altering the animals’ reaction to past events. The study, published in the June 1 advanced online issue of the… Read More ›
Navy Sailor Admits He Led a Hacking Group
By DAVID LEE (CN) – A former systems administrator in the nuclear reactor department of the aircraft carrier USS Harry S Truman has admitted leading hacking into more than 50 military, university and business computer systems to steal the identities… Read More ›
LA air traffic meltdown: System simply ‘RAN OUT OF MEMORY’
Maybe a reboot will fix it. Maybe a reboot will fix it. Maybe a reboot will fix it. Ma- By Jasper Hamill Posted in CIO, 12th May 2014 13:34 GMT A computer crash that caused the collapse of a $2.4bn… Read More ›
Australian government apps access smartmobe cams but ‘don’t film you’
Department of Human Services says its apps need cameras to deliver better services By Richard Chirgwin, 4 May 2014 Australia’s Department of Human Services (DHS) says apparently-excessive permissions sought by its mobile apps are necessary for service delivery, and don’t… Read More ›
Experts warn that the global shipping industry is vulnerable to cyber-attack
Experts warn that the global shipping industry is vulnerable to cyber-attack Security experts warn that the sector transporting 90 per cent of world trade is highly vulnerable PUBLISHED : Thursday, 24 April, 2014, 10:03pm The next hacker target appears likely… Read More ›