Toggle light / dark theme

Computer programming has never been easy. The first coders wrote programs out by hand, scrawling symbols onto graph paper before converting them into large stacks of punched cards that could be processed by the computer. One mark out of place and the whole thing might have to be redone.

Nowadays coders use an array of powerful tools that automate much of the job, from catching errors as you type to testing the code before it’s deployed. But in other ways, little has changed. One silly mistake can still crash a whole piece of software. And as systems get more and more complex, tracking down these bugs gets more and more difficult. “It can sometimes take teams of coders days to fix a single bug,” says Justin Gottschlich, director of the machine programming research group at Intel.

Over the past decade, researchers have developed a growing number of deep neural networks that can be trained to complete a variety of tasks, including recognizing people or objects in images. While many of these computational techniques have achieved remarkable results, they can sometimes be fooled into misclassifying data.

An adversarial attack is a type of cyberattack that specifically targets deep neural networks, tricking them into misclassifying data. It does this by creating adversarial data that closely resembles and yet differs from the data typically analyzed by a deep neural network, prompting the network to make incorrect predictions, failing to recognize the slight differences between real and adversarial data.

In recent years, this type of attack has become increasingly common, highlighting the vulnerabilities and flaws of many deep neural networks. A specific type of that has emerged in recent years entails the addition of adversarial patches (e.g., logos) to images. This attack has so far primarily targeted models that are trained to detect objects or people in 2-D images.

More from 2020 “The Movie”

Chinese government-linked hackers targeted biotech company Moderna Inc, a leading U.S.-based coronavirus vaccine research developer, earlier this year in a bid to steal valuable data, according to a U.S. security official tracking Chinese hacking activity.


WASHINGTON (Reuters) — Chinese government-linked hackers targeted biotech company Moderna Inc, a leading U.S.-based coronavirus vaccine research developer, earlier this year in a bid to steal valuable data, according to a U.S. security official tracking Chinese hacking activity.

To treat the mice, the team gave them brain implants: a fiber optic that shined light onto a region called the paraventricular thalamus and blocked withdrawal symptoms. A day later, the mice no longer sought out morphine and relapse — or at least do the lab mouse version of relapsing — even after two weeks.

According to the new research, published Thursday in the journal Neuron, people relapse partially because they miss the high, but more so because the symptoms of withdrawal can often be overwhelming. By down those symptoms, the mice appear to be able to kick the habit more easily.

“Our success in preventing relapse in rodents may one day translate to an enduring treatment of opioid addiction in people,” CAS researcher Zhu Yingjie said in a press release.

Digital identity capabilities from Trust Stamp are now being integrated with Mastercard’s Wellness Pass solution, which it will launch in cooperation with Gavi in West Africa. Proving identity without revealing any information about it is the idea behind Trust Stamp’s zero knowledge approach to online identity verification, according to a profile by Mastercard.

Gareth Genner, Trust Stamp co-founder and CEO, explains in an interview how the company’s Evergreen Hash technology uses biometrics without taking on the risk of spoofing or a data breach that he says come with standard biometric implementations.

The Evergreen Hash is created from the customers face, palm or fingerprint biometrics, which the company uses to generate a “3D mask,” discarding raw data and adding encryption to associate the data with the user.

2020 is officially a movie:

Russian hackers are trying to steal COVID-19 vaccine and treatment research from pharmaceutical and academic institutions, according to Britain’s National Cyber Security Centre.


Hackers backed by the Russian state are trying to steal COVID-19 vaccine and treatment research from academic and pharmaceutical institutions around the world, Britain’s National Cyber Security Centre (NCSC) said on Thursday.