Toggle light / dark theme

Undercover evolution: Our individuality is encrypted in our DNA, but it is deeper than expected

Providing a glimpse the hidden workings of evolution, a group of researchers at UC Santa Barbara have discovered that embryos that appear the same can start out with surprisingly different instructions.

“We found that a lot of undercover evolution occurs in ,” said Joel Rothman, a professor in the Department of Molecular, Cellular, and Developmental Biology, who led the team.

Indeed, although members of the same species are identical across the vast majority of their genomes, including all the genetic instructions used in development, Rothman and his colleagues found that key parts of the assembly instructions used when embryos first start developing can differ dramatically between individuals of the same species.

Quantum safe tape drive: IBM team eyes encryption future

This week a collaborative effort among computer scientists and academics to safeguard data is winning attention and it has quantum computing written all over it.

The Netherlands’ Centrum Wiskunde & Informatica (CWI), national research institute for mathematics and computer science, had the story: IBM Research developed “quantum-safe algorithms” for securing data. They have done so by working with international partners including CWI and Radboud University in the Netherlands.

IBM and partners share concerns that data protected by current encryption methods may become insecure within the next 10 to 30 years.

Researchers Demonstrate The World’s First Quantum Radar

Yes, we know that sometimes it feels like they just tack the word quantum on new technology and call it a day like we are all living in the Marvel Cinematic Universe. Nevertheless, quantum technology is very real and is just as exciting. Our better understanding of the quantum world and handle on the principals will help us improve everything from computing to encryption.

Quantum radar has been demonstrated for the first time

One of the advantages of the quantum revolution is the ability to sense the world in a new way. The general idea is to use the special properties of quantum mechanics to make measurements or produce images that are otherwise impossible.

Much of this work is done with photons. But as far as the electromagnetic spectrum is concerned, the quantum revolution has been a little one-sided. Almost all the advances in quantum computing, cryptography, teleportation, and so on have involved visible or near-visible light.

How will quantum computing change the world? | The Economist

The potential for quantum computing to crack other countries’ encrypted networks has captured the attention of national governments. Which of the world’s fundamental challenges could be solved by quantum computing?

Click here to subscribe to The Economist on YouTube: https://econ.st/2xvTKdy

For more from Economist Films visit: http://films.economist.com/
Check out The Economist’s full video catalogue: http://econ.st/20IehQk
Like The Economist on Facebook: https://www.facebook.com/TheEconomist/
Follow The Economist on Twitter: https://twitter.com/theeconomist
Follow us on Instagram: https://www.instagram.com/theeconomist/
Follow us on Medium: https://medium.com/@the_economist

New SystemBC Malware Uses Your PC to Hide Malicious Traffic

A new malware strain is being distributed by threat actors via exploit kits like Fallout and RIG to hide malicious network traffic with the help of SOCKS5 proxies set up on compromised computers.

The malware, provisionally named SystemBC by the Proofpoint Threat Insight Team researchers who found it, uses secure HTTP connections to encrypt the information sent to command-and-control servers by other strains dropped on the infected machines.

“SystemBC is written in C++ and primarily sets up SOCKS5 proxies on victim computers that can then be used by threat actors to tunnel/hide the malicious traffic associated with other malware,” says Proofpoint.

New Android Ransomware Uses SMS Spam to Infect Its Victims

A new ransomware family targeting Android devices spreads to other victims by sending text messages containing malicious links to the entire contact list found on already infected targets.

The malware dubbed Android/Filecoder. C (FileCoder) by the ESET research team which discovered it is currently targeting devices running Android 5.1 or later.

“Due to narrow targeting and flaws in both execution of the campaign and implementation of its encryption, the impact of this new ransomware is limited,” ESET’s researchers found.