Menu

Blog

Archive for the ‘mobile phones’ category: Page 132

Aug 8, 2019

Manipulating brain cells

Posted by in categories: biotech/medical, engineering, mobile phones, nanotechnology, neuroscience

Researchers have developed a soft neural implant that can be wirelessly controlled using a smartphone. It is the first wireless neural device capable of indefinitely delivering multiple drugs and multiple colour lights, which neuroscientists believe can speed up efforts to uncover brain diseases such as Parkinson’s, Alzheimer’s, addiction, depression, and pain. A team under Professor Jae-Woong Jeong from the School of Electrical Engineering at KAIST and his collaborators have invented a device that can control neural circuits using a tiny brain implant controlled by a smartphone. The device, using Lego-like replaceable drug cartridges and powerful, low-energy Bluetooth, can target specific neurons of interest using drugs and light for prolonged periods. This study was published in Nature Biomedical Engineering.

“This novel device is the fruit of advanced electronics design and powerful micro and nanoscale engineering,” explained Professor Jeong. “We are interested in further developing this technology to make a brain implant for clinical applications.”

Aug 7, 2019

AT&T Workers Installed Malware on Company Network for Cash

Posted by in categories: business, cybercrime/malcode, mobile phones

For five years, several AT&T employees were conspiring with a Pakistani man to install malware on company computers so that man could unlock millions of smartphones subsidized by the carrier, according to federal investigators.

On Tuesday, the Justice Department unsealed an indictment against Muhammad Fahd for bribing AT&T employees at a call center in Washington state to pull off the scheme. According to the feds, Fahd allegedly paid more than $1 million in bribes to the AT&T employees during the conspiracy, which allowed him to fraudulently unlock more than 2 million AT&T phones from 2012 to 2017.

Fahd allegedly partnered with businesses that offered cell phone unlocking services in exchange for a fee. These unnamed business would then supply him with the IMEI numbers of the phones bound to AT&T’s network.

Aug 6, 2019

Scientists can now manipulate brain cells using smartphone

Posted by in categories: biotech/medical, genetics, mobile phones, neuroscience

A soft neural implant that can be controlled by a smartphone is capable of drug delivery and optogenetics. The technology could speed up efforts to uncover the causes of neurological and psychological disorders.

Aug 5, 2019

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows… And His $9 Million WhatsApp Hacking Van

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he’s one of the good guys. It’s badly-behaved governments who should be in trouble, not the $12 billion industry he’s come to represent.

Aug 5, 2019

Frozen heads and future fortunes: what is the cost of digital information?

Posted by in categories: economics, mobile phones

With a seemingly infinite amount of knowledge available to us at the tap of a smartphone, we all take digital information for granted. But when it can be replicated at zero cost, how do the economic laws of supply and demand work, especially in the context of using digital currency?

Aug 4, 2019

The Futuresist Cure: Notes from the Front Lines of Transhumanism

Posted by in categories: biotech/medical, computing, mobile phones, transhumanism

On the heels of my latest New York Times OpEd, which is in print today on page 4 of the NYT Sunday Review, I’m excited to share my brand new book: The Futuresist Cure: Notes From the Front Lines of #Transhumanism. It’s a collection of my best essays on the future, many re-adapted, and many which have helped shape our movement. It’s #FREE today on Amazon in #Kindle. Or get the paperback version. There’s a foreword by the late Jacque Fresco. Download the book for FREE today!


Enter your mobile number or email address below and we’ll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer — no Kindle device required.

Aug 3, 2019

How to Hack a Face: From Facial Recognition to Facial Recreation

Posted by in categories: cybercrime/malcode, information science, mobile phones, privacy, robotics/AI, surveillance

Given that going viral on the Internet is often cyclical, it should come as no surprise that an app that made its debut in 2017 has once again surged in popularity. FaceApp applies various transformations to the image of any face, but the option that ages facial features has been especially popular. However, the fun has been accompanied by controversy; since biometric systems are replacing access passwords, is it wise to freely offer up our image and our personal data? The truth is that today the face is ceasing to be as non-transferable as it used to be, and in just a few years it could be more hackable than the password of a lifetime.

Our countenance is the most recognisable key to social relationships. We might have doubts when hearing a voice on the phone, but never when looking at the face of a familiar person. In the 1960s, a handful of pioneering researchers began training computers to recognise human faces, although it was not until the 1990s that this technology really began to take off. Facial recognition algorithms have improved to such an extent that since 1993 their error rate has been halved every two years. When it comes to recognising unfamiliar faces in laboratory experiments, today’s systems outperform human capabilities.

Continue reading “How to Hack a Face: From Facial Recognition to Facial Recreation” »

Jul 31, 2019

Soft wearable health monitor uses stretchable electronics

Posted by in categories: biotech/medical, computing, engineering, health, mobile phones, wearables

A wireless, wearable monitor built with stretchable electronics could allow comfortable, long-term health monitoring of adults, babies and small children without concern for skin injury or allergic reactions caused by conventional adhesive sensors with conductive gels.

The soft and conformable monitor can broadcast electrocardiogram (ECG), heart rate, respiratory rate and motion activity data as much as 15 meters to a portable recording device such as a smartphone or tablet computer. The electronics are mounted on a stretchable substrate and connected to gold, -like electrodes through printed connectors that can stretch with the medical film in which they are embedded.

“This health monitor has a key advantage for young children who are always moving, since the soft conformal device can accommodate that activity with a gentle integration onto the skin,” said Woon-Hong Yeo, an assistant professor in the George Woodruff School of Mechanical Engineering and Wallace H. Coulter Department of Biomedical Engineering at the Georgia Institute of Technology. “This is designed to meet the electronic health monitoring needs of people whose sensitive skin may be harmed by conventional monitors.”

Jul 30, 2019

Cell-Site Simulators/IMSI Catchers

Posted by in categories: law enforcement, mobile phones

NLP.


Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower.

Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections.

Continue reading “Cell-Site Simulators/IMSI Catchers” »

Jul 30, 2019

Electronic Harassment Must Stop‼️ Photo

Posted by in categories: mobile phones, surveillance

Do you know how to jam these?


Description:

The StingRay is an IMSI-catcher, a controversial cellular phone surveillance device, manufactured by Harris Corporation.