Menu

Blog

Archive for the ‘security’ category: Page 90

Apr 10, 2019

Ocean plastic pollution costs the planet $2.5 trillion per year

Posted by in categories: food, health, security

It’s the first-ever quantification of the damage caused by plastic pollution on a global scale.

Global plastic pollution and the damage it causes to marine ecosystems now has a price tag attached to it. A team of researchers from the UK and Norway analyzed the many ways in which plastic pollution damages or destroys natural resources, and came up with a staggering figure – $2.5 billion – as the annual cost to society.

Much of our current understanding about plastic pollution is on a local level that cannot be interpreted easily on a global scale; and yet, this is a global threat. An estimated 8 million tons of plastic enter the oceans annually, and because of its material persistence and ability to disperse widely, must be viewed from a broader perspective if we hope to tackle it effectively. The researchers, whose study was just published in Marine Pollution Bulletin, looked at the many ways in which marine ecosystems benefit the planet, including food provision for billions of people, carbon storage, waste detoxification, and cultural benefits (recreational and spiritual). When these benefits are threatened by the presence of plastic, it “has the potential to significantly impact the wellbeing of humans across the globe, owing to the loss of food security, livelihoods, income and good health.”

Continue reading “Ocean plastic pollution costs the planet $2.5 trillion per year” »

Apr 8, 2019

This Neural Implant Accesses Your Brain Through the Jugular Vein

Posted by in categories: biotech/medical, computing, neuroscience, security

A permanent neural implant that reads brain activity and churns out text could prove to be a valuable medical tool, but it also could provide doctors with an unprecedented 24/7 stream of neural data.

Oxley recognizes that an endless feed of brain activity could be invaluable to medical researchers, but he doesn’t have plans to tap into that yet.

“[The Stentrode is] going to show us information that we hadn’t had before. Whether that helps us understand other things is not what we’re trying to do here,” he said, clarifying that Synchron’s primary goal is to get the new brain-computer interface working so that it can help paralyzed patients. “This is a novel data set, but this raises questions around privacy and security. That’s the patient’s data, and we can’t be mining that.”

Continue reading “This Neural Implant Accesses Your Brain Through the Jugular Vein” »

Mar 28, 2019

20% of Industrial Control Systems Affected by Critical Vulnerabilities

Posted by in categories: robotics/AI, security

Image: Business Wire

Over half of the 415 vulnerabilities found in industrial control systems (ICS) were assigned CVSS v.3.0 base scores over 7 which are designated to security issues of high or critical risk levels, with 20% of vulnerable ICS devices being impacted by critical security issues.

As detailed in Kaspersky’s “Threat landscape or industrial automation systems H2 2018”, “The largest number of vulnerabilities affect industrial control systems that control manufacturing processes at various enterprises (115), in the energy sector (110), and water supply (63).”

Continue reading “20% of Industrial Control Systems Affected by Critical Vulnerabilities” »

Mar 25, 2019

Deep Science AI joins Defendry to automatically detect crimes on camera

Posted by in categories: robotics/AI, science, security

Deep Science AI made its debut on stage at Disrupt NY 2017, showing in a live demo how its computer vision system could spot a gun or mask in CCTV footage, potentially alerting a store or security provider to an imminent crime. The company has now been acquired in a friendly merger with Defendry, which is looking to deploy the tech more widely.

It’s a great example of a tech-focused company looking to get into the market, and a market-focused company looking for the right tech.

The idea was that if you have a chain of 20 stores, and 3 cameras at each store, and people can only reliably keep an eye on 8–10 feeds at a time, you’re looking at a significant personnel investment just to make sure those cameras aren’t pointless. If instead you used Deep Science AI’s middle layer that highlighted shady situations like guns drawn, one person could conceivably keep an eye on hundreds of feeds. It was a good pitch, though they didn’t take the cup that year.

Continue reading “Deep Science AI joins Defendry to automatically detect crimes on camera” »

Mar 22, 2019

A SETI Search of Earth’s Co-orbitals

Posted by in categories: alien life, security

SETI for Bracewell probes? Yes please. Years ago Jill Tarter commented that looking for such probes would be worthwhile. These days we hear about Starshot, sending a fleet of lightweight probes to the nearest star within decades which brings into mind the obvious idea that maybe someone else did so long ago.


One objection to SETI is that it is not falsifiable — there is no point at which a lack of signals can prove that extraterrestrial civilizations do not exist. But there are some aspects of SETI that can be falsifiable. Consider a class of objects near enough for us to investigate not only with listening efforts but with probes, one small enough to be thoroughly covered, and one most people know almost nothing about. Could these offer a listening post for ‘Bracewell probes,’ a way of watching the development of our culture and reporting home to ETI? And if so, could we combine SETI with METI to advance both disciplines without compromising our own security?

Continue reading “A SETI Search of Earth’s Co-orbitals” »

Mar 14, 2019

Prototype watch uses your body to prevent hacking of wearables and implants

Posted by in categories: biotech/medical, computing, mobile phones, security, wearables

We’re used to the security risks posed by someone hacking into our computers, tablets, and smartphones, but what about pacemakers and other implanted medical devices? To help prevent possible murder-by-hacker, engineers at Purdue University have come up with a watch-like device that turns the human body into its own network as a way to keep personal technology private.

Read more

Mar 12, 2019

Your body has internet—and now it can’t be hacked

Posted by in categories: biotech/medical, internet, security

Someone could hack into your pacemaker or insulin pump and potentially kill you, just by intercepting and analyzing wireless signals. This hasn’t happened in real life yet, but researchers have been demonstrating for at least a decade that it’s possible.

Before the first crime happens, Purdue University engineers have tightened security on the “internet of body.” Now, the network you didn’t know you had is only accessible by you and your devices, thanks to technology that keeps within the body itself.

Continue reading “Your body has internet—and now it can’t be hacked” »

Mar 11, 2019

Researchers turn liquid metal into a plasma

Posted by in categories: nuclear energy, particle physics, security

Scientists at the University of Rochester’s Laboratory for Laser Energetics have achieved a plasma research first. They were able to convert the liquid metal deuterium to the plasma state and directly observe the interaction threshold.


For the first time, researchers at the University of Rochester’s Laboratory for Laser Energetics (LLE) have found a way to turn a liquid metal into a plasma and to observe the temperature where a liquid under high-density conditions crosses over to a plasma state. Their observations, published in Physical Review Letters, have implications for better understanding stars and planets and could aid in the realization of controlled nuclear fusion — a promising alternative energy source whose realization has eluded scientists for decades. The research is supported by the US Department of Energy and the National Nuclear Security Administration.

What is a Plasma?

Plasmas consist of a hot soup of free moving electrons and ions — atoms that have lost their electrons — that easily conducts electricity. Although plasmas are not common naturally on Earth, they comprise most of the matter in the observable universe, such as the surface of the sun. Scientists are able to generate artificial plasmas here on Earth, typically by heating a gas to thousands of degrees Fahrenheit, which strips the atoms of their electrons. On a smaller scale, this is the same process that allows plasma TVs and neon signs to “glow”: electricity excites the atoms of a neon gas, causing neon to enter a plasma state and emit photons of light.

Read more

Feb 19, 2019

Once hailed as unhackable, blockchains are now getting hacked

Posted by in categories: bitcoin, cryptocurrencies, security

More and more security holes are appearing in cryptocurrency and smart contract platforms, and some are fundamental to the way they were built.

Read more

Feb 19, 2019

Fungus provides powerful medicine in fighting honey bee viruses

Posted by in categories: biotech/medical, food, health, security

In field trials, colonies fed mycelium extract from amadou and reishi fungi showed a 79-fold reduction in deformed wing virus and a 45,000-fold reduction in Lake Sinai virus compared to control colonies.

Though it’s in the early stages of development, the researchers see great potential in this research.

“Our greatest hope is that these extracts have such an impact on viruses that they may help varroa mites become an annoyance for bees, rather than causing huge devastation,” said Steve Sheppard, a WSU entomology professor and one of the paper’s authors. “We’re excited to see where this research leads us. Time is running out for bee populations and the safety and security of the world’s food supply hinges on our ability to find means to improve pollinator health.”

Read more

Page 90 of 139First8788899091929394Last