Toggle light / dark theme

While more people and places are switching to energy-saving LED light bulbs, a California company has found a way to turn them into smart networks that can collect and feed data. However, the new technological opportunities are also raising privacy concerns, reports CBS News’ Bill Whitaker.

For example, should you find yourself in terminal “B” at Newark airport, look up. Those aren’t just new lights. They’re smart lights — a sophisticated array of LED fixtures with built-in sensors and cameras connected over a wireless network. They monitor security and the flow of foot traffic.

“Newark’s primarily interested in energy saving,” said Hugh Martin, president of Sensity, the Silicon Valley company that developed the smart lights at Newark and also a parking garage in San Jose.

Security researchers at McAfee say that hackers have released a do-it-yourself kit that allows people to easily put together phishing scams targeting Amazon users – just in time for Prime Day next week.

McAfee first noticed the so-called 16Shop phishing kit in action in November, when it was being used to create fake emails, supposedly from Apple, trying to gain access to people’s Apple accounts. The scam let hackers create a realistic-looking Apple sign-in page to steal your login credentials.

Starting in May, 16Shop expanded to target Amazon users, McAfee wrote on Friday, July 12. The new version allows would-be hackers to create their own realistic-looking Amazon login page that would give them your username and password — pretty much everything they would need to log into your account. Here’s what it looks like:

Think of DNA and chances are the double helix structure comes to mind, but that’s only one piece of the puzzle. Another major part is mitochondrial DNA, and in plants that’s even more important – and so complex that scientists haven’t yet been able to edit the genes in there. Now a team of Japanese researchers has managed to do just that, which could help improve the genetic diversity of crops.

From returning to the Moon to establishing outposts on Mars, NASA has the need for more power than ever before. Could nuclear fission be the solution they’ve been searching for?

Watch more Focal Point! | https://bit.ly/2J9b9LC

Demonstration Proves Nuclear Fission System Can Provide Space Exploration Power
https://www.nasa.gov/press-release/demonstration-proves-nucl…tion-power
“NASA and the Department of Energy’s National Nuclear Security Administration (NNSA) have successfully demonstrated a new nuclear reactor power system that could enable long-duration crewed missions to the Moon, Mars and destinations beyond.”

NASA to Test Fission Power for Future Mars Colony

Biometrics is defined as the measurement of life signs. One of the main aims of current security research is to acquire biometric data of sufficient detail and reliability for verification or identification of individuals.


A newly developed electric-field sensing technology with unprecedented sensitivity and noise immunity can passively acquire physiological signals in an electrically noisy environment.

Robert Prance

Gone are the days when a store’s security cameras only mattered to shoplifters.

Now, with the rising prevalence of surveillance systems constantly monitored by artificial intelligence, ubiquitous security systems can watch, learn about, and discriminate against shoppers more than ever before.

That’s the gist of a new ACLU report titled “The Dawn of Robot Surveillance,” about how emerging AI technology enables security companies to constantly monitor and collect data about people — opening new possibilities in which power is abused or underserved communities are overpoliced.

A growing number of devices are now connected to the internet and are capable of collecting, sending and receiving data. This interconnection between devices, referred to as the Internet of Things (IoT), poses serious security threats, as cyberattackers can now target computers and smartphones, but also a vast array of other devices, such as tablets, smart watches, smart home systems, transportation systems and so on.

For the time being, examples of large-scale IoT implementations (e.g. connected infrastructure, cities, etc.) are somewhat limited, yet they could soon become widespread, posing significant risks for businesses and public services that heavily rely on the internet in their daily operations. To mitigate these risks, researchers have been trying to develop to protect devices connected to the internet from wireless attacks.

To this end, two researchers at Baoji University of Arts and Sciences, in China, have recently developed a new method to defend devices in an IOT environment from wireless network attacks. Their approach, presented in a paper published in Springer’s International Journal of Wireless Information Networks, combines a with a model based on , a branch of mathematics that proposes strategies for dealing with situations that entail competition between different parties.

Read more