Toggle light / dark theme

This looks very promising.


The human body is designed pretty well: Our muscles are able to switch between strength and dexterity, limbs stiffening when we do an energy-fueled task like lifting a bowling ball and softening when we do something delicate like painting with a brush. This ability is very rarely replicated in engineering systems, namely because it’s expensive, but also because it’s been damn hard to clone.

However, HRL Laboratories — the same Malibu-based researchers who brought you microlattice — has announced they’ve been able to replicate the reactions of human muscle in metal. Their goal is to use this new technology to create cars with smoother rides and, more intriguingly, more human-like robots.

What happens when you no longer own your own DNA sequencing and the person who has it refuses to release it to you?.


Having your genome sequenced doesn’t always mean you have full access to the data.

Read more

Frankly, in the US this makes me really nervous. Placing drug making 3D printers in your local pharmacies. I hope that the manufacturer has a mechanism setup to cause the machine not to work if it is stolen by the local drug gangs.


The brave new world of 3D-printed drugs in the healthcare industry is heating up.

Read more

Reserve you calendars for March 9th because New America’s Cybersecurity Initiative is hosting its annual Cybersecurity for a New America Conference in Washington, D.C.


On Wednesday, March 9, New America’s Cybersecurity Initiative will host its annual Cybersecurity for a New America Conference in Washington, D.C. This year’s conference will focus on securing the future cyberspace. For more information and to RSVP, visit the New America website.

So, what does cyberwar mean anyway?

At core, when we talk about cyberwar, we’re just talking about warfare conducted through computers and other electronic devices, typically over the Internet. As the very ’90s prefix cyber– (when was the last time you heard someone talk about cyberspace with a straight face?) suggests, it’s been part of our cultural and political conversations since the early ’80s. In recent years, however, such conversations have picked up as those in power become more conscious of our reliance on computers—and our consequent vulnerability. Perhaps more importantly, information like that disclosed by Edward Snowden has demonstrated that governments have already made preparations for virtual conflict, whether or not they’re actively engaging in it now. (Click here for a cheat sheet.)

Adding insult to injury.


From Russia with Love : Cerber Ransomware first encrypts your files and then reads out the ransom note.

Malware authors are know to be a ingenious lot and trust them to come with a Ransomware that actually reads out the ransom note to the victim.

Cerber is a latest ransomware which encrypts target victim’s files and then provides a TTS (text-to-speech) feature that reads out the ransom note.