Toggle light / dark theme

After 10 years of development, the Wake Forest Institute of Regenerative Medicine has finally unveiled a 3D printer that can craft simple tissues, such as cartilage, into complex shapes suitable for implantation.

The printer uses cartridges filled with biodegradable plastic and human cells bound in gel form, and it can grow muscle, cartilage, and even bone. When implanted into animals, these crafted tissues have been shown to survive and even thrive for an indefinite amount of time.

“This is the first [bioprinter] that can print tissue at the large scales relevant for human implantation,” lead scientist behind the project, Anthony Atala, says in the release. “Basically, once we’ve printed a structure, we can keep it alive for several weeks before we implant it. Now the next step is to test these [printed tissues] for safety so we can implant them in the future in patients.”

Read more

Lookout for MAZAR Bot — Androids should be scared.


One interesting feature of Mazar is that it can not be installed on smartphones running Android with “Russian” selected as the operating system’s language.

The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.

Turn off “Unknown Sources” on your device — The best way to avoid downloading malicious items is to not allow unknown sources to install stuff on your device. The app asks for wide ranging permissions, including the ability to send SMS, have full internet access, and the ability to erase a phone.

Experts from MIT are hosting an event next week to explore the potential blockchain technology could in making electricity markets cleaner and more efficient.

Cambridge chapter of the MIT Enterprise Forum will bring together experts including Joi Ito of the MIT Media Lab and Paul Brody of Ernst and Young for the blockchain transitioning energy industry event on Monday 22 February. They will be joined by a distinguished panel of emerging technology, blockchain, and energy industry leaders to discuss the intersection of energy grid transformation and distributed ledger technology.

Scott Clavenna of Greentech Media will moderate a panel consisting of Joi Ito, Paul Brody, Ed Hesse of Grid Singularity, and Lawrence Orsini of LO3 Energy. The event will tackle questions such as “How can cleantech enterprise and industry leverage the blockchain for innovation?” and “What are the new models for growth?”.

Read more

This gravitational wave model has been created with the quantum gravity theory in mind, which has been predicted for decades. What else could the discovery of gravitational waves by the Laser Interferometer Gravitational-Wave Observatory uncover and reveal about this theory? (Photo : Henze | NASA)

Quantum gravity is a theory that has been the target of decades of study by physicists worldwide. If this idea is proven, it would tie together the General Theory of Relativity (which governs gravitational fields) with quantum mechanics, and the bizarro-world of subatomic particles.

Gravitational waves, produced by accelerating objects, ripple through space-time, according to most interpretations of the General Theory of Relativity penned by famed physicist Albert Einstein. Researchers at the Laser Interferometer Gravitational-Wave Observatory (LIGO) have announced they detected these disturbances in the fabric of time and space for the first time.

Read more

Criminal’s favorite new tool for extortion.


Hollywood Presbyterian Medical Center was the target of a ransomware extortion plot in which hackers seized control of the hospital’s computer systems and then demanded that directors pay in bitcoin to regain access, according to law enforcement sources.

Ransomware attacks on business data systems are becoming an increasingly common form of cyber crime. The assault on Hollywood Presbyterian computers occurred Feb. 5, when hackers prevented hospital staff from accessing patient information, according to law enforcement sources, who were not authorized to discuss the details of the investigation. The hackers then demanded an unspecified sum of computer currency.

Read more