Menu

Blog

Page 3554

Aug 25, 2022

Scientists Now Suggest Various Different Realities Can Coexist

Posted by in category: quantum physics

Researchers now suggest how different realities can coexist all at once, at least when it comes to the quantum world.

Aug 25, 2022

NASA Scientists Help Probe Dark Energy

Posted by in categories: cosmology, physics

Could one of the biggest puzzles in astrophysics be solved by reworking Albert Einstein’s theory of gravity? A new study co-authored by NASA scientists says not yet.

Aug 25, 2022

Supercomputer Emulator—AI’s New Role in Science

Posted by in categories: robotics/AI, science, supercomputing

Bishop: They can still be computationally very expensive. Additionally, emulators learn from data, so they’re typically not more accurate than the data used to train them. Moreover, they may give insufficiently accurate results when presented with scenarios that are markedly different from those on which they’re trained.

“I believe in “use-inspired basic research”—[like] the work of Pasteur. He was a consultant for the brewing industry. Why did this beer keep going sour? He basically founded the whole field of microbiology.” —Chris Bishop, Microsoft Research.

Aug 25, 2022

Space Biology, Psychology Studies Help NASA Plan Future Missions

Posted by in categories: biotech/medical, futurism

Life science continued dominating the research schedule aboard the International Space Station on Wednesday to benefit humans living on and off the Earth. The seven Expedition 67 orbital residents explored how living in microgravity affects tissue regeneration, crew psychology, and the human digestion system.

Learning to heal wounds in space is critical as NASA and its international partners plan crewed missions to the Moon, Mars, and beyond. Four station astronauts have been partnering together this week for the skin healing study taking place inside the Kibo laboratory module. Flight Engineers Kjell Lindgren, Bob Hines, and Jessica Watkins, all from NASA, with Samantha Cristoforetti of ESA (European Space Agency), are studying surgical techniques such as biopsies, suture splints, and wound dressing, inside Kibo’s Life Science Glovebox.

Scientists on Earth seek to identify the molecular mechanisms that occur during tissue regeneration in weightlessness. Observations may offer advanced therapies and provide insights into how space-caused accelerated skin aging affects an astronaut’s healing properties. The biomedical experiment may also contribute to better wound healing techniques on Earth.

Aug 25, 2022

‘Photonic transistor’ switches light signals instead of electronic signals

Posted by in category: computing

Circa 2014 face_with_colon_three


Electronic transistors, which act as miniature switches for controlling the flow of electrical current, underpin modern-day microelectronics and computers. State-of-the-art microprocessor chips contain several billion transistors that switch signals flowing in electrical wires and interconnects. With increasing data-processing speeds and shrinking chip sizes, however, wires and interconnects waste considerable energy as heat.

One alternative is to replace electrical interconnects with energy-efficient that carry data using . However, a practical analogue of the transistor for optical interconnects does not yet exist. Hence, Vivek Krishnamurthy from the A*STAR Data Storage Institute and co-workers in Singapore and the United States are developing a practical ‘photonic transistor’ for optical interconnects that can control light signals in a similar manner to electronic .

Continue reading “‘Photonic transistor’ switches light signals instead of electronic signals” »

Aug 25, 2022

IoT Vulnerability Disclosures Up 57% in Six Months, Claroty Reveals

Posted by in categories: biotech/medical, internet, security

The number of vulnerability disclosures impacting extended internet of things (XIoT) devices increased by 57% in the first half of 2022 compared to the previous six months, according to a new report by Team82, the research team of cyber-physical systems (CPS) security firm Claroty.

The research also found that vendor self-disclosures increased by 69%. This would be a first for the industry, which usually relies more for disclosures on independent research teams. According to Team82, the trend indicates that more operational technology (OT), IoT, and internet of medical things (IoMT) vendors are establishing vulnerability disclosure programs and dedicating more resources to them.

Additionally, fully or partially remediated firmware vulnerabilities increased by 79% over the same time period, a significant improvement considering the relative challenges in patching firmware versus software vulnerabilities.

Aug 25, 2022

Facebook Bug Causes Users’ Feeds to Be Spammed

Posted by in category: futurism

Facebook suffered a bug leading to users’ feeds being spammed with posts from strangers on the pages of celebrities on the site earlier today.

The social media platform’s parent company Meta blamed the problem on a “configuration change” in a statement to Metro.co.uk, adding: “We resolved the issue as quickly as possible for everyone who was impacted, and we apologize for any inconvenience.”

The technical glitch meant that when anyone posted a comment on a celebrity’s page, it appeared on the feed of anyone who followed that celebrity. This issue reportedly began at around 6.30 am BST on Wednesday, August 24.

Aug 25, 2022

CISA Adds Palo Alto Networks’ PAN-OS Vulnerability to Catalog

Posted by in category: futurism

The flaw would allow a network-based unauthenticated threat actor to perform DoS attacks.

Aug 25, 2022

Microsoft shuts down over 1,400 email accounts and 531,000 URLs used by ransomware gang that collected stolen customer credentials

Posted by in categories: business, cybercrime/malcode, evolution

Microsoft has shut down more than 1,400 malicious email accounts used by cybercriminals to collect stolen customer passwords via ransomware in the past year. The technology company has presented the second edition of ‘Cyber Signals’, a report that it produces periodically on cyber threats and that shows trends in security and cybercrime. In this issue, it offers insight into the evolution of extortion in cybercrime.

In this analysis, the company highlights that the specialization and consolidation of cybercrime have driven ransomware as a service (RaaS), which has become a dominant business model. RaaS programs, such as Conti or REvil, offer cybercriminals the opportunity to buy access to both ransomware payloads, leaked data and payment infrastructure.

Continue reading “Microsoft shuts down over 1,400 email accounts and 531,000 URLs used by ransomware gang that collected stolen customer credentials” »

Aug 25, 2022

“Half of Twitter’s roughly 7,000 full-time workers have complete access to its code and user confidential data” Says its former chief security officer Peiter Zatko

Posted by in categories: robotics/AI, security

Twitter executives misled federal regulators and the company’s own board about “extreme and egregious shortcomings” in its defenses against hackers and its meager efforts to combat bots, said a former chief security officer Peiter Zatko.

What happens inside Twitter?

Continue reading “‘Half of Twitter’s roughly 7,000 full-time workers have complete access to its code and user confidential data’ Says its former chief security officer Peiter Zatko” »