Toggle light / dark theme

Android camera security threat, disclosed and since addressed, had spy vulnerabilities. These were fixed by Google and Samsung with a patch rolled out for Pixel and Samsung devices The recent headlines surrounding the flaw on Android devices teased a discomforting thought in the latest of numerous discomforting thoughts about security risks in the Android ecosystem.

Imagine your app is recording video and taking photos without your permission.

In short, attackers could hijack your phone camera. Dan Goodin in Ars Technica: This was all about “an app needed no permissions at all to cause the camera to shoot pictures and record video and audio.”

More than a dozen U.S. utilities that were targets in a recent wave of cyberattacks have been identified by The Wall Street Journal. Some of the utilities, most of which are relatively small, are located near dams, locks and other critical infrastructure.

These electricity providers were singled out in a hacking campaign that was brought to light in August by researchers at a Silicon Valley cybersecurity company. But little was known about the attacks until now.

Uncovering trolls and malicious or spammy accounts on social media is increasingly difficult as the miscreants find more and more ways to camouflage themselves as seemingly legitimate. Writing in the International Journal of Intelligent Engineering Informatics, researchers in India have developed an algorithm based on ant-colony optimization that can effectively detect accounts that represent a threat to normal users.

Asha Kumari and Balkishan Department of Computer Science and Applications at Maharshi Dayanand University, in Rohtak, India, explain that the connections between twitter users are analogous to the pheromone chemical communication between ants and this can be modeled in an based on how ant colonies behave to reveal the strongest connections in the twitter network and so uncover the accounts that one might deem as threatening to legitimate users.

The team’s tests on their system were successful in terms of precision, recall, f-measure, true-positive rate, and false-positive rate based on 26 features examined by the system played against almost 41,500 user accounts attracted to honeypots. Moreover, they report that the approach is superior to existing techniques. The team adds that they hope to be able to improve the system still further by adding so-called machine learning into the algorithm so that it can be trained to better identify threatening accounts based on data from known threats and legitimate accounts.

Scientists have solved the structure of one of the key components of photosynthesis, a discovery that could lead to photosynthesis being ‘redesigned’ to achieve higher yields and meet urgent food security needs.

The study, led by the University of Sheffield and published today in the journal Nature, reveals the structure of cytochrome b6f — the protein complex that significantly influences plant growth via photosynthesis.

Photosynthesis is the foundation of life on Earth providing the food, oxygen and energy that sustains the biosphere and human civilisation.