Toggle light / dark theme

New method on how to attend Def Con.


LAS VEGAS (AP) — Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats.

As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.

And for the good guys, knowing how to pick locks is important for learning how to defend against it.

Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.


A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.

DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.

So while the DARPA competition presents itself as a smiley affair, it dies represent the new face of an emerging weapon – and the most promising weapon on display came from the aforementioned ForAllSecure, a startup with close ties to Pittsburgh’s Carnegie Mellon University.

New way for IoT and data centers in general to improve energy use, costs, etc.


Arrays based on vertical-cavity surface-emitting lasers offer a high-bandwidth, low-power, and low-cost solution for intra-data centers.

With the emergence of high-performance digital systems and the rapid growth of Internet traffic in the 1990s, the US Air Force Research Laboratory (AFRL) Micro Electronics Technology Directorate correctly predicted the growing need for optical interconnects and thus initiated several efforts to develop such technologies for the next generation of high-performance digital systems. This work was also prompted by significant advances in optical materials (i.e., III-V materials and polymers), devices (vertical-cavity surface-emitting lasers, VCSELs), and packaging technologies that were also made during this period.1 In collaboration with the Defense Advanced Research Projects Agency (DARPA) Electronic Technology Office, the AFRL thus initiated several major programs in this area.

Nice — another step forward for all things connected.


Scientists can now talk to and even command living cells–to a limited degree at the moment, but with massive implications for the future. MIT biological engineers have created a computer code that allows them to basically hijack living cells and control them. It works similarly to a translation service, using a programming language to create a function for a cell in the form of a DNA sequence. Once it’s scalable, the invention has major ramifications. Future applications could include designing cells that produce a cancer drug when a tumor is detected or creating yeast cells that halt their own fermentation if too many toxic byproducts build up.

That’s not to imply it isn’t a big deal already. The code allows anyone, even someone without a biology background, to modify a pre-existing cell. All that’s required is knowledge of the programming language, which is based on one commonly used for computer chips called Verilog. “You could be completely naive as to how any of it works,” MIT biological engineering professor Christopher Voigt said in a press release. “That’s what’s really different about this. You could be a student in high school and go onto the Web-based server and type out the program you want, and it spits back the DNA sequence.” To learn more, read the full story here. For more on the confluence of biology and technology, watch this TED Talk below.

A prototype chip with large arrays of phase-change devices that store the state of artificial neuronal populations in their atomic configuration. The devices are accessed via an array of probes in this prototype to allow for characterization and testing. The tiny squares are contact pads used to access the nanometer-scale phase-change cells (inset). Each set of probes can access a population of 100 cells. There are thousands to millions of these cells on one chip and IBM accesses them (in this particular photograph) by means of the sharp needles (probe card). (credit: IBM Research)

Scientists at IBM Research in Zurich have developed artificial neurons that emulate how neurons spike (fire). The goal is to create energy-efficient, high-speed, ultra-dense integrated neuromorphic (brain-like) technologies for applications in cognitive computing, such as unsupervised learning for detecting and analyzing patterns.

Applications could include internet of things sensors that collect and analyze volumes of weather data for faster forecasts and detecting patterns in financial transactions, for example.

Read more

This article is hilarious! If Google ever becomes obsolete it will do so because a new tech player with new technology took over. Too say the world will collapse or panic will happen is not reality. Anyone who remembers DEC/ Digital Corporation, WANG, etc. will tell you that a tech company often becomes obsolete when the masses / users drop the company’s tech for another competitor; and this process typically takes a few years of decline when it happens.


In this time of the internet when we have a vast amount of information available that we can easily Google to find out. This search engine has proven itself to be the most efficient tool for the entire humanity. But imagine what will happen if Google becomes obsolete or shuts down entirely at some point in the future.

Considering all the vast ranges of functionalities Google can perform, I believe the aftermath will be devastating. In fact, Google did shut down once, for a few minutes and the whole world turned upside-down.

No more searches on Google

A Russian web hosting service is providing an avenue for cybercriminals to set up sites for selling stolen passwords, credit cards, and other pilfered personal information, a cybersecurity firm said.

The web hosting company Deer.io has become popular among online thieves because it’s easy to use and asks few questions from users, said Rick Holland, vice president of strategy at the cybersecurity firm Digital Shadows, on Tuesday at the Black Hat cybersecurity conference in Las Vegas.

Read more

Could this help on the whole IoT security challenge — TBD.


A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.

The technique will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. These signals are produced by semiconductors, capacitors, power supplies and other components, and can currently be measured up to a half-meter away from operating IoT devices.

By comparing these unintended side-channel emissions to a database of what the devices should be doing when they are operating normally, researchers can tell if malicious software has been installed.

Tempus fugit. I’m just about old enough to remember a time in which 2020 was the distant future of science fiction novels, too far away to be thinking about in concrete terms, a foreign and fantastical land in which anything might happen. Several anythings did in fact happen, such as the internet, and the ongoing revolution in biotechnology that has transformed the laboratory world but leaks into clinics only all too slowly. Here we are, however, close enough to be making plans and figuring out what we expect to be doing when the third decade of the 21st century gets underway. The fantastical becomes the mundane. We don’t yet have regeneration of organs and limbs, or therapies to greatly extend life, but for these and many other staples of golden age science fiction, the scientific community has come close enough to be able to talk in detail about the roads to achieving these goals.

Of all the things that researchers might achieve with biotechnology in the near future, control over aging is by far the most important. Aging is the greatest cause of death and suffering in the world, and none of us are getting any younger. That may change, however. SENS, the Strategies for Engineered Negligible Senescence, is a synthesis of the scientific view of aging as an accumulation of specific forms of cell and tissue damage, pulling in a century of evidence from many diverse areas of medical science to support this conclusion. Aging happens because the normal operation of our cellular biochemistry produces damage, wear and tear at the level of molecules and molecular structures, and some of that damage accumulates to cause failure of tissues and organs, and ultimately death.

Read more