Menu

Blog

Page 11014

Jul 21, 2016

MP scamsters find a way to clone thumbprint, beat biometric test

Posted by in categories: privacy, security

Why biometrics will need and form of id to properly perform security checks.


Impersonators in many cases apparently had used synthetic bandages bearing thumb impressions of actual candidates. “Traditionally, fingerprints were used as evidence in court cases and even in high-tech security systems. But revelations by those arrested for impersonation in Bihar are proving to the world of forensic sciences that creating forged, latent fingerprints is relatively easy,” claims Dr Anand Rai, whistle-blower in the MPPEB scam. In the past, Rai had requested STF officials to look into interrogation reports of 140 impersonators arrested by the Bihar police during a constable recruitment exam.

Source: http://timesofindia.indiatimes.com/city/bhopal/MP-scamsters-…311540.cms

Continue reading “MP scamsters find a way to clone thumbprint, beat biometric test” »

Jul 21, 2016

Amazon wants to turn street lights and even church steeples into drone docking stations

Posted by in category: drones

Hmmm.


Amazon’s Prime Air drone delivery service, if it ever gets off the ground, could one day use the top of street lights, cell towers, and even church steeples as docking stations for its flying machine.

The stations would serve as charging points for the drones, enabling them to stop off at multiple points for a battery boost thereby giving them a much greater flying range. Such a system could, in theory, open up pretty much the whole of the country to the possibility of drone delivery, as a single drone could hop from point to point on its way to an address.

Continue reading “Amazon wants to turn street lights and even church steeples into drone docking stations” »

Jul 21, 2016

Mining Black Hole Collisions for New Physics

Posted by in categories: cosmology, particle physics

The physicist Asimina Arvanitaki is thinking up ways to search gravitational wave data for evidence of dark matter particles orbiting black holes.

Read more

Jul 21, 2016

We’ll Only Have a Year to Prepare For a Cataclysmic Super-Eruption

Posted by in category: existential risks

Volcanic super-eruptions are bad. Like really bad. Scientists warn of such a potentially civilization-ending catastrophe in our future, but as a new study shows, we’ll only have a year to prepare once the signs of an impending eruption become visible.

A new microscopic analysis of quartz crystals taken from the site of a massive volcanic eruption that occurred 760,000 years ago in eastern California suggests we’ll only have about a year’s worth of advance warning before a devastating super-eruption. In a paper published in PLOS ONE, Guilherme Gualda from Vanderbilt University and Stephen Sutton from the University of Chicago show that super-eruptions don’t require much time to blow their tops, even though they’re tens of thousands of years in the making.

Read more

Jul 21, 2016

Huge sail will power JAXA mission to Trojan asteroids and back

Posted by in categories: robotics/AI, solar power, space travel, sustainability

I wonder, if NASA and/or SpaceX goes to Mars in the 2030’s as planned, by the time the 2050’s roll around a manned attempt to Ceres or Jupiter trojans might be attempted or perhaps an unmanned vehicle made on Mars beats this sail.


Japan’s space agency has its sights on unexplored asteroids as far away as Jupiter, a project that at one level draws on centuries of sail science.

Continue reading “Huge sail will power JAXA mission to Trojan asteroids and back” »

Jul 21, 2016

BioCryptography and Biometric Penetration Testing

Posted by in categories: biotech/medical, cybercrime/malcode, engineering, privacy

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

Continue reading “BioCryptography and Biometric Penetration Testing” »

Jul 21, 2016

This tiny foldable battery is powered by dirty water

Posted by in categories: energy, innovation

Dirty water has a use.


New technology doesn’t always look great, but researchers at Binghamton University are aiming to prove that function and style don’t have to be at odds with a new bacteria-powered battery that takes its design cues from origami.

Seokheun “Sean” Choi, an assistant professor of computer and electrical engineering at Binghamton, and two of his students recently published in the journal Biosensors and Bioelectronics a report on their invention of a microbial fuel cell that runs on nothing more than the bacteria found in just a few drops of dirty water.

Continue reading “This tiny foldable battery is powered by dirty water” »

Jul 21, 2016

Scientists program cells to remember and respond to series of stimuli

Posted by in category: biological

Engineers have programmed cells to remember and respond to events. This approach to circuit design enables scientists to create complex cellular state machines and track cell histories.

Read more

Jul 21, 2016

Engineers program E. coli to destroy tumor cells

Posted by in categories: biotech/medical, health

Like Botox; another bacteria found a new usage in healthcare.


Researchers at MIT and the University of California at San Diego (UCSD) have recruited some new soldiers in the fight against cancer—bacteria.

In a study appearing in the July 20 of Nature, the scientists programmed harmless strains of bacteria to deliver toxic payloads. When deployed together with a traditional cancer drug, the bacteria shrank aggressive liver tumors in mice much more effectively than either treatment alone.

Continue reading “Engineers program E. coli to destroy tumor cells” »

Jul 21, 2016

Engineered bacteria are helping us add memory to living computers

Posted by in category: computing

Bacteria improving technology.


New research shows how adding memory to bacterial circuits could help us harness their computing power.

Read more