Menu

Blog

Page 8710

Jun 11, 2019

Protecting our energy infrastructure from cyberattack

Posted by in categories: cybercrime/malcode, nuclear energy

Almost every day, news headlines announce another security breach and the theft of credit card numbers and other personal information. While having one’s credit card stolen can be annoying and unsettling, a far more significant, yet less recognized, concern is the security of physical infrastructure, including energy systems.

“With a credit card theft, you might have to pay $50 and get a new credit card,” says Stuart Madnick, the John Norris Maguire Professor of Information Technologies at the Sloan School of Management, a professor of engineering systems at the School of Engineering, and founding director of the Cybersecurity at MIT Sloan consortium. “But with infrastructure attacks, real physical damage can occur, and recovery can take weeks or months.”

A few examples demonstrate the threat. In 2008, an alleged blew up an oil pipeline in Turkey, shutting it down for three weeks; in 2009, the malicious Stuxnet computer worm destroyed hundreds of Iranian centrifuges, disrupting that country’s nuclear fuel enrichment program; and in 2015, an attack brought down a section of the Ukrainian power grid—for just six hours, but substations on the grid had to be operated manually for months.

Continue reading “Protecting our energy infrastructure from cyberattack” »

Jun 11, 2019

New computer attack mimics user’s keystroke characteristics and evades detection

Posted by in categories: cybercrime/malcode, robotics/AI

Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called Malboard evades several detection products that are intended to continuously verify the user’s identity based on personalized keystroke characteristics.

The new paper, “Malboard: A Novel User Keystroke Impersonation Attack and Trusted Detection Framework Based on Side-Channel Analysis,” published in the Computer and Security journal, reveals a sophisticated attack in which a compromised USB automatically generates and sends malicious keystrokes that mimic the attacked user’s behavioral characteristics.

Keystrokes generated maliciously do not typically match human typing and can easily be . Using artificial intelligence, however, the Malboard attack autonomously generates commands in the user’s style, injects the keystrokes as malicious software into the keyboard and evades detection. The keyboards used in the research were products by Microsoft, Lenovo and Dell.

Continue reading “New computer attack mimics user’s keystroke characteristics and evades detection” »

Jun 11, 2019

US moves to tackle scourge of ‘robocalls’

Posted by in category: robotics/AI

“Hello? Who’s calling?” For many Americans these days, the call is coming from a “bot” or automated program that seeks to trick them into giving up money or important personal data.

The scourge of “robocalls” by the billions has prompted US regulators to adopt new rules allowing carriers to implement tools to block calls with suspicious origins.

The automated calls may tell respondents that they owe back taxes or other bills that need to be settled immediately, or direct them to call numbers where they are charged for the connection.

Continue reading “US moves to tackle scourge of ‘robocalls’” »

Jun 11, 2019

Tracking major sources of energy loss in compact fusion facilities

Posted by in categories: computing, particle physics

A key obstacle to controlling on Earth the fusion that powers the sun and stars is leakage of energy and particles from plasma, the hot, charged state of matter composed of free electrons and atomic nuclei that fuels fusion reactions. At the U.S. Department of Energy’s (DOE) Princeton Plasma Physics Laboratory (PPPL), physicists have been focusing on validating computer simulations that forecast energy losses caused by turbulent transport during fusion experiments.

Researchers used codes developed at General Atomics (GA) in San Diego to compare theoretical predictions of electron and ion turbulent transport with findings of the first campaign of the laboratory’s compact—or “low-aspect ratio”—National Spherical Torus Experiment-Upgrade (NSTX-U). GA, which operates the DIII-D National Fusion Facility for the DOE, has developed codes well-suited for this purpose.

Low-aspect ratio tokamaks are shaped like cored apples, unlike the more widely used conventional tokamaks that are shaped like doughnuts.

Continue reading “Tracking major sources of energy loss in compact fusion facilities” »

Jun 11, 2019

High Resolution SLA and SLS 3D Printers for Professionals

Posted by in category: 3D printing

Make jewelry and moving parts for weaponry.


Formlabs designs and manufacturers the Form 2 stereolithography (SLA) and Fuse 1 selective laser sintering (SLS) 3D printers for professionals.

Read more

Jun 11, 2019

How Long Can Humans Live? Scientists Predict a New Era of Longevity

Posted by in category: life extension

We’ve already blown past 100, so what’s next?

Read more

Jun 11, 2019

Expert: Doctors Will Soon Prescribe Sex Robots to Patients

Posted by in categories: biotech/medical, robotics/AI, sex

And your insurance might even cover the cost.

Read more

Jun 11, 2019

Telomerase Inhibitor IX | CAS 368449−04−1

Posted by in category: life extension

Buy Telomerase Inhibitor IX (CAS 368449−04−1), a potent, reversible inhibitor of telomerase activity, from Santa Cruz. Purity: ≥95%, MF: C20H16N2O6.

Read more

Jun 11, 2019

Software Is Called Capable of Copying Any Human Voice

Posted by in categories: biotech/medical, robotics/AI

Who are you really talking to?


AT&T Labs will begin selling speech software it says is so good at reproducing sounds, inflections and intonations of human voice, that it can recreate voices and even bring those of long-dead celebrities back to life; Natural Voices software, which turns printed text into synthesized speech, makes it possible for company to use recording of person’s voice to utter things person never actually said; utterances still contain few robotic tones and unnatural inflections, leading competitors to question whether it is substantial step up from existing products; tests suggest it may be first text-to-speech software to raise specter of voice cloning, replicating person’s voice so perfectly that human ear cannot tell difference; photo (M)

Read more

Jun 11, 2019

IceCube Neutrino Observatory

Posted by in categories: computing, particle physics

The IceCube Laboratory at the Amundsen-Scott South Pole Station, in Antarctica, hosts the computers that collect raw data from the sensors buried in the ice below.


Website of the IceCube Neutrino Observatory, featuring news, galleries, and information about the mission of IceCube, the IceCube Collaboration, and IceCube’s scientific outcomes.

Read more