the digest

Cybercriminals using bin Laden’s death to spread malware

May 3, 2011

Malware links are already beginning to spread across Facebook and Twitter, similar to what happened following news of the recent earthquake in Japan.

Avoid spam containing links to photos, videos, and other information that sounds remarkably interesting on Bin Laden’s death, and be cautious in responding to tweets and Facebook posts.

If you click on a link to a malicious site and reach an infected Web page, you… read more

Cybercrime toll threatens new financial crisis

November 21, 2008

International regulation must be improved to avoid Internet crime (estimated at $100 billion annually) causing global catastrophe, some of the world’s top crime experts have warned.

Cyberattack Drill Shows U.S. Unprepared

February 18, 2010

“Cyber Shockwave,” which simulated a massive cyberattack — mobile phone worm and power grid attack — on Tuesday, found that the U.S. is ill-prepared to handle a large-scale cyberattack.

Cyber-Threats Outpace Security Measures, Says McAfee CEO

September 19, 2007

McAfee CEO David DeWalt says cyber-crime has become a $105 billion business that now surpasses the value of the illegal drug trade worldwide.

Worldwide data losses now represent $40 billion in losses to affected companies and individuals each year, he said.

Cyber women test what’s real

October 27, 2003
News tip: Carl Vinci

Software cyberbabes, created by powerful computers, sophisticated modelling packages and active imaginations are getting extremely human-like.

Cyber threats forecast for 2013

November 15, 2012


The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information, and continuous threats to the U.S. supply chain from global sources.

Those were the findings by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in the Georgia Tech Emerging Cyber Threatsread more

Cyber threats 2012: search poisoning, mobile Web attacks, selling social-media data

October 12, 2011

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy.

Those were the findings announced by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in the Georgia Tech Emergingread more

Cyber Storm III tests U.S. cyber response capabilities

September 29, 2010

Cyber Storm III

The Department of Homeland Security (DHS) has announced the beginning of Cyber Storm III — a three-day-long, DHS-sponsored exercise that brings together a diverse cross-section of the nation’s cyber incident responders to assess U.S. cyber response capabilities.

Cyber Storm III is an exercise scenario that simulates a large-scale cyber attack on critical infrastructure across the nation. The goal of the exercise is to examine and strengthen collective… read more

Cyber Goggles for Human Tagging

March 5, 2008
(University of Toykyo)

Researchers at the University of Tokyo have developed a smart video goggle system that records everything the wearer looks at, recognizes and assigns names to objects that appear in the video, and creates an easily searchable database of the recorded footage.

It can function as a memory aid for the elderly, or search through hours of video footage to find particular images.

Cyber detective links up crimes

December 6, 2004

Computer scientists at DePaul University have developed an artificial intelligence system for crime solving that compares records for cases with all the files on past crimes, looking for telltale similarities in crime records and alerting detectives when it finds them.

The system uses pattern-recognition software to link related crimes that may have taken place in widely separated areas whose police forces may rarely be in close contact. The neural… read more

Cyber combat: act of war

June 1, 2011

The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, opening the door for the U.S. to respond using traditional military force.

Pentagon officials believe the most sophisticated computer attacks require the resources of a government. For instance, the weapons used in an assault such as taking down a power grid would likely have been developed with state support.

Defense officials… read more

Cutting-edge training developed the human brain 80,000 years ago

June 21, 2011

Engraved ochre and bone tools from c. 75-80,000 years ago (credit: Chris Henshilwood and Henning)

Advanced crafting of stone spearheads contributed to the development of new ways of human thinking and behaving in what is now South Africa, approximately 80,000 years ago, archaeologists at Lund University have found.

Their findings show that people at that time used advanced technology for the production of spearheads and that the complicated crafting process developed the working memory and social life of humans.… read more

Cutting-Edge Robots Show Off in Japan

May 13, 2009

Researchers at the IEEE International Conference on Robotics and Automation are discussing the latest advances in robotics–from robotic cars to cutting-edge climbing machines and robots that can find their way around a city by asking pedestrians for directions and using gesture tracking and voice recognition to interpret commands.

Cutting-edge MRI techniques for studying communication within the brain

February 9, 2012

White matter (WM) tract reconstructions (credit: Andrew L. Alexander et al./Brain Connectivity)

Researchers from the University of Wisconsin, Madison have presented innovative magnetic resonance imaging (MRI) techniques that can measure changes in the microstructure of the white matter likely to affect brain function and the ability of different regions of the brain to communicate.

Brain function depends on the ability of different brain regions to communicate through signaling networks that travel along white matter tracts.

Using… read more

Cutting Coal Use with Sunshine

February 10, 2009
These parabolic mirrors gather heat energy for a 150-megawatt hybrid solar/natural-gas power plant under construction south of Cairo. During the day, solar heat will displace a fraction of the natural gas required to drive the plant

Feeding heat from the sun into coal-fired power stations could turn out to be the cheapest way to simultaneously expand the use of solar energy and trim coal plants’ oversize carbon footprints, says the Electric Power Research Institute.

(Solar Millennium)

close and return to Home