Category Archives: Science

New Scanning Technique Reveals Secrets Behind Great Paintings

Researchers in the US have used a new scanning technique to discover a painting underneath one of Pablo Picasso's great works of art, the Crouching Woman (La Misereuse Accroupie). From a report: Underneath the oil painting is a landscape of Barcelona which, it turns out, Picasso used as the basis of his masterpiece. The new x-ray fluorescence system is cheaper than alternative art scanning systems -- and it is portable, making it available to any gallery that wants it. Details were revealed at the American Association for the Advancement for Science in Austin, Texas. The Crouching Woman is a painting from Picasso's blue period. What is remarkable is that the landscape painting beneath -- probably by a student artist -- is turned 90 degrees. The contour of the hills in the background becomes the crouching woman's back. She takes on the shape and form of the Catalan countryside. Kenneth Brummel, a curator at the Art Gallery of Ontario in Toronto, said that he was "excited" when he first learned what lay underneath the Crouching Woman. "It helps to date the painting and it also helps to determine where the painting was made," he told BBC News. "But it also gives a sense of the artists with whom the painter was engaging. And these insights help us ask new, more interesting and scientifically more accurate questions regarding an artist, their process and how they arrived at the forms that we see on the surface of a painting."

Read more of this story at Slashdot.

Cyber Threat Intelligence (CTI) – Part 2

groovy-cloud.co.uk - In part one, I outlined what CTI is and where it can be acquired to demonstrate its value. Here I will dive deeper into how organizations can be efficient in using this tool to mature their security …


Tweeted by @smallbizprotect https://twitter.com/smallbizprotect/status/964722280692617216

81 Percent Of Cybersecurity Pros Agree: Cyber Threat Intelligence Improves Prevention, Detection, And Response Capabilities – Information Security Buzz

informationsecuritybuzz.com - SANS Report Sponsored by DomainTools Reveals Cyber Threat Intelligence (CTI) Gaining Momentum as Organizations Battle to Keep Up with Hackers As cyberattacks and attackers become more blatant and per…


Tweeted by @ION_Management https://twitter.com/ION_Management/status/964565059006431232

Cyber Agent Technology en de Wet op de Inlichtingen- en Veiligheidsdiensten (WIV) (Cyber Agent Technology and the Dutch Intelligence Agencies Act (WIV)) by Bart Custers :: SSRN

papers.ssrn.com - Dutch Abstract: Centrale vraagstelling in dit rapport is: Hoe verhoudt het gebruik van de cyber agent technology door inlichtingen- en veiligheidsdiensten zich tot het juridisch kader van de nieuwe W…


Tweeted by @privsecforum https://twitter.com/privsecforum/status/964533754000703488

Cookiewall | BNR Nieuwsradio

bnr.nl - De Telecommunicatiewet verplicht FD Mediagroep (waarvan BNR onderdeel is) om gebruikers van haar websites te informeren over cookies en toestemming te vragen voor het gebruik van deze cookies. FD Med…


Tweeted by @securelinknl https://twitter.com/securelinknl/status/964455656756600832

ARES Conference » CyberTIM 2018

ares-conference.eu - CyberTIM workshop is jointly organized by three H2020 projects that are funded by the European Commission: The increased sophistication of cyber-attacks have created a technology arm race between att…


Tweeted by @shield_h2020 https://twitter.com/shield_h2020/status/964412473578209280

U.S. intelligence: Russia and China will have ‘operational’ anti-satellite weapons in a few years – SpaceNews.com

spacenews.com - New report by the Office of the Director of National Intelligence: China and Russia "would justify attacks against U.S. and allied satellites." WASHINGTON — Experts have warned for some time that war…


Tweeted by @christinayiotis https://twitter.com/christinayiotis/status/964294484677754880

OPSEC – How to securely delete files

kiledjian.com - Apple's mitigating control is that they encrypt the entire disk using FileVault and thus without your password, the data would look like jibberish anyway. Regardless if you use a Windows or Mac machi…


Tweeted by @ekiledjian https://twitter.com/ekiledjian/status/964228886505705478

Deelprojectleider Inkoop CTI (Cyber Threat Intelligence) in Den Haag – ZZP ICT opdracht op www.it-contracts.nl

it-contracts.nl - Deelprojectleider Inkoop CTI (Cyber Threat Intelligence), Den Haag Omschrijving: Voor het Ministerie van Justitie en Veiligheid zijn wij op zoek naar een Deelprojectleider Inkoop CTI (Cyber Threat In…


Tweeted by @ITContractsjobs https://twitter.com/ITContractsjobs/status/964080629620060161

Government’s C-DAC readies artificial intelligence – muscled cyber security plan – India Business News

business-support-network.org - Government’s C-DAC readies artificial intelligence – muscled cyber security plan February 14, 2018 The Economic Times businessNews, India Business, Indian Business NEW DELHI: The Centre for Developme…


Tweeted by @Indian_Biz https://twitter.com/Indian_Biz/status/963837814566727681

Release2Innovation Announces The Release of Premium Threat Intelligence Engine System Designed for Companies and Enterprises – Chicago Evening Post

chicagoeveningpost.com - In a digital era where things are always at risk of failure and hacking, R2i has designed a system which enables companies to protect their essential private data against ill-intentioned people. The …


Tweeted by @Sec_Cyber https://twitter.com/Sec_Cyber/status/963684627306172416

Office of International Academic Affairs – Data Mining and Business Intelligence for Cyber Security Applications Summer Program

in.bgu.ac.il - ​​Short Description: The purpose of this unique program is to provide theoretical, practical knowledge and hands-on experience. Students will learn the basic tools of data mining and the utilization …


Tweeted by @healthtechdist https://twitter.com/healthtechdist/status/963515848659841024

Big Data Can Lead to Big Problems

globenewswire.com - Fairfax, VA, Feb. 13, 2018 (GLOBE NEWSWIRE) -- The billions of bits and bytes that make virtual government services, information sharing and even shopping easier also open the doors for adversaries t…


Tweeted by @BigDataBlogs https://twitter.com/BigDataBlogs/status/963447732055756800

COUNTER THREAT – Turrem Data Group

turremgroup.com - Cyber security teams today typically use multiple endpoint solutions to protect their organisation from common cyber threats. Each tool generates alerts based on a particular kind of suspicious activ…


Tweeted by @Turremdatagroup https://twitter.com/Turremdatagroup/status/963037476993544193

Russia’s Approach to Cyber Warfare

toinformistoinfluence.com - Russia views cyber very differently than its western counterparts, from the way Russian theorists define cyberwarfare to how the Kremlin employs its cyber capabilities. The paper examines the Russian…


Tweeted by @Joel_Harding https://twitter.com/Joel_Harding/status/963027753875509248

A Chemical Bath and a Hot-press Can Transform Wood Into a Material That is Stronger Than Steel, Researchers Find

The process, and others like it, could make the humble material an eco-friendly alternative to using plastics and metals in the manufacture of cars and buildings, Nature reported this week. From the report: "It's a new class of materials with great potential," says Li Teng, a mechanics specialist at the University of Maryland in College Park and a co-author of the study published on 7 February in Nature. Attempts to strengthen wood go back decades. Some efforts have focused on synthesizing new materials by extracting the nanofibres in cellulose -- the hard natural polymer in the tubular cells that funnel water through plant tissue. Li's team took a different approach: the researchers focused on modifying the porous structure of natural wood. First, they boiled different wood types, including oak, in a solution of sodium hydroxide and sodium sulfite for seven hours. That treatment left the starchy cellulose mostly intact, but created more hollow space in the wood structure by removing some of the surrounding compounds. These included lignin, a polymer that binds the cellulose. Then the team pressed the block -- like a panini sandwich -- at 100C (212F) for a day. The result: a wooden plank one-fifth the thickness, but three times the density of natural wood -- and 11.5 times stronger. Previous attempts to densify wood have improved the strength by a factor of about three to four.

Read more of this story at Slashdot.

Cyber Kill Chain Model Needs A Makeover

afcea.org - Understanding the cyber kill chain and disrupting it could effectively defend against the most recent generation of cyber attacks. By scrutinizing the time and effort hackers invest in scoping out po…


Tweeted by @SwansonIntel https://twitter.com/SwansonIntel/status/962546640446984193

NBC & BIOWARFARE

uofe.org - NUCLEAR, BIOLOGICAL & CHEMICAL WARFARE RADIOLOGICAL WARFARE ELECTRIC POWER GRIDS CYBER WARFARE NOTICE In this section we will cover all aspects of NBC. However, we will focus on bio-warfare as the en…


Tweeted by @healingmiracles https://twitter.com/healingmiracles/status/962268700320632832

Understanding Cyber Conflict: 14 Analogies

carnegieendowment.org - James M. Acton is the codirector of the Nuclear Policy Program at the Carnegie Endowment for International Peace. John Arquilla is a professor and the chair of defense analysis at the US Naval Postgr…


Tweeted by @CarnegieCyber https://twitter.com/CarnegieCyber/status/962040730771271680

Trade Secret Theft by Cyber Espionage

gttb.com - As breaches continue to make headlines, it’s apparent that monies and time spent on cybersecurity projects are not delivering the desired results. So how does one build an effective DLP program that…


Tweeted by @gtbtechnologies https://twitter.com/gtbtechnologies/status/961732142567849984

Engineering Marvel of the Winter Olympics: A Broom

Andrew Flemming and Geoff Fowler, both 29, along with their friend and business partner, Will Hamilton, 37, were pouring their creative energies into a high-tech training device the likes of which the sporting world had never seen. They were building a better broom. From a report: Not just any broom, but one that they thought could be essential to the sport of curling, which relies on the best broom handling out there as teams strategically cajole a polished granite rock across a sheet of ice. They wound up calling it the SmartBroom, and in a sport that can come across as vaguely primordial, their piece of 21st-century gadgetry could play a role in determining who wins gold at the 2018 Winter Olympics in Pyeongchang, South Korea. Each SmartBroom has four sensors in the broom head that relay data to a small display unit. Hamilton took one for a spin down the ice, and the data was instantaneous -- line graphs along with a slew of numbers that showed his force in pounds and his stroke rate in hertz. Hamilton also pointed to a figure that he described as his "sweeping performance index," or S.P.I., a metric that combines power and speed in one easy-to-digest figure. Patrick Janssen, a world-class curler from Canada, has consistently registered an S.P.I. in the 2,800 range. The numbers by themselves might not mean much, Flemming said, but subtle changes in technique can lead to big differences in the quality of each stroke. And now curlers have that information at their disposal. They can experiment to see which stroke works best for them.

Read more of this story at Slashdot.

81 Percent of Cybersecurity Pros Agree: Cyber Threat Intelligence Improves Prevention, Detection, and Response Capabilities – Puget Sound Business Journal

bizjournals.com - SEATTLE, Feb. 8, 2018 /PRNewswire/ -- As cyberattacks and attackers become more blatant and pervasive each year, a new SANS Institute report, in conjunction with DomainTools, shows organizations arou…


Tweeted by @SeattleNews360 https://twitter.com/SeattleNews360/status/961618787748470785

How to automate threat hunting

csoonline.com - The SOC teams responsible for detecting and stopping breaches are famously short-staffed. That’s troubling, because data breaches were up dramatically in 2017. With each passing year, the threat dete…


Tweeted by @ACMSIGCAS https://twitter.com/ACMSIGCAS/status/961607361893892096

Our Experts

sans.org - With SANS, deep insight and expertise goes hand-in-hand. When you consider the fact that hundreds of scientists, certified cyber security professionals, doctors in behavior learning, and authors cove…


Tweeted by @SecureTheHuman https://twitter.com/SecureTheHuman/status/961589218198867973

Artificial Intelligence and Chinese Power

foreignaffairs.com - The United States’ technological sophistication has long supported its military predominance. In the 1990s, the U.S. military started to hold an uncontested advantage over its adversaries in the tech…


Tweeted by @MT_Consult https://twitter.com/MT_Consult/status/961442514229170176

Kaspersky Lab Identifies Operation “Red October,” an Advanced Cyber-Espionage Campaign Targeting Diplomatic and Government Institutions Worldwide

usa.kaspersky.com - Attackers Created Unique, Highly-Flexible Malware to Steal Data and Geopolitical Intelligence from Target Victims’ Computer Systems, Mobile Phones and Enterprise Network Equipment Woburn, MA - Januar…


Tweeted by @captainrrl https://twitter.com/captainrrl/status/961430162037452800

Many Animals Can Count, Some Better Than You

An anonymous reader shares a report: The story of the frog's neuro-abacus is just one example of nature's vast, ancient and versatile number sense, a talent explored in detail in a recent themed issue of Philosophical Transactions of the Royal Society B, edited by Brian Butterworth, a cognitive neuroscientist at University College London, C. Randy Gallistel of Rutgers University and Giorgio Vallortigara of the University of Trento. Scientists have found that animals across the evolutionary spectrum have a keen sense of quantity, able to distinguish not just bigger from smaller or more from less, but two from four, four from ten, forty from sixty. Orb-weaving spiders, for example, keep a tally of how many silk-wrapped prey items are stashed in the "larder" segment of their web. When scientists experimentally remove the cache, the spiders will spend time searching for the stolen goods in proportion to how many separate items had been taken, rather than how big the total prey mass might have been. Small fish benefit from living in schools, and the more numerous the group, the statistically better a fish's odds of escaping predation. As a result, many shoaling fish are excellent appraisers of relative head counts.

Read more of this story at Slashdot.

Minister Flanagan announces proposed counter-terrorism legislation requiring advance passenger information for flights entering or leaving the State – MerrionStreet

merrionstreet.ie - The Minister for Justice and Equality, Mr Charles Flanagan TD, today announced that the Government approved his proposals to introduce new legislation on Passenger Name Records (PNR). The proposed le…


Tweeted by @ClareAliceMurph https://twitter.com/ClareAliceMurph/status/961118765781045248

The Mutant All-Female Crayfish, Which Reproduces by Cloning Itself, Is Filling Europe at Alarming Speed

The marbled crayfish looks much like any other freshwater crustacean. It has two claws, ten legs, and an attractive blue-brown marbled shell. Yet this six-inch creature, found in streams and lakes around the world, is far more sinister than you might expect. From a report: Its new scientific name gives a few clues: Procambarus virginalis. Every marbled crayfish, known as a marmorkreb in German, is female -- and they reproduce by cloning themselves. Frank Lyko, a biologist at the German Cancer Research Center, first heard about the marbled crayfish from a hobbyist aquarium owner, who picked up some "Texas crayfish" at a pet shop in 1995. They were strikingly large, and they laid enormous batches of eggs -- hundreds, in a single go. Soon, the New York Times reports, the hobbyist was beset with so many crayfish he was giving them away to his friends. And soon after that, marmorkrebs were showing up in pet stores upon Europe. There was something very strange about these crayfish. They were all female, and they all laid hundreds of eggs without mating. These eggs, in turn, hatched into hundreds more females -- with each one growing up fully able to reproduce by herself. In 2003, scientists sequenced their DNA and confirmed what many owners already believed to be the case: Each baby crayfish was a clone of its mother, and they were filling Europe's fishtanks at alarming speed. Just 25 years ago, the marbled crayfish did not exist at all. Now, they can be found in the wild by the millions in Germany, the Czech Republic, Hungary, Croatia, the Ukraine, Japan, and Madagascar.

Read more of this story at Slashdot.

Putting Artificial Intelligence to Work

bcg.com - The data processing needs of AI differ from those of big data or traditional data analytics in a couple of fundamental ways: Setting up the data-to-action process is hard work. Companies cannot effec…


Tweeted by @TonyStriefel https://twitter.com/TonyStriefel/status/960875727561240576

ERAU adds graduate cybersecurity program

dcourier.com - Responding to an increased demand for cybersecurity professionals in Arizona and across the country, the College of Security and Intelligence at Embry-Riddle Aeronautical University’s Prescott campus…


Tweeted by @AZGovEducation https://twitter.com/AZGovEducation/status/960659319137161216

Cybersecurity: Time for a New Definition

lawfareblog.com - Or maybe we need a new definition of cyberinsecurity. Whatever it is, the current U.S. government definition is outdated. But I should start at the beginning … As you may have noticed, over the last …


Tweeted by @TheJatana https://twitter.com/TheJatana/status/960642948974170112

Intelligence – Turrem Data Group

turremgroup.com - Cyberthreat intelligence (CTI) is an advanced process that enables an organisation to continually gather valuable insights based on the analysis of contextual risks, which can be tailored to the orga…


Tweeted by @Turremdatagroup https://twitter.com/Turremdatagroup/status/960558827178549249

AGI – Wikipedia

en.wikipedia.org - If an internal link led you here, you may wish to change the link to point directly to the intended article.


Tweeted by @rhyolight https://twitter.com/rhyolight/status/960202622761234432

The Specter of Artificial Intelligence

2018.transmediale.de - Why is the discourse on artificial intelligence (AI) exploding at a moment when the capitalist system has plunged into crisis? What lies behind the appearance of AI’s absolute autonomy? How do we go …


Tweeted by @vavoida https://twitter.com/vavoida/status/960168600551264257

Robots and Robotics: What you need to know

thingscyber.com - Operating along a spectrum of human controlled to semi-autonomous to totally independent, robots are already operating in our world. They save lives in hospitals, are taking the place of humans in da…


Tweeted by @TheCyberThreat https://twitter.com/TheCyberThreat/status/960045043145891840

Singularity 2017 | Artificial Intelligence and North Pole Hidden Land | CONTENT MARKETING, CYBER SECURITY E COMMERCE, INTERNET PRIVACY, SEARCH ENGINES, SOCIAL MEDIA, TECHNOLOGY

megalegit.com - Contributed by Mary Martinez on February 3, 2018 at 3:52 pm Singularity 2017 Movie | Artificial Intelligence and Hidden Land at the North Pole? (Aurora) Strangest thing happened to me the other week.…


Tweeted by @John_Hindmarsh https://twitter.com/John_Hindmarsh/status/959939116363337728

‘Nitro Zeus’ Was A Massive Cyber Attack Plan Aimed At Iran If Nuclear Negotiations Failed: Report

foxtrotalpha.jalopnik.com - Shortly after President Barack Obama took office, plans were drawn up to unleash absolute hell on parts of Iran’s power grid, air defense system, communications and command and control apparatus via …


Tweeted by @joaniemiller56 https://twitter.com/joaniemiller56/status/959702035225612288

A Search For Insomnia Genes Involving 1.3 Million People is the Largest Genetic Study Ever

In a genetic study of unprecedented size, scientists have searched for inherited causes of insomnia in the DNA 1,310,010 people. From a report: They found 956 different genes linked to the sleep disorder, drawing closer to an explanation of what causes it and, perhaps, to new ways to treat it. The study appears to be the first gene search to involve DNA collected from more than one million people. "It's amazingly massive," says Stuart Ritchie, a psychologist involved with genetics research at the University of Edinburgh. On Twitter, scientists let loose with superlatives: "Holy cr*p," "mammoth," and "Wow!" The project involved crunching genetic and medical information collected from the UK Biobank and the consumer DNA testing company 23andMe. It was led by Danielle Posthuma, a neuroscientist specializing in statistical genetics at Vrije University, in Amsterdam.

Read more of this story at Slashdot.

Home

s4.goeshow.com - Did you know that science, technology, engineering and mathematics career opportunities, referred to as "STEM" industries, are growing rapidly? Employers cannot fill job postings quickly enough, and …


Tweeted by @Cyber__7 https://twitter.com/Cyber__7/status/959448910363353089

Signals Intelligence for Anyone

rand.org - This Perspective examines and challenges the assumption that signals intelligence (SIGINT) is an inherently governmental function by revealing nongovernmental approaches and technologies that allow p…


Tweeted by @Inveniam https://twitter.com/Inveniam/status/959363283106107392