Category Archives: Science

MIT Researchers Developed a ‘System For Dream Control’

dmoberhaus writes: Researchers at MIT Media Lab have adapted a centuries' old technique for inducing hypnagogia for the 21st century. Known as Dormio, this system is able to extend and manipulate the period users spend in a transitional state of consciousness between wakefulness and sleep known as hypnagogia. This state is characterized by vivid hallucinations and microdreams, and as the MIT researchers demonstrated, the contents of these microdreams can be manipulated with the system and subsequently result in heightened creativity when the user awakes. Motherboard got the exclusive details on the system.

Read more of this story at Slashdot.

Jimmy Fallon: Helping the world love robots!

thingscyber.com - If you enjoy watching and learning about cool new robots you are not alone. Millions watch great robotic videos on YouTube and now, thanks to Jimmy Fallon, they are taking over your TV as well. Fallo…


Tweeted by @TheCyberThreat https://twitter.com/TheCyberThreat/status/987990960876367872

Senior Systems Engineer Electronic Warfare (Cyber / RF / SIGINT) – Fort Wayne, IN, 46808 @ GetComputerHardwareEngineeringJobs.com

getcomputerhardwareengineeringjobs.com - Your job: Senior Systems Engineer Electronic Warfare (Cyber / RF / SIGINT) Senior Systems Engineer Electronic Warfare (Cyber / RF / SIGINT) Requisition ID108218BR Date updated12/26/2017 Raytheon Spac…


Tweeted by @GetCoHaEngiJobs https://twitter.com/GetCoHaEngiJobs/status/987745626099200001

Counter Intelligence – Demonfuzz Records

redbullradio.com - That would be the the James Brown-penned and -produced Lyn Collins song “Think (About it)”, which has been sampled on more than 2,000 tracks, making it the third most-sampled track of all time.


Tweeted by @redbull_radio https://twitter.com/redbull_radio/status/987584267826925568

Cyber Analyst – IT Job Pro

itjobpro.com - 100723BR Cyber Analyst TX – Dallas 100723BR Raytheon Intelligence and Information Services (IIS) – Cyber Security & Special Missions (CSM) – Raytheon Foreground Security (RFS) has an immediate openin…


Tweeted by @Dallas_Hiring https://twitter.com/Dallas_Hiring/status/987511004559888384

IQ, explained in 9 charts

vox.com - Nobody wants to be a number. But there is one number that probably says a lot about you, whether you know it or not: your IQ, or intelligence quotient. (President Donald Trump recently bragged to For…


Tweeted by @benfrank76_ https://twitter.com/benfrank76_/status/987156811487657985

Where Does a SIEM Fit In?

recordedfuture.com - This is Recorded Future, inside threat intelligence for cybersecurity. Hello everyone, and welcome to episode 41 of the Recorded Future podcast. I’m Dave Bittner from the CyberWire. Thanks for joinin…


Tweeted by @RecordedFuture https://twitter.com/RecordedFuture/status/987051717018705924

What Is Computer Vision Syndrome?

Computer Vision Syndrome: Causes, Symptoms and Treatment

What is Computer Vision Syndrome?

With computers and other electronic devices becoming an integral part of our daily lives, many individuals end up watching computer screens, tablet, e-reader, and smartphones for prolonged or extended periods that can put a real strain on one’s eyes.

This digital eye strain falls under the heading ‘Computer Vision Syndrome (CVS)’. CVS has become more common these days as almost 50% to 90% of people work on computer screens for more than 3 to 4 hours a day. Not only working adults but even kids are affected due to use of tablets and computers at school if used for prolonged hours. However, CVS is a temporary condition that is caused due to concentrating on computer screen for too long.

What causes Computer Vision Syndrome?

There are a number of factors that contributes for CVS to develop. This could include lighting in the room, seating position, distance from the screen, glare and reflections on the monitor and surroundings, strain on the muscles of the eye due to work style, poor workstation setup or incorrect use of workstation, decreased blink rate or tear function, uncorrected spectacle power, inappropriate glasses for computer use, angle of the head, job nature and stress. Any one or all of the factors combine to cause an uncomfortable amount of strain on your eyes. Also, when one reaches around 40 years, the ability to concentrate on near and far objects starts going away, which is called as ‘presbyopia’ by eye doctors.

Symptoms of Computer Vision Syndrome

Regular use of computer can start having effects on your body including eyes, although there is no proof that it causes any long-term damage to the eyes. However, you may have experienced at least one of the common symptoms of CVS which include:

  • Headaches
  • Neck pain
  • Shoulder pain
  • Burning eyes
  • Dry, red eyes
  • Eye irritation
  • Light sensitivity
  • Double or blurred vision
  • Eye fatigue
  • Vertigo/Dizziness
  • Polypia
  • Difficulty in changing focus between far and near

If you experience any of the above problems, it is advisable to look into to avoid further damage to your eyes.

Treatment for Computer Vision Syndrome

A few simple changes can help prevent or reduce the risk of computer eye strain and other common symptoms of CVS:

  • Use proper lighting that is comfortable on your eyes, and prevents you from staring into glare on the computer screen. Adjust or add window blinds and get an anti-glare screen on your monitor. Position the computer screen to reduce reflections from windows or overhead lights. If the overhead fixtures are too bright, change light bulbs to a full spectrum light or a lower wattage light. Buy yourself a desk lamp with a moveable shade that casts light evenly over your desk.
  • Place your computer at least 20 inches away from your eyes. Adjust the monitor so that it is slightly below your eye level, about 20 to 28 inches away from your face. Adjust the screen settings to where they are comfortable, such as contract polarity, resolution, flicker, brightness, contrast, and font size.
  • Ensure that your chair is comfortable and has support for your neck and back. This will help you avoid neck and shoulder strain commonly associated with CVS.
  • Follow the 20-20-20 rule. Every 20 minutes, spend 20 seconds looking at something 20 feet away, that will give the overused muscles and computer eye strain a necessary time out. Blink often to keep your eyes moist, as blinking washes your eyes in naturally therapeutic tears. Use eye lubricants, if you have dry eyes to keep them moist.
  • If you wear glasses, purchase lenses with anti-reflective (AR) coating. AR coating reduces glare by minimizing the amount of light reflecting off the front and back surfaces of your eyeglass lenses.
  • Visit your eye doctor regularly for comprehensive eye exams and keep your prescriptions up to date. It could also be time to try a separate set of glasses while in front of a computer.

Disclaimer: Please note that this article should not be construed as a medical advice. This article is not intended to replace the recommendations of a medical professional.

The post What Is Computer Vision Syndrome? appeared first on TechWorm.

Drones and urban counter-terrorism

blueline.ca - Let’s start by picturing a busy Saturday market scene in a larger Western city: An unmarked panel van crashes through the “No Vehicles” barrier around the market square. It rams a stall, hits several…


Tweeted by @Blue_LineMag https://twitter.com/Blue_LineMag/status/986984494635896832

The Critical Need for Threat Intelligence

csoonline.com - Information sharing is one of the most critical elements of any security strategy. Without it, security has to be painted with abroad brush when literally anything is possible. Being able to compare …


Tweeted by @lnogueron https://twitter.com/lnogueron/status/986964374609801216

Integral Partners LLC | LinkedIn

linkedin.com - Integral Partners LLC is a cybersecurity consulting firm dedicated to helping customers define and implement information security solutions to enable their businesses in an environment of increasing …


Tweeted by @CyberSecUpdate https://twitter.com/CyberSecUpdate/status/986915977903292416

MIT Discovers Way To Mass-Produce Graphene In Large Sheets

New submitter Paige.Bennett writes: Up till now, graphene has been produced in small batches in labs. But MIT just found a way to mass-produce graphene in large sheets using a process that rolls out five centimeters of graphene each minute. The longest span so far was nearly four hours, which produced about 10 meters of graphene. According to MIT, here's how their conveyor belt system works: "The first spool unfurls a long strip of copper foil, less than one centimeter wide. When it enters the furnace, the foil is fed through first one tube and then another, in a 'split-zone' design. While the foil rolls through the first tube, it heats up to a certain ideal temperature, at which point it is ready to roll through the second tube, where the scientists pump in a specified ratio of methane and hydrogen gas, which are deposited onto the heated foil to produce graphene." The work has been published in the journal Materials and Interfaces.

Read more of this story at Slashdot.

The History of Cyber Warfare

online.lewisu.edu - Business demand for specialized knowledge in a growing digital world will continue to expand as new technology security concerns arise. Lewis University’s online M.S. in Computer Science with a conce…


Tweeted by @Lago72 https://twitter.com/Lago72/status/986750902487875585

DevOps Systems Engineer – IT Job Pro

itjobpro.com - Overview: This PRIME contract focuses on web-based GUI development, using newest and emerging technologies while supporting an extremely large user population across multiple mission areas. The work …


Tweeted by @ITJobs_MA https://twitter.com/ITJobs_MA/status/986563738927968256

Be ready for upcoming ‘cyber warfare’

aufsi.auburn.edu - Expect stepped-up ‘cyber warfare’: UK counter-terrorism expert Michael Clarke has urged the British public to be ready for “cyber warfare” within the next two or three weeks as Russia responds to Fri…


Tweeted by @AUFSI https://twitter.com/AUFSI/status/986319648324050949

Senior Systems Engineer Electronic Warfare (Cyber / RF / SIGINT), Fort Wayne, Indiana, United States –

jobs.telcoprofessionals.com - Senior Systems Engineer Electronic Warfare (Cyber / RF / SIGINT) Requisition ID108218BR Date updated12/26/2017 Raytheon Space and Airborne Systems (SAS) Systems Verification Center (SVC) is seeking s…


Tweeted by @telcoprofession https://twitter.com/telcoprofession/status/986290452134379520

Cloud Security Alliance Releases New Research: Building a Foundation for Successful Cyber Threat Intelligence Exchange – Cloud Security Alliance

cloudsecurityalliance.org - Paper offers key considerations for corporations seeking to collaborate on security incidents impacting the cloud environment SEATTLE, WA and SAN FRANCISCO, CA – RSA Conference Booth #1039 – April 16…


Tweeted by @cloudsa https://twitter.com/cloudsa/status/986147768031997955

Secureworks Innovates Its Advanced Endpoint Threat Detection Solution, Powered By Red CloakTM Technology, to Include Active Threat Hunting

sectorpublishingintelligence.co.uk - World News: 17:05 GMT Monday 16th April 2018. [Secureworks via Businesswire via SPi World News] Secureworks® (NASDAQ: SCWX), a leading global cybersecurity company that protects organizations in the …


Tweeted by @NewsFromSPI https://twitter.com/NewsFromSPI/status/985912489341792256

Secureworks : Innovates Its Advanced Endpoint Threat Detection Solution, Powered By Red CloakTM Technology, to Include Active Threat Hunting | 4-Traders

4-traders.com - Secureworks® (NASDAQ: SCWX), a leading global cybersecurity company that protects organizations in the digitally connected world, today announced a new service level for its Advanced Endpoint Threat …


Tweeted by @ForTraders https://twitter.com/ForTraders/status/985912209602686977

Wild Minds Wanted – EcoHustler

ecohustler.co.uk - By Matt Mellen, first published on Plant Based News – here Could we measure the IQ of the entire planet? One way might be to establish the intelligence of each living being on Earth and then calculat…


Tweeted by @EcoHustler https://twitter.com/EcoHustler/status/985892346641469442

Cloud Security Alliance Releases New Research: Building a Foundation for Successful Cyber Threat Intelligence Exchange

prnewswire.com - Authored by the CSA Cloud Cyber Incident Sharing Center (CISC) Working Group, the report was written primarily for corporations beginning to explore—or that have already begun—the exchange of cyber s…


Tweeted by @darkisdarkn1 https://twitter.com/darkisdarkn1/status/985878547456765952

David Sanger: Covering Cyberwar: A New Weapon, a New Era of Conflict, and the Government Secrecy Around It – Shorenstein Center

shorensteincenter.org - March 3, 2015 — David E. Sanger, national security correspondent at The New York Times, discussed key developments and considerations for covering cyberwar and cyberattacks. Cyberwar is “a non-tradit…


Tweeted by @dj1of2 https://twitter.com/dj1of2/status/985854642805460993

The Scientific Paper Is Obsolete

James Somers, writing for The Atlantic: The scientific paper -- the actual form of it -- was one of the enabling inventions of modernity. Before it was developed in the 1600s, results were communicated privately in letters, ephemerally in lectures, or all at once in books. There was no public forum for incremental advances. By making room for reports of single experiments or minor technical advances, journals made the chaos of science accretive. Scientists from that point forward became like the social insects: They made their progress steadily, as a buzzing mass. The earliest papers were in some ways more readable than papers are today. They were less specialized, more direct, shorter, and far less formal. Calculus had only just been invented. Entire data sets could fit in a table on a single page. What little "computation" contributed to the results was done by hand and could be verified in the same way. The more sophisticated science becomes, the harder it is to communicate results. Papers today are longer than ever and full of jargon and symbols. They depend on chains of computer programs that generate data, and clean up data, and plot data, and run statistical models on data. These programs tend to be both so sloppily written and so central to the results that it's contributed to a replication crisis, or put another way, a failure of the paper to perform its most basic task: to report what you've actually discovered, clearly enough that someone else can discover it for themselves.

Read more of this story at Slashdot.

Conspiracy Theorists Believe That Nibiru Will End The World On April 23

Nibiru: Will the world end in April 2018?

Predictions regarding the extinction of humanity, or huge collapse of civilization, the destruction of the planet or even the universe has been going on as long as mankind has walked the Earth.

Now, conspiracy theorists have come up with fresh fears that the world will end as early as April 23, as a giant mysterious death star “Nibiru” also known as Planet X, is set to cause destruction across the Earth. Nibiru is supposed to be a large object that is on a collision course with Earth.

David Meade, a Christian numerologist and who writes for Planet X News told the Daily Express newspaper that the occurrence of an apocalypse on April 23 will ultimately destroy our Earth. It is claimed that the Sun, Moon and Jupiter will align in the constellation Virgo, igniting the beginning of the biblical Rapture, which is also known as the second coming of Jesus Christ.

Conspiracy theorists say a passage in the bible from the book of Revelation 12:1-2 points to the end of the world. Astrological constellations are said to match up with passage 12:1-2 of the Book of Revelations, which reads: “And a great sign appeared in heaven: a woman clothed with the sun, with the moon under her feet, and on her head a crown of 12 stars. She was pregnant and was crying out in birth pains and the agony of giving birth.”

The woman in the passage is believed to be Virgo, where the Sun and Moon are claimed to align, along with the Jupiter, which represents the Messiah, that matches the planetary alignment due to take place on April 23, theorists say.

Meade believes that on that night, Nibiru or Planet X will suddenly appear in the sky and may collide with our Earth or may fly very close to Earth that will bring finally bring destruction on our planet in the form of massive volcanic eruptions, earthquakes, and tsunamis on Earth.

Meade has referred to this spring as an “end of days convergence.”

Responding to the latest claims, pessimists say that this type of particular astrological alignment happens every 12 years, but Meade believes it otherwise.

He says: “By early April of 2018, the disappearance of the Church (all true Christians worldwide also known as the Rapture) will occur.

“This will be followed quickly by the rise of the Antichrist, the appearance of Planet X and World War III.

“Seven years of Tribulation will ensure. This is beyond any shadow of doubt.”

He also said that the upcoming planetary alignment is a “unique once-in-a-century sign”.

He added: “During this time frame, on April 23, 2018 the moon appears under the feet of the Constellation Virgo.

“The Sun appears to precisely clothe Virgo… Jupiter is birthed on April 08, 2018.

“The 12 stars at that date include the nine stars of Leo, and the three planetary alignments of Mercury, Venus and Mars – which combine to make a count of 12 stars on the head of Virgo.

“Thus the constellations Virgo, Leo and Serpens-Ophiuchus represent a unique once-in-a-century sign exactly as depicted in the 12th chapter of Revelation. This is our time marker.”

Before you start to panic, please note that Meade and fellow doomsday foretellers have in the past incorrectly predicted the end of the world. NASA experts has dismissed the theory calling it a hoax. It has also said repeatedly that Nibiru does not exist and released a statement to confirm it wasn’t true.

The statement read: “Various people are ‘predicting’ that world will end on September 23 when another planet collides with Earth. The planet in question, Nibiru, doesn’t exist, so there will be no collision,” the space agency said.

“Nibiru and other stories about wayward planets are an internet hoax.

“There is no factual basis for these claims. If Nibiru or Planet X were real and headed for an encounter with the Earth astronomers would have been tracking it for at least the past decade, and it would be visible by now to the naked eye.

“Obviously, it does not exist.”

The post Conspiracy Theorists Believe That Nibiru Will End The World On April 23 appeared first on TechWorm.

Cyber Systems Engineer 5 – IT Job Pro

itjobpro.com - The Thread Team is responsible for receiving requirements for disparate data formats and transforming that data into corporate compliant data formats. The Thread Team also drives modernization of dat…


Tweeted by @scrum_job https://twitter.com/scrum_job/status/985511073955524608

A simple guide to TSCM Sweeps | What is TSCM?

international-intelligence.co.uk - “Sometimes it really is as simple as placing a Dictaphone on voice activation for later retrieval.” Since the mid 2000's and the rise of internet usage there has been a large increase in “off the she…


Tweeted by @IntIntelligence https://twitter.com/IntIntelligence/status/985481768055791617

Coin Miner Reports Outrank Ransomware by Two Orders of Magnitude, According to Bitdefender Telemetry

businessinsights.bitdefender.com - While the common belief is that only endpoints are facing this mounting threat, threat actors in need of increased computing power and resources have been gunning for data center, as they are more lu…


Tweeted by @Bitdefender_Ent https://twitter.com/Bitdefender_Ent/status/984851794483265536

Late To Bed, Early To Die? Night Owls May Die Sooner

An anonymous reader shares a report: Bad news for "night owls": Those who tend to stay up late and sleep in well past sunrise are at increased risk of early death, a new study from the United Kingdom suggests. The research, which involved nearly half a million people, found that self-described "evening people" were 10 percent more likely to die over a 6.5-year period, compared with self-described morning people. The findings add to a growing body of research that suggests that being a night owl could have negative effects on health. Many of these effects may be attributable to a misalignment between a person's internal clock, or circadian rhythm, and the socially imposed timing of work and other activities, the researchers said. "'Night owls' trying to live in a 'morning lark' world may have health consequences for their bodies," study co-author Kristen Knutson, an associate professor of neurology at Northwestern University Feinberg School of Medicine, said in a statement.

Read more of this story at Slashdot.

Technology

gisp-group.com - It talks about the new gadgets released, the new technologies that have emerged in the market, and several fields where technology has helped businesses to trade profitably. Technology is used in agr…


Tweeted by @gisp_group https://twitter.com/gisp_group/status/984394629670780929

Association of Old Crows

crows.org - This webinar examines the concepts in mode design for airborne, tactical multi-mode fire-control radar systems and the signal processing used for target acquisition, tracking and surveillance. The ne…


Tweeted by @WinningImagesJC https://twitter.com/WinningImagesJC/status/984072254052069376

How to apply big data to cybersecurity

punchng.com - Information and business data are among the most valuable assets of any company. Entrepreneurs are increasingly cognisant of the importance of such data for their success in the current market econom…


Tweeted by @_FarooqUmar https://twitter.com/_FarooqUmar/status/984054718904389632

Arabian Aerospace – Inzpiring Jordan

arabianaerospace.aero - In 2013, British company Inzpire, which supplies defence managed services and cutting-edge technological solutions, delivered its first GECO (Air) tablet-based mission system to the RJAF. It came wit…


Tweeted by @ArabianAeroNews https://twitter.com/ArabianAeroNews/status/984023243844669441

Ministerie: neem alleen ‘lege’ laptop en telefoon mee naar China, Rusland, Iran en Turkije – Buitenland – Voor nieuws, achtergronden en columns

volkskrant.nl - Ondernemers wordt verder sterk aangeraden hun Nederlandse telefoon überhaupt niet aan te zetten in China, maar in plaats daarvan een lokaal mobieltje met een prepaidkaart te kopen, die bij vertrek w…


Tweeted by @mattchik https://twitter.com/mattchik/status/983640967604469760

Big Data and Cyber Espionage

bbntimes.com - While big data is empowering business decisions with information abundance, cyber espionage is on the rise too! Ever saw your computer’s cursor move on your screen automatically? While you safely ass…


Tweeted by @armaninspace https://twitter.com/armaninspace/status/983536695655223296

Nocookies

theaustralian.com.au - A NOTE ABOUT RELEVANT ADVERTISING: We collect information about the content (including ads) you use across this site and use it to make both advertising and content more relevant to you on our networ…


Tweeted by @BartHoogeveen https://twitter.com/BartHoogeveen/status/983493844757987329

AI is no silver bullet but it is the next step

gulfnews.com - Despite the advancements in AI, industry experts said that the both sides (solutions providers and bad guys) will continue to innovate and find more creative ways to win. “Yes. AI is no silver bullet…


Tweeted by @evolutionshift https://twitter.com/evolutionshift/status/983123742552309761

Scientists Discover That Puffin Beaks Are Fluorescent

A scientist in England discovered that the bills of Atlantic puffins glow like freshly cracked glow sticks when under a UV light. CBC.ca reports of how ornithologist Jamie Dunning stumbled upon the discovery: Dunning normally works with twites, another type of bird, but he had been wondering if puffins had Day-Glo beaks for a while, since crested auklets -- seabirds in the same family -- also have light-up bills. So one January day, while having a "troubling" time in the lab, he threw off the lights and shone a UV light on a puffin carcass. "What happened was quite impressive, really," he said. The two yellow ridges on the puffin's bill -- called the lamella and the cere -- lit up like a firefly. And it's real fluorescence, Dunning emphasizes: something about those parts of the puffin bill is allowing that UV light to be absorbed and re-emitted as a bright glowing light. The fact some birds have this quality and some birds don't indicates the fluorescence certainly has some use for the puffins, Dunning said, but he's not sure what that use might be. "The bill of a puffin is forged by generations, hundreds and thousands of years, of sexual selection. There's a lot going on there. That's why it's so colorful and pretty." But the radiant color is almost certainly not being used as a headlight, he said. He said whatever's making the beak glow is reacting with the UV light waves, and those light waves aren't around in the dark.

Read more of this story at Slashdot.

Robots and Robotics: What you need to know

thingscyber.com - Operating along a spectrum of human controlled to semi-autonomous to totally independent, robots are already operating in our world. They save lives in hospitals, are taking the place of humans in da…


Tweeted by @TheCyberThreat https://twitter.com/TheCyberThreat/status/982881237223092224

OASIS Cyber Threat Intelligence (CTI) TC

oasis-open.org - Supporting automated information sharing for cybersecurity situational awareness, real-time network defense, and sophisticated threat analysis Richard Struse, rjs@mitre.org, Chair Jane Ginn, jg@ctin.…


Tweeted by @tkudos https://twitter.com/tkudos/status/982807699191574529

ITE534 Cyberwarfare and Terrorism (8)

csu.edu.au - The information contained in the 2018 CSU Handbook was accurate at the date of publication: 06 April 2018. The University reserves the right to vary the information at any time without notice.


Tweeted by @cyberwar https://twitter.com/cyberwar/status/982770382431285248

Future of War Conference 2018

newamerica.org - Dr. Michael D. Griffin is the Under Secretary of Defense for Research and Engineering. He is the Department’s Chief Technology Officer, and is responsible for the research, development, and prototypi…


Tweeted by @NewAmerica https://twitter.com/NewAmerica/status/982619655427719169

Cyber Intelligence Planner – IT Job Pro

itjobpro.com - Global Information Grid (GIG) Service Management-Operations (GSM-O), a Defense and Intelligence Group of Leidos has an opening for a Cyber Intel Planner at JFHQ-DODIN at Ft. Meade, MD. EDUCATION & EX…


Tweeted by @hire_Kansas https://twitter.com/hire_Kansas/status/982595849405345792

CEP Demands Immediate Action To Combat Fake News

counterextremism.com - New York, NY – In advance of the upcoming Senate and House committee hearings featuring testimony from Facebook CEO Mark Zuckerberg, the Counter Extremism Project (CEP) today called on Facebook and o…


Tweeted by @FightExtremism https://twitter.com/FightExtremism/status/982331433686466560

Trade Secret Theft by Cyber Espionage

gttb.com - As breaches continue to make headlines, it’s apparent that monies and time spent on cybersecurity projects are not delivering the desired results. So how does one build an effective DLP program that…


Tweeted by @gtbtechnologies https://twitter.com/gtbtechnologies/status/982328051022184448

Counter Intelligence – Granite & Marble Works

graniteandmarbleworks.com - There are many advantages to using natural stone in place of synthetic materials such as Corian, Formica, porcelain, or ceramic tile. Origin: Synthetic or manufactured solid surface countertops are m…


Tweeted by @GraniteMarbleNY https://twitter.com/GraniteMarbleNY/status/982317819562885120

Business Intelligence Engineer – IT Job Pro

itjobpro.com - A2Z Development Center, Inc. and Amazon.com Services, Inc. seeks candidates for the following position (multiple positions available for each title): Business Intelligence Engineer, Job Code AZ0136: …


Tweeted by @click_counter https://twitter.com/click_counter/status/982260157773037570

Cyber Security on Naval Platforms

indiandefencereview.com - The world recently has faced several cyber-attacks called WanaCrypt or WanaCry, hitting more than 150 countries in mid-May 2017.They did not only disturbed general operations but also hindered and di…


Tweeted by @asilentsoldier https://twitter.com/asilentsoldier/status/982192013591236608

Humans Produce New Brain Cells Throughout Their Lives, Say Researchers

An anonymous reader shares a report: Humans continue to produce new neurons in a part of their brain involved in learning, memory and emotion throughout adulthood, scientists have revealed, countering previous theories that production stopped after adolescence. The findings could help in developing treatments for neurological conditions such as dementia. Many new neurons are produced in the hippocampus in babies, but it has been a matter of hot debate whether this continues into adulthood -- and if so, whether this rate drops with age as seen in mice and nonhuman primates. Although some research had found new neurons in the hippocampus of older humans, a recent study scotched the idea, claiming that new neurons in the hippocampus were at undetectable levels by our late teens.

Read more of this story at Slashdot.

Biometric credit card technology – An Overview

Of late there are several companies that are making use of technology to prevent plastic card related fraudulent activities by making use of the concept of biometric fingerprint activated debit and credit cards.

Companies like SmartMetric, Zwipe, and Visa have taken the initiative. It is being said that biometric fingerprint technology has the ability to change the scenario of the manner in which card payments are made worldwide thereby restricting fraudsters to carry out their horrendous activities.

However, there is an important implication in this. This concept can be applied for preventing fraud at that takes place at POS or Point of Sale. However, experts emphasize that preventing fraud at POS is just not enough; it has to be also effective for CNP or Card-not-present transactions.

Statistical data

The Nilson Report states that in the year 2014 alone, the losses incurred on credit card fraud amounted to a whopping USD$16.31 billion across the globe. And interestingly, United States alone suffered losses worth USD$7.86 billion. The type of fraud that caused the loss in figures includes losses from card-not-present transactions, stolen cards, lost cards, and counterfeiting. And what is even more striking is that experts still predict that fraudulent activity related to plastic cards (debit as well as credit cards) will amount to a loss worth more than USD$35.54 billion by the year 2020.

To counteract the fraudulent activities, MasterCard came into a contract with Zwipe in the year 2014 and the world’s first biometric contactless payment card was launched. It had fingerprint sensor that was integrated. Soon companies like Visa followed suit and its designs were based entirely on Visa (EVM) chip standard, MasterCard, and EuroPay. The aforesaid cards work on the principle of “match-on-card” authentication and makes use of biometric readers at the terminals (ATM).

Aside from the above, SmartMetric came up with EMV compliant biometric plastic card, which makes use of a built-in fingerprint reader inside the card, which enables to identify the identity of the cardholder.

Banking sector opt for prevention methods for credit card frauds

The small chip that you get to see on your plastic cards is the first line of defense when it comes to preventing credit card fraud. In fact banks are carrying out experiments to improve upon means of combating plastic card frauds. In fact, fingerprint scanners are also being tested by banks.

Concept of Motion Code

The concept of Motion code has been found to fight credit card fraud in a totally new manner. In this the CVV number that is on the reverse side of the cards is nothing but a display that is mainly digital in nature.

The fact that the number is constantly changing makes it impossible for anyone to use the number for fraudulent transactions. If at all anyone tries to misuse it, he won’t be able to.

Samsung Pay, Android Pay, and Apple Pay refrain from sending the actual or so called real plastic card numbers to the merchants. Instead they make use of so called one-time code that prevents your original digits from being transmitted to the merchants.

It has been observed that so called “fingerprint validation technology” is effective even in case of smartphone digital wallets as in Apple Pay. However, there is one hitch and that is this concept does not work well with the older phones. And for this reason every effort is being made so that the older phones can be made compatible with appropriate biometric verification tools thereby curbing the incidence of CNP or card-not-present transactions. Other options that are being tried out for preventing credit card frauds are voice recognition and facial recognition. And it is being apprehended that it is not too far when these technologies will be implemented too.

The post Biometric credit card technology – An Overview appeared first on TechWorm.

Robot Lures Industrial Hackers to Help ID Them

news.thomasnet.com - Hey, hackers: The Georgia Institute of Technology wants you to know that your attempts at industrial espionage will not be taken lying down. You just might not realize you’re being attacked back when…


Tweeted by @roxannetoronto https://twitter.com/roxannetoronto/status/981928685048655874