‘Zeno effect’ verified, Heisenberg uncertainty principle controlled: Atoms won’t move while you watch

The researchers observed the atoms under a microscope by illuminating them with a separate imaging laser. A light microscope can’t see individual atoms, but the imaging laser causes them to fluoresce, and the microscope captured the flashes of light. When the imaging laser was off, or turned on only dimly, the atoms tunneled freely. But Read more about ‘Zeno effect’ verified, Heisenberg uncertainty principle controlled: Atoms won’t move while you watch[…]

Mimic, the Evil Script That Will Drive Programmers To Insanity

Mimic implements a devilishly sick idea floated on Twitter by Peter Ritchie: “Replace a semicolon (;) with a Greek question mark (;) in your friend’s C# code and watch them pull their hair out over the syntax error.” There are quite a few characters in the Unicode character set that look, to some extent or Read more about Mimic, the Evil Script That Will Drive Programmers To Insanity[…]

Galaxies formed just after Big Bang viewed

Observations by the NASA/ESA Hubble Space Telescope have taken advantage of gravitational lensing to reveal the largest sample of the faintest and earliest known galaxies in the Universe. Some of these galaxies formed just 600 million years after the Big Bang and are fainter than any other galaxy yet uncovered by Hubble. The team has Read more about Galaxies formed just after Big Bang viewed[…]

Let’s Encrypt is Trusted by browsers

Let’s Encrypt has received cross-signatures from IdenTrust, which means that our certificates are now trusted by all major browsers. This is a significant milestone since it means that visitors to websites using Let’s Encrypt certificates can enjoy a secure browsing experience with no special configuration required. Source: Let’s Encrypt is Trusted Let’s Encrypt wants to Read more about Let’s Encrypt is Trusted by browsers[…]

Tattling Kettles Help Researchers Crack WiFi Networks In London

Security researchers at Pen Test Partners have found a security vulnerability in the iKettle Wi-Fi Electric Kettle that allows attackers to crack the password of the WiFi network to which the kettle is connected. Researchers say that using this simple trick and information about iKettles, they drove around London, cracked home WiFi networks, and created Read more about Tattling Kettles Help Researchers Crack WiFi Networks In London[…]

Hackers Can Use Radio Waves to Hijack Androids and iPhones via Siri and Google Now

This rig is able to send radio waves at an iPhone or Android with its headphones still plugged in, using the headphone cable as a receiver that picks up the radio signals and relays them to the operating system’s voice recognition software. Source: Hackers Can Use Radio Waves to Hijack Androids and iPhones via Siri Read more about Hackers Can Use Radio Waves to Hijack Androids and iPhones via Siri and Google Now[…]

Cops are asking Ancestry.com and 23andMe for their customers’ DNA

When companies like Ancestry.com and 23andMe first invited people to send in their DNA for genealogy tracing and medical diagnostic tests, privacy advocates warned about the creation of giant genetic databases that might one day be used against participants by law enforcement. Source: Cops are asking Ancestry.com and 23andMe for their customers’ DNA So, people Read more about Cops are asking Ancestry.com and 23andMe for their customers’ DNA[…]

Lockheed fires green lasers from business jets

Lockheed Martin claims to have overcome a major obstacle to shooting high-power laser weapons from high-speed aircraft, saying it has successfully completed 60 Aero-adaptive Aero-optic Beam Control (ABC) laser turret flight tests over the past year. The turret uses a green, low-power laser to measure the system’s effectiveness at jet cruise speeds and at different Read more about Lockheed fires green lasers from business jets[…]

Computer uses algorithms to decide what relationships to study in big data sets, outperforms humans

MIT researchers aim to take the human element out of big-data analysis, with a new system that not only searches for patterns but designs the feature set, too. To test the first prototype of their system, they enrolled it in three data science competitions, in which it competed against human teams to find predictive patterns Read more about Computer uses algorithms to decide what relationships to study in big data sets, outperforms humans[…]

Jackpot: New hacking group steals 150,000 credit cards from casino

Flat, firewall-free network was a walk in the park, boffins say.[…]They say the casino lacked even basic firewalls around its payment platforms and did not have logging. “It was a very flat network, single domain, with very limited access controls for access to payment systems,” Emmanuel Jean-Georges told the Cyber Defence Summit (formerly Mircon) in Read more about Jackpot: New hacking group steals 150,000 credit cards from casino[…]

Dow Jones hacked for 3 years, 3500 of 1%ers data taken

“It appears that the focus was to obtain contact information such as names, addresses, email addresses and phone numbers of current and former subscribers in order to send fraudulent solicitations.”[…]“As part of the investigation to date, we also determined that payment card and contact information for fewer than 3,500 individuals could have been accessed, although Read more about Dow Jones hacked for 3 years, 3500 of 1%ers data taken[…]

Microsoft now uses Windows 10’s Start menu to display ads

We’ve all become used to the idea of ads online — it’s something that has become part and parcel of using the internet — but in Windows? If you’ve updated to build 10565 of Windows 10, you’re in for something of a surprise: the Start menu is now being used to display ads. Source: Microsoft Read more about Microsoft now uses Windows 10’s Start menu to display ads[…]

To make persuasive political arguments, couple your argument to the opposing moral values

Stanford sociologist Robb Willer finds that an effective way to persuade people in politics is to reframe arguments to appeal to the moral values of those holding opposing positions.[…]Conservative participants were ultimately persuaded by a patriotism-based argument that “same-sex couples are proud and patriotic Americans … [who] contribute to the American economy and society.”[…]”Moral reframing Read more about To make persuasive political arguments, couple your argument to the opposing moral values[…]

Dridex banking malware steals GBP 20m +

Dridex, which seeks to harvest users’ banking credentials, apparently originates with what the NCA’s release describes as ‘technically skilled cyber criminals in Eastern Europe’, and is said to target both individuals and consumers alike. Losses in the UK to the attacks are currently estimated at £20mn. Source: FBI and NCA join forces against Dridex banking Read more about Dridex banking malware steals GBP 20m +[…]

Tallinn Manual 2.0 to Be Completed in 2016 | lawyers talking about hackers and calling them mercenaries with no recourse to Geneva conventions

Top legal experts met this week in Estonia for a drafting session of the substantially expanded and updated edition of the handbook on applicability of international law to the cyber realm. […] The Tallinn Manual process is funded, hosted and facilitated by the NATO Cooperative Cyber Defence Centre of Excellence. Source: Tallinn Manual 2.0 to Read more about Tallinn Manual 2.0 to Be Completed in 2016 | lawyers talking about hackers and calling them mercenaries with no recourse to Geneva conventions[…]