Saturday, June 9, 2012

'Tooth Tattoo' That Could Save Your Life



A 'tooth tattoo' made from silk strands and gold wires could be used to detect life-threatening illnesses, researchers have said.

The tiny wireless device sticks to dental enamel and transmits real-time updates on chemicals in the breath and saliva.

Engineers at Princeton University in America have used it to detect bacteria that causes surgical infections and stomach ulcers, and say it could also be used to recognise viruses.

The sensor is in the early stages of development, but the university’s researchers say it could one day be used to monitor human health with unprecedented accuracy.

During a demonstration, a volunteer breathed across a prototype sensor attached to a cow’s tooth.
It generated an instant response which was sent to a nearby monitor.

"The antenna coil is what transmits the signal," said Michael McAlpine, the team's principal investigator, “you don't need a battery."

Details of the invention were reported in the medical journal Nature Communications.
The researchers created the device by bundling the silk and gold with graphene - an extremely thin sheet of carbon.

Yet despite its complexity, it can be applied to a tooth's surface with water "like a child's transfer tattoo", the university said.

The sensor is currently too big to fit onto a human tooth, and needs further work to scale it down.
The team also plans to improve the sensor so that it can withstand eating and brushing over a long period of time.

"Ideally, you want something that would be there for a while. We have a way to go before we could master that," Mr McAlpine said.

Friday, June 8, 2012

“Whopping” number of earthquakes shake around Hawaii volcano“

HAWAII VOLCANOES NATIONAL PARK, Hawaii: A large number of earthquakes has been rattling the Volcano area on Hawaii Island over the last few days. The quakes have been small, with no damage reported. Still, a handful of those temblors have been 3.0 magnitude and over.

The USGS Hawaiian Volcano Observatory’s “Recent Earthquakes in Hawaii” page shows a constant swarm of quakes surrounding the Hawaii Volcanoes National Park, home of the active Kilauea Volcano. We took a screen grab of the screen of the USGS HVO earthquake page, and it shows the long list stretching all the way back to Friday, June 1st.

16 earthquakes have already registered on the list before noon on Tuesday, Hawaii time.

On Tuesday, the HVO staff makes mention of the quakes on their Kilauea volcano update page:

The GPS network recorded weak extension overall for the past few months with superimposed contraction and extension fluctuations corresponding to DI tilt events. Seismic tremor levels were generally low, decreasing from a peak around 11 am Sunday. A whopping thirty-three earthquakes were strong enough to be located beneath Kilauea volcano: 4 deep earthquakes below the southwest rift zone, 3 beneath the west edge of the summit area, 7 within and below the upper east rift, 1 north of the middle east rift zone, 7 on south flank faults, and 11 mostly shallow long-period (LP) earthquakes within the Koa`e Fault Zone beneath the Kulanaokuaiki Camp Ground; a quick check this morning showed no obvious new cracking on the surface near the campground.

The rise of the Kilauea summit lava lake level in Halemaumau crater continued with several overflows of the inner ledge. At Pu`u `O`o, scientists report lava also rose within the east collapse pit; to the southeast, lava flows continued to advance on the coastal plain.

World's largest biometric database


In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should identify them everywhere and to everyone.

This is only the beginning, and the goal is to do the same with the entire population (1.2 billion), so that poorer Indians can finally prove their existence and identity when needed for getting documents, getting help from the government, and opening bank and other accounts.

This immense task needs a database that can contain over 12 billion fingerprints, 1.2 billion photographs, and 2.4 billion iris scans, can be queried from diverse devices connected to the Internet, and can return accurate results in an extremely short time.

The program - dubbed UIDAI - is lead by techno tycoon Nandan Nilekani, and is already a big success, as its effectiveness has been proved by a number of trials that allowed citizens to open bank accounts electronically, receive payments from the government directly into them, and withdrawing the money from them by authenticating themselves on a slew of simple devices.

According to BBC's Saritha Rai, the database in question has an open source backbone, and it's not locked into any specific hardware or software. The collected information - stored in a data centre in Bangalore - is secured by multiple layers of security, and it is transmitted to and from the database in encrypted form.

The 12-digit number each individual is assigned is unique and random, so it can't be guessed. And the combination of photo, fingerprints of all ten hand fingers and iris scans of both eyes makes it practically impossible for someone not to get identified or to get identified as another person, especially after the three planned de-duplication checks are executed.

Using the latest biometric, cloud computing and connection technologies, this program is likely to become a great example for future ones dealing with even larger databases.

Password Theft: Hacking Probe At LinkedIn



Millions of users of the social networking website LinkedIn have been told to reset their passwords after security information was stolen.

The site, which is aimed at professionals and has in excess of 161 million members in more than 200 countries, was compromised and members' details were posted online.

LinkedIn director Vicente Silveira said in a statement: "We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts."

He said the company was investigating the security breach and added that those who were affected will notice their LinkedIn passwords will no longer be valid.

It is thought the passwords of more than 6.5 million people were stolen.

Mr Silveira said: "Members that have accounts associated with the compromised passwords will notice that their LinkedIn account password is no longer valid.

"These members will also receive an email from LinkedIn with instructions on how to reset their passwords."

Users were told they should never change their passwords by following a link sent on an email.
"These affected members will receive a second email from our customer support team providing a bit more context on this situation and why they are being asked to change their passwords," Mr Silveira added.

IT security and data protection firm Sophos said the leaked encrypted data does not include associated email addresses but warned that hackers will be working to crack the "unsalted" password hashes and "it is reasonable to assume that such information may be in the hands of the criminals".

Graham Cluley, senior technology consultant at Sophos, said: "It would seem sensible to suggest to all LinkedIn users that they change their passwords as soon as possible as a precautionary step."

Mr Silveira said LinkedIn had recently improved its security, which included the "hashing and salting" of current password databases.

California-based LinkedIn launched in 2003 and made its stock market debut in May 2011 in the hope of raising money for expansion.

LinkedIn gets more than two-thirds of its revenue from fees it charges companies, recruiting services and other people who want broader access to the profiles and other data on the company's website. The rest comes from advertising.

Latest viruses could mean ‘end of world as we know it,’ says man who discovered Flame


Eugene Kaspersky: We’re at the mercy of cyberterrorists, armed with weapons more serious than any previous IT security threat

By David Shamah

The Flame virus, whose existence was announced several weeks ago by Eugene Kaspersky, is not just any old virus. It’s so sophisticated that it represents a new level of cyber threat, one that could be “the beginning of the end of the [interconnected] world as we know it,” Kaspersky said at a press conference Wednesday. “I have nightmares about it.”

Information security expert Kaspersky, whose team of researchers uncovered Flame’s existence, was a featured speaker at Wednesday’s second annual cyber-security conference sponsored by the Tel Aviv University’s Yuval Ne’eman Workshop for Science, Technology and Security. The conference comes at a time when interest in cybersecurity is at a peak, as a result of speculation about who was behind the Flame attack and the earlier Stuxnet virus attack that is thought to have damaged, or at least delayed, progress by Iran on its nuclear program.

Also speaking at the conference were a host of top security and government officials, including Defense Minister Ehud Barak, Israel Space Agency chairman Yitzhak Ben-Yisrael, former Shin Bet director Yuval Diskin, and others.

While many companies — including Kaspersky’s — advertise sundry solutions for computer viruses and Trojans, they won’t help when it comes to Flame and other still undiscovered viruses of similar or even greater strength that are likely out there, he said. “Right now we have no way to defend against these global attacks.”

The term “cyber-war” is used by many to describe the situation, but that term — which implies that there are two equal, known enemies duking it out — is outmoded, he said. “With today’s attacks, you are clueless about who did it or when they will strike again. It’s not cyber-war, but cyberterrorism.”

Flame, which has stealthily stolen large chunks of data during the months or perhaps years it has been on the loose, is especially scary because of its many sophisticated tools, said Kaspersky. Besides being able to quickly replicate itself on networks and break up data into very small segments, making it almost impossible to trace as it is sent onwards, the virus has many unique features. “It can of course be spread very quickly via a disk-on-key, when one is plugged into a network,” but in addition, it can use bluetooth, wifi, and other communications protocols to propagate, he said.

The Russian-born Kaspersky, 46, whose company is the world’s largest privately held vendor of software security products, described the process by which his team discovered Flame, saying that he got interested in the matter when he heard that Iran had actually accused his company of designing the attack tool. “We thought that maybe our internal system was compromised, so we conducted a thorough investigation.”

It was this investigation, which entailed contacts with IT personnel in Iran itself, that yielded the data on Flame. “Dealing with what we discovered was too big a job for a company,” so Kaspersky took what he knew to the UN’s International Telecommunications Union, which was just as shocked as he was. “We worked out an arrangement where we would gather the data, and they would take care of the other issues.”

Data-gathering is a technical issue, not a political one, Kaspersky said, so he could not speculate on who invented Flame, or why. But anyone and everyone is a suspect. “There are many countries with hackers and experts who are sophisticated enough to pull something like this off.”

The US, Israel, China, and Russia are on that list, but so is Romania, “which has many talented hackers.”

But even countries without a staff of their own could kidnap the scientists they need or hire “hacktivists” to do their dirty work, and there is no shortage of willing and capable people, Kaspersky said.

Still, any country thinking of stockpiling cyber-weapons of these magnitudes should think twice, Kaspersky said, as they have a way of getting out of control.

“It’s like biological weapons; when you set one off in one place, it affects many others.” Cyber-weapons of the magnitude of Flame are just as destructive. “The world is just so interconnected today, and the viruses that attack one power plant puts them all at risk,” Kaspersky said.

Governments must work together to, for example, order a complete rewrite of software for essential systems to protect them against attacks — “there are still many systems out there using MS-DOS,” Kaspersky said — to agreeing to pool information and act jointly when an attack occurs.

The alternative, Kaspersky said, is a world in which cyberterrorists have a free hand – something like the world in the movie Die Hard 4 (also known as Live Free or Die Hard). That movie’s plot involves hackers causing blackouts, blowing up government buildings, and trying to shut down America’s computer system.

“We at Kaspersky Labs have been aware for a long time that such a scenario was possible, but until that movie came out in 2007, we forbade anyone inside the organization from using the term ‘cyber-terrorist.’ Now that the cat is out of the bag, we routinely use that word to describe what is going on.”

He, and other researchers like him, are hard at work coming up with the solutions as the problems arise. What’s at stake, he said, is nothing less “than life as we know it today. Let’s hope and pray we can keep the cyber world safe for our kids and grandkids.”