Police use DNA to create photofits of criminals

Police use DNA to create photofits of criminals

WHY THIS MATTERS IN BRIEF Many crimes go unresolved because there are no witnesses but now a new technique can create photofits from fragments of DNA.   A murder has been committed, and all the cops have to go on is a trace of DNA left at the scene. It doesn’t...

Read more
Researchers secure the Internet of Everything with Dark Web tech

Researchers secure the Internet of Everything with Dark Web tech

WHY THIS MATTERS IN BRIEF The TOR network protects the anonymity of users in the Dark Web, now researchers think it’s the perfect tool to secure the Internet of Things.   The privacy software Tor has helped everything from drug dealing marketplaces to whistleblowing websites evade surveillance on the Darknet, the shadowy under...

Read more
DARPA’s king Robo-hacker “Mayhem” proves no match for humans

DARPA’s king Robo-hacker “Mayhem” proves no match for humans

WHY THIS MATTERS IN BRIEF DARPA’S Cyber Grand Challenge is over but the winner is still no match for humans.   The Heartbleed security bug existed in many of the world’s computer systems for nearly two-and-a-half years before it was discovered and a fix circulated in the spring of 2014,...

Read more
MIT’s latest Human-AI hybrid cybersecurity platform blitzes trials

MIT’s latest Human-AI hybrid cybersecurity platform blitzes trials

WHY THIS MATTERS IN BRIEF We are in the middle of a tug of war that pits Human security experts against autonomous AI “Robo-Hackers” but MIT’s found a middle ground that out performs them all.   Today’s security systems usually fall into one of two categories – Human or Machine. So...

Read more
Bitcoin slumps twenty percent after $65m Bitfinex hack

Bitcoin slumps twenty percent after $65m Bitfinex hack

The Bitfinex heist is the latest is a growing line of high profile heists that are undermining confidence in the crypto currency The price of the virtual currency Bitcoin fell sharply Tuesday after Hong Kong-based digital-currency exchange Bitfinex said it was hacked, resulting in the possible theft of $65 million...

Read more
The White House just issued a Defcon scale for cyber attacks

The White House just issued a Defcon scale for cyber attacks

WHY THIS MATTERS IN BRIEF In an increasingly connected society cyber attacks can wreak more havoc than ever before and now the US has a plan.   In a sign of the times White House officials have finally gotten around to writing out a plan to deal with future cyber attacks...

Read more
DARPA teams go head to head to find the worlds best robo-hacker

DARPA teams go head to head to find the worlds best robo-hacker

WHY THIS MATTERS IN BRIEF Humans can no longer keep up with the tusnami of cyber threats but the robo-hackers can.   Could you invent an autonomous hacking system that could find and fix vulnerabilities in computer systems before criminals could exploit them, and without any human being involved?  ...

Read more
One camera to watch an entire city, meet WAMI

One camera to watch an entire city, meet WAMI

WHY THIS MATTERS IN BRIEF It’s like combining Google Maps with Tivo, authorities can watch an entire city with just a one camera.   An unblinking sentinel will watch over the Olympic Games from high above Rio de Janiero this summer. No, not the iconic Christ the Redeemer statue, but...

Read more
Bomb sniffing UAV’s can thwart terrorist bombs

Bomb sniffing UAV’s can thwart terrorist bombs

WHY THIS MATTERS IN BRIEF Security forces are about to get a new tool in the fight against terror.   Scientists at a US university have developed “bomb sniffing drones” which are being lauded as the ultimate weapon against terror attacks involving explosives. Researchers at the University of Wisconsin Madison...

Read more
Researchers listen in to crack 4096-bit encryption

Researchers listen in to crack 4096-bit encryption

WHY THIS MATTERS IN BRIEF Researchers have used sound to break the worlds’ toughest encryption standard.   Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is...

Read more