Synopsis: Security:


R_www.theguardian.com 2015 02669.txt.txt

Kepler says it will still undergo a rigorous environmental impact assessment during the planning process to ensure that it poses no significant risk to marine life and to other users of the sea.


R_www.theguardian.com 2015 02942.txt.txt

with police tying multiple blackmail attempts and at least two suicides to the leak. e are actively adjusting to the attack on our business and membersprivacy by criminals,

with police and security researcher Brian Krebs communicating much of the available information. Krebs has posted new information on the hack,


R_www.theguardian.com 2015 03630.txt.txt

Dan Conlon big idea was born after smashing the bell box of a faulty alarm system off the side of his house in the early hours of the morning as the ringing kept the neighbourhood awake.

he said. assumed that there would be loads of easy smartphone connected alarm systems and there were not. e found that a lot of people who own an alarm don bother to set it either

The use of infrasound in commercial alarm systems goes back decades. But costs prohibited the sensors being used widely in home alarms,

which may signal a threat. The device learns over three days how residents come in and out and live.

and will be able to contact the police. There are potential problems. f you have no smartphone,


R_www.theguardian.com 2015 03749.txt.txt

or at risk of being contaminated by people or machinery i


R_www.theregister.co.uk_science 2015 00376.txt.txt

#OFFICIAL SCIENCE: Men are freezing women out of the workplace As the Northern hemisphere languishes in summer temperatures,


R_www.theverge.com_science 2015 00826.txt.txt

#Genentech drug adds antibiotics to proteins to fight hidden bacteria Scientists at Genentech have armed the body immune system warriors with antibiotics


R_www.theverge.com_tech 2015 02271.txt.txt

according to a report from security firm Fireeye Labs. The firm found that the HTC One Max,

HTC fixed the vulnerability after being alerted of it, Fireeye says. The One Max had been storing fingerprint data in a specialized bitmap file,

As security researcher and ACLU policy analyst Chris Soghoian points out, HTC is already under order from the Federal trade commission not to mislead consumers on security.

in part because it didn't provide engineers with"adequate security training "and failed to review software for security flaws.

This was back in February of 2013 several months before the One Max was released, but it speaks to how such a flaw could have slipped through.

But there's still good reason to be concerned about this vulnerability's existence. As Fireeye notes in its report,


R_www.usatoday.com_tech_ 2015 02684.txt.txt

head of the data security and privacy practice at the law firm of Fox Rothschild. Under so-called Safe harbor rules, U s. firms are allowed to transfer personal data of European citizens back to the U s..They only have to follow one set of rules on how data they store

He argued that spying on Europeans by the National security agency, as disclosed by Snowden, meant his data privacy rights were not being protected adequately.

"This decision is a major blow for U s. global surveillance that heavily relies on private partners.

The judgement makes it clear that U s. businesses cannot simply aid U s. espionage efforts in violation of European fundamental rights,

the National security agency and other United states security agencies such as the Federal bureau of investigation are able to access it in the course of a mass and indiscriminate surveillance and interception of such data."

and has engaged not in indiscriminate surveillance of anyone, including ordinary European citizens.""The PRISM surveillance program is targeted against particular valid foreign intelligence targets,

is authorized duly by law, and strictly complies with a number of publicly disclosed controls and limitations,


R_www.venturebeat.com 2015 04428.txt.txt

reports (Reuters) Hackers have followed through on a threat to release online a huge cache of data,


R_www.xconomy.com_channels 2015 01403.txt.txt

they are scored on their financial risk, which screens potential investments so they only see things they can reasonably take on. he user can override their risk profile,

Krieg says. Stash will also show users how others with similar risk profiles are investing through the app

he says. ee not trying to force people out of their comfort zone, he says. e want them to invest in ways they should be investing.


R_www.zdnet.com 2015 00001082.txt

online espionage The White house has set out plans to use economic sanctions against cyber attackers and companies that benefit from the online theft of secrets.

or groups whose cyber attacks result in significant threats to US national security or economic health.

and severity of malicious cyber-enabled activities"pose an"unusual and extraordinary threat"to the national security, foreign policy,

"I hereby declare a national emergency to deal with this threat, "said President Barack Obama in the order.

and power grids are probed for vulnerabilities by foreign governments and criminals.""But he said it is often hard to pursue attackers either because of weak or poorly-enforced foreign laws,

"White house homeland security adviser Lisa Monaco said there had been a significant increase in the frequency, scale and sophistication of cyber incidents targeting the US in the past year.

when it comes to industrial espionage, where attacks may take place over months and years, and even harder to prove that a company has benefited from such an attack t


R_www.zdnet.com 2015 00001625.txt

and security companies,"said a Samsung SDS spokesperson.""We plan to offer clients that need biometrics solution with various business models and offer differentiated authentication services."

Security will be boosted by using biological information as a key the company said. Meanwhile, Samsung last week announced that it aims to become one of the top 10 global IT service companies in the world,


R_www.zdnet.com 2015 00001943.txt

#'Largest'denial-of-service attack hit Asian datacenter this year The largest ever distributed denial-of-service (DDOS) attack happened earlier this year, according to a threat intelligence and monitoring service.


R_www.zdnet.com 2015 00002161.txt

and dump it into this-because they have that assurance. They feel good about that open-source nature of the interface."

"For security, Google is providing replicated storage and encryption of all data in flight and at rest.


R_www.zdnet.com 2015 0000295.txt

and proactively identify mothers at risk for such illness and provide them with the necessary resources to treat the depression before it takes effect.

because research suggests that children of women who experienced depression during pregnancy have a higher risk of becoming depressed as adults (JAMA Psychiatry).

Heidelberg University Hospital can reduce immediate and long-term risks for mother and for baby. The traditional relationship between patient and doctor still exists


R_www.zdnet.com 2015 0000540.txt

which takes remembering your security password to access accounts of the equation. Yahoo's vice president of product management for consumer platforms Dylan Casey said during the event that the service is the"first step to eliminating passwords."

you can head over to security settings and turn on on-demand passwords. The next step is to register your phone

"the security process arguably is taking a step back from two-step verification, which is slowly being adopted by web services worldwide.

--but also often involves an additional code being sent to a linked mobile device to heighten account security.

or stolen--Yahoo's new scheme could be viewed as a lax security protocol designed to appeal to the general public,

Yahoo chief information security officer Alex Stamos confirmed that end-to-end encryption will be introduced to Yahoo Mail by the end of 2015.

developed by Yahoo and Google after the Edward Snowden US National security agency (NSA) revelations. While Google has said previously it will include encryption services by default within the Android operation system,


R_www.zdnet.com 2015 0000772.txt

Business Premium or Enterprise, coupled with Samsung's Knox security offering. Microsoft also announced today it has expanded bundling deals with Dell,


R_www.zdnet.com 2015 05920.txt.txt

During the March elections, the NSWEC was left scrambling patching security flaws, including FREAK, in the electronic voting system, according to security researchers at the time.

However, the agency hit back saying that the vulnerabilities in ivote were overstated"."""The proposed FREAK attack requires a high level of technical expertise

and a number of preconditions to be successful, and as such is considered not a real threat to ivote.

We have been advised that the likelihood of someone intercepting votes online using this approach is as real as a malicious postman replacing a postal vote,


R_www.zdnet.com 2015 06260.txt.txt

security and availability but for a smaller price-tag. The z13 mainframe series can hold up to 10 TBS of memory.


ScienceDaily_2014 00003.txt

A signaling domain built into the CAR promotes rapid multiplication of the hunter cells building an army of tumor-killing cells that tests reveal can grow to more than 10000 new cells for each single engineered cell patients receive.


ScienceDaily_2014 00026.txt

To tackle this problem scientists have come up with a new low-cost simple way to remove arsenic using leftovers from another known health threat--cigarettes.


ScienceDaily_2014 00030.txt

Ultimately this work could be especially useful in reducing risk of secondary bacterial pneumonias during seasonal


ScienceDaily_2014 00038.txt

In some ways these rocks are like armies waiting in the wings to be needed called upon when to absorb methane.


ScienceDaily_2014 00133.txt

but in the case of traumatic injury or stroke they become a pathway of vulnerability that allows swelling.

Dr Burton has found that applying a drug that closes the water channels can inhibit initial water entry helping to close the window of vulnerability.


ScienceDaily_2014 00137.txt

and increasing the risk of stroke. In the UK carotid artery disease is treated most commonly by an invasive surgical procedure called endarterectomy.

The procedure is less invasive causing only minor bruising in the groin no risk of nerve damage and a lower heart attack risk than endarterectomy.

The risk of any stroke in five years was 15.2%in the stenting group compared to 9. 4%in the endarterectomy group

We have shown also that the risk of stroke during the procedure is no higher for stenting than for endarterectomy in younger patients.

The risks of each procedure are different and will vary depending on the patient but stenting should be offered as an option to many more patients under the age of 70.

and is at risk of having a major stroke. Preventative procedures to treat such carotid artery stenosis are therefore crucial.

Both procedures carry their own risks and these will need to be considered for each individual patient.

which will help people significantly reduce their stroke risk. Story Source: The above story is provided based on materials by University college London.


ScienceDaily_2014 00148.txt

For the first time knowledge about the individual patient's genetic risk profile is being used. The treatment completely restores the capacity to secrete insulin

which is impaired by the risk gene. The concept of treatment personalized to the individual's risk profile has great potential.

Our results show that it is possible to block the effects of a common risk gene for type 2 diabetes says Anders Rosengren the diabetes researcher at Lund University in charge of the project.

A milestone was an article in the journal Science in 2009. At the time several research teams from Lund University were able to report that a common gene variant in the population makes insulin-producing cells sensitive to stress hormones.

With a known disease mechanism and a method to neutralise it the obvious next step was to test it on patients. 50 patients with type 2 diabetes were recruited. 21 of them did not have the risk variant

Not unexpectedly the secretion was 25 per cent worse in patients who had the risk gene.

Yohimbin neutralised the effects of the risk gene. The carriers of the risk gene gained the same capacity to secrete insulin as those without the risk variant observes Yunzhao Tang principal author of the recently published article.

Yohimbin must be modified to minimise side-effects in this case raised blood pressure and we need the help of a cooperation partner to achieve this.

The substance must also be tested on more patients before it can become a clinical drug says Anders Rosengren adding purely theoretically the drug should be effective for the 40 per cent of type 2 diabetes sufferers who are carriers of the genetic risk variant.


ScienceDaily_2014 00187.txt

In addition there is little risk of turning off untargeted genes the way RNA interference techniques do.


ScienceDaily_2014 00197.txt

and evaluate a person's risk for developing diabetes and cardiovascular disease. But determining the body's metabolic response to fructose has been much more difficult

All of these increase the risk of developing diabetes and cardiovascular disease. Fructose is a pervasive presence throughout our foods:


ScienceDaily_2014 00209.txt

and reduce the risk of the treatment leaving permanent effects said White. We found that we are able to have a really good rate of a good cosmetic outcome in 80-to-90 percent of the women who go through this treatment.


ScienceDaily_2014 00217.txt

The authors are also able to optimise the energy mix according to three selected criteria namely economy environment and supply security.


ScienceDaily_2014 00223.txt

Suicide risk could be reduced by changing the style of reportingbut that's not all. A very specific problem arises from this

The suicide risk can be reduced as a result. Journalists should therefore take care to present as correct a view as possible of suicidal tendencies


ScienceDaily_2014 00226.txt

For the water to reach the households in a clean state via the distribution network a team headed by microbiologist Ursula Obst who directs the partial project for water processing and water quality assurance developed methods for the central semi

In case of strong rainfall there is a high risk of the germs entering the groundwater especially in a karst region Fuchs says.


ScienceDaily_2014 00234.txt

but is often a necessary evil in medical treatments where clotting is a risk. Devising a way to prevent blood clotting without using anticoagulants is one of the holy grails in medicine said Don Ingber M d Ph d. Founding Director of Harvard's Wyss Institute for Biologically Inspired Engineering and senior author of the study.


ScienceDaily_2014 00235.txt

This work was supported by the Lord Foundation of North carolina and the Air force Office of Scientific research (Contract No.


ScienceDaily_2014 00254.txt

#Computerized surveillance system quickly detects disease outbreaks among preschoolers A web-based system that allows preschools


ScienceDaily_2014 00266.txt

or dislodged this cumbersome solution carries the risk of infection. Measuring ICP using cables become particularly challenging


ScienceDaily_2014 00302.txt

and a treatment for anthrax developed for use in case of a bioterrorist attack. One reason pharmaceutical companies are said withdrawing Kinch is that our patent law squeezes them for time.


ScienceDaily_2014 00314.txt

and vital-sign data (such as body temperature heart rate and blood pressure) in the electronic health record of hospital inpatients to identify those at risk for sepsis.


ScienceDaily_2014 00315.txt

or biological contaminants with far-reaching implications for public health including homeland security concerns. Applying world class research to water quality has to be viewed as a critical component for sustaining society as a whole says Clarkson University President Tony Collins. As healthy water becomes increasingly scarce establishing real-time data as the new standard for understanding water quality around the globe


ScienceDaily_2014 00330.txt

New research suggests these patients may be increased at risk of an unusual and aggressive form of skin cancer.


ScienceDaily_2014 00333.txt

"In-field detection of chemical and biological threats is the challenge that we are trying to address,

including homeland security, forensics and environmental monitoring, and medical diagnostic applications.""For example, Tian noted, the plasmonic paper can be used to detect target molecules that serve as indicators for diseases such as kidney cancer."


ScienceDaily_2014 00382.txt

so it is only natural that jewelry buyers should want assurance that the precious ring


ScienceDaily_2014 00383.txt

They register potential risks even when the driver has noticed not yet even them --and could warn him or her just in time.


ScienceDaily_2014 00384.txt

when it comes to identifying people most at risk of developing the condition. Researcher David Ashbrook and colleagues from the UK and USA used two of the world's largest collections of scientific data to compare the genes in mice and humans.

"Ultimately this could provide another biomarker in the toolkit for identifying those at greatest risk of developing diseases such as Alzheimer's."


ScienceDaily_2014 00391.txt

which conservative therapy or surveillance would be appropriate treatment, the clinical challenge is not only how to identify those with prostate cancer,


ScienceDaily_2014 00402.txt

#Skin exposure may contribute to early risk for food allergies Many children may become allergic to peanuts before they first eat them


ScienceDaily_2014 00403.txt

whether the Community Justice Center reduces the risk of rearrest when compared to more-traditional approaches for addressing arrestees.


ScienceDaily_2014 00406.txt

#Women who eat fried food regularly before conceiving at increased risk of developing gestational diabetes during pregnancy Women who eat fried food regularly before conceiving are increased at risk of developing gestational diabetes during pregnancy,

New research published in Diabetologia (the journal of the European Association for the Study of Diabetes) shows that women who eat fried food regularly before conceiving are increased at risk of developing gestational diabetes during pregnancy.

Recently, frequent consumption of fried foods has been linked to a higher risk of overweight and obesity in two Mediterranean cohorts.

and the risk of subsequent GDM. The authors included 21,079 singleton pregnancies from 15,027 women in the Nurses'Health Study II (NHS II) cohort.

After adjustment for age, parity, dietary and non-dietary factors, the risk ratios for developing GDM among women who consumed total fried foods 1-3, 4-6,

and 2. 18 respectively (thus a more than-doubling of risk for 7 times or more per week or more compared with less than once per week).

After this, the risk ratios of GDM among women who consumed total fried foods 1-3, 4-6,

and 1. 88 respectively (thus an 88%increased risk for 7 or more times per week compared with less than once per week).

This may partly explain why we observed a stronger association of GDM risk with fried foods consumed away from home than fried foods consumed at home."

and positively associated with the risk of incident GDM in a prospective cohort study. Our study indicates potential benefits of limiting fried food consumption in the prevention of GDM in women of reproductive age.


ScienceDaily_2014 00453.txt

Contamination of coastal waters with disease-causing microorganisms is known to pose a threat to the health of both humans


ScienceDaily_2014 00504.txt

and potential bioterror exposures is an urgent global health need. There are no approved anti-Ebola agents,


ScienceDaily_2014 00524.txt

Cells have adapted further autophagy for other purposes as well including recycling dysfunctional components immune response to pathogen invasion surveillance against cancer


ScienceDaily_2014 00562.txt

'His invention can help to curb industrial espionage. A method ensuring that all telephone calls are encrypted

They new system can prove hugely effective in combating industrial espionage, says Lars Ramkilde Knudsen.

Industrial espionage poses one of the biggest cyber threats in Denmark, according the the Danish Security and Intelligence service's latest risk assessment.

Industrial espionage occurs when different players discover and steal trade secrets such as business plans from companies, technical know-how and research results,

budgets and secret plans using phone tapping, for example. In the USA alone, the phenomenon costs businesses around USD 100 billion every year according to a 2014 report on the subject by security firm Mcafee.

Dencrypt currently has six employees in addition to co-owner and founder Lars Ramkilde Knudsen who still works for DTU Compute.


ScienceDaily_2014 00565.txt

and to evaluate the risk of thyroid cancer after exposure to high level radiation, for instance, following a radiation accident,"reports Heß.


ScienceDaily_2014 00579.txt

and antibiotic therapy could reduce that risk in future studies. There were no hospitalizations among the participants for stroke thrombosis sepsis or bleeding


ScienceDaily_2014 00594.txt

#How rabies hijacks neurons to attack brain Rabies causes acute inflammation of the brain, producing psychosis and violent aggression.

"Rabies not only hijacks the nervous system's machinery, it also manipulates that machinery to move faster,

"Hijacking the hijacker"A tempting premise is to use this same machinery to introduce drugs or genes into the nervous system,"Dr. Perlson added.

By shedding light on how the virus hijacks the transport system in nerve cells to reach its target organ with maximal speed and efficiency,


ScienceDaily_2014 01835.txt

The Lockheed martin Aerospace Co. through the LANCER IV Program, the Office of Naval Research's Multidisciplinary University Research Initiative and the Air force Office of Scientific research supported the research h


ScienceDaily_2014 05500.txt

which hijacks the normal process of cell division to make thousands of copies of harmful cancer cells.


ScienceDaily_2014 10815.txt

UV imaging can be used to detect threats not seen in the visible spectrum. UV detectors also have applications in space-borne astronomy missions.


scitechdaily.com 2015 00330.txt.txt

and using nucleic acids bears a risk for accidental genome editing. These methods are also toxic,


scitechdaily.com 2015 00382.txt.txt

It like soldiers marching in formation: If one person falls dramatically out of time, it won be long before the whole group falls apart.


scitechdaily.com 2015 00477.txt.txt

The research was funded by MIT Institute for Soldier Nanotechnologies. Publication: Jie Bao & Moungi G. Bawendi, colloidal quantum dot spectrometer, Nature 523,670 (02 july 2015;


scitechdaily.com 2015 00495.txt.txt

and millions more at risk of infection, do not have adequate access to prevention and treatment,


scitechdaily.com 2015 00579.txt.txt

minimizing the risks of leaving toxic secondary products to persist in, say, a body of water. nce they switch to this macro situation where theye big clumps,


smartcitiescouncil.com 2015 00008.txt

Or a double-digit decline in crime rates without a double-digit increase in the size of your police force?

This helps make police proactive, rather than reactive. Instead of chasing criminals, officers are increasingly able to stop them before they commit crimes.

Police departments can use it to analyze trends and other data so that they know where crimes are most likely to occur

Built by police officers While the analytics were built by Microsoft, New york city police officers guided the development. Police officers described their biggest pain points

and brainstormed ways that data analysis could help address them. It was built to solve real-life problems.

For example if a suspicious package is left, police can immediately review camera footage to determine who left it.

If theye looking for a suspect and they know what car he drives, they can see where the car has been in recent days and months.

possibly the first time that has happened ever in the 50 years the Los angeles Police department has been responsible for that area.

Adding more police officers is expensive and can be given almost impossible the budget struggles most cities face today.

a relatively small investment can make an existing police force more effective, making communities safer s


smartcitiescouncil.com 2015 00934.txt.txt

Microsoft, andcisco and Associate Partner Siemens have been working with Chinese companies on national information security as well as technologies


Smart_Planet_1 00997.txt

The robot's operator watches the Trakür's progress through a cheap security camera mounted on its hood, for example."


Smart_Planet_13 00054.txt

When the 29-year-old turned to the police for help they said only missing cases that are deemed suspicious

(thus criminal) by police are allocated search resources. O'Keeffe decided to take matters into her own hands,

According to the Australian Federal Police, over 35,000 Australians are reported missing annually. The MPAN guide has proven so effective that the police are now directing the public to the site.

While O'Keeffe is in search of sponsorship and government funding, the maintenance of the guide is covered by publicly raised funds.


Smart_Planet_13 00076.txt

But while those guard against the long-term risks of thyroid cancer linked with chronic radiation exposure

and the Pandemic and All-Hazard Preparedness Act (signed into law 2 years later) allotted billions of dollars in funding for research into medical countermeasures to be used in the case of nuclear, chemical,


Smart_Planet_13 00098.txt

The task force turned to crowdsourcing to develop a design for the memorial to the passengers and crew of Flight 93.


Smart_Planet_13 00147.txt

there was a line of over 100 people waiting to get through security at the White house's Eisenhower Building.


Smart_Planet_13 00166.txt

This is a perfect way to avoid the risk of creating entirely new markets which often go through a painful not yet-serving-hundreds-of-millions period and


Smart_Planet_13 00185.txt

The ascension of Apple, a company in the vanguard of firms that make devices you don't need until you have one


Smart_Planet_13 00400.txt

U s. fears unsafe nuclear reactors in China Diplomatic cables from Beijing say old designs lack passive cooling and pose a big risk.

China is astly increasingits risk of a nuclear accident by choosing older nuclear technology that lacks advanced cooling systems,

"says one cable dated 7 august 2008. hina is vastly increasing the aggregate risk of its nuclear power fleet.


Smart_Planet_5 00228.txt

and dodge security to enter no-go exclusion zones. Several media outlets, including TIME have documented also cities within the exclusion zone.

What the NRC really knew about Fukushima Fukushima ocean radiation could pose sleeper threat Nuclear meltdowns nearly made northern Japan uninhabitable do need we to worry about radiation in our milk?


socialnewsdaily.com 2014 0000258.txt

Lynch was referencing special agent Dale Cooper who loved himself a amn fine cup of coffee.


space.com 2015 00009.txt

Spacex's Falcon 9 rocket and Dragon capsule are scheduled now to blast off from Cape canaveral Air force station in Florida at 4: 47 a m. EST (0947 GMT) Saturday.


spectrum.ieee.org 2015 00480.txt.txt

This technique was invented chemistry professor Paul C. Trulove research team at the U s. Naval academy and Hugh C. Delong of the Air force Office of Scientific research.

which were perfected by Drexel University doctoral student Kristy Jost and Commander David P. Durkin at the U s. Naval academy.


spectrum.ieee.org 2015 00498.txt.txt

it poses long-term risks to the eyes, nerves, and arteries. So several times a day the patient must prick a finger to test blood sugar,


spectrum.ieee.org 2015 00669.txt.txt

But Kante points out that microwave cloaks could be useful for the military, to hide objects from radar working at such wavelengths.


spectrum.ieee.org 2015 00670.txt.txt

Keuka will likely face a long road to acceptance by the notoriously risk averse utility industry.


techcrunch 00001.txt

#Google s Unified Privacy Policy Draws Threat Of $15m Fine In The netherlands The national data protection authority in The netherlands has warned Google that it could be fined up to $15 million

Responding to the Dutch threat of a fine a Google spokesperson told Techcrunch via email:


techcrunch 00075.txt

which greatly increases the risk of arthritis. The scaffold isn just a plastic shell, however.


techcrunch 00078.txt

and beef up its own servers and security infrastructure. Sony Tries Silencing Reporters Sony hack was made worse by its poor security infrastructure,

but that alone does not mean all the data needed to be revealed in detail by the press if that Sorkin critique,

Sony, and likely other organizations that are currently fortunate enough to not have their poor security policies exposed,

you should protect them with at least a minimum amount of security, by way of encryption.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011