Posts

Why CyberSecurity is Required? How to Effectively Maintain it?

Image
The core functionality of cyber security involves protecting information and systems from major cyber threats .  These cyber threats take many forms (e.g., application attacks, malware, ransomware, phishing, exploit kits ).  Unfortunately , cyber adversaries have learned to launch automated and sophisticated attacks using these tactics – at lower and lower costs.  As a result, keeping pace with cyber security strategy and operations can be a challenge, particularly in government and enterprise networks where, in their most disruptive form, cyber threats often take aim at secret, political, military or infrastructural assets of a nation, or its people. Cyber Security could be easily maintained by:     1. User  Education and Awareness:   Produce user security policies covering acceptable and secure use of the organization’s systems. Establish a staff training program. Maintain user awareness of cyber risks.   2. R emovable Media Controls:   Create a policy to control a

New Tech Can Spot Warning Signs of Tremendous Events

Image
Boston, Sep 24 (PTI) MIT scientists developed a new algorithm that can predict tremendous events that are likely to occur in the real world, by spotting instabilities that may affect climate, aircraft performance or ocean circulation. It is nearly impossible to predict when such bursts of instability will strike, particularly in systems with a complex and ever-changing mix of players and pieces. Scientists at Massachusetts Institute of Technology (MIT) have devised a framework for identifying key patterns that precede an tremendous event. Scientists at Massachusetts Institute of Technology (MIT) have devised a framework for identifying key patterns that precede an severe event. The framework can be applied to a wide range of complicated, multidimensional systems to pick out the warning signs that are most likely to occur in the real world. “Currently there is no method to explain when these extreme events occur,” said Themistoklis Sapsis, associate professor at MIT. In pre

Carbon nanotube ‘twistron’ yarn produce electricity when stretched

Image
Everyone wants smart clothes, but no one wants to wear a battery pack. But that doesn’t mean a solution can’t be found. Researchers at the University of Texas, Dallas have created  a power-generating yarn from woven carbon nanotubes , and given it an amazing name: twistron . The innovation could be used to power internet-connected devices and smart clothing, said the study's senior author Ray Baughman, a professor at The University of Texas at Dallas. “The grander dream is to make a real difference in the energy economy of nations,“ Baughman said. The device, which exploits the ability of nanotubes to transfer spring-like motion into electrical energy , has countless possible applications, according to the paper. In the lab, tests showed that a yarn weighing less than a housefly could light up a small LED light. When sewed into a t-shirt, it could also power breathing sensors -like those used to monitor babies -using the stretch caused by the chest expanding at every inhalation.

Next smash hit? Self-healing phone screens

Image
A patent has been filed for a smartphone display that can heal itself, potentially putting an end to the misery of smashed screens. Filed by smartphone maker Motorola, the patent describes a way to mend a broken screen by applying heat to the damage.The screen would need to be made of a special type of plastic known as a “shape memory polymer“, which returns to a predefined shape when it reaches a certain temperature.   Motorola explains that an application would let the user mark out the part of the screen that is damaged, before the handset heats that area using its own power. Alternatively ,   heat could be applied by placing the smartphone in a healing dock overnight, or by pressing a separate piece of material against the screen like an iron. The healing process is only intended to work on smaller scratches and cracks. The patent was published last week, but this doesn't mean   Motorola are planning to use the technology in handsets any time soon. Before it can become

Now charge your electric car while moving at 100kph

Image
A Scalextric-style stretch of road capable of charging cars  while they drive at speed up to 100kph(62mph) has been created in France in a breakthrough that could make electric vehicles much more popular. while range anxiety has diminished as a problem for electric vehicles with some models now achieving distances of about 480 kilometres (300 miles) on a single charge, it still then takes time to recharge the battery. So the ability to charge a car  while it was moving be a significant step. In a statement  , Qualcomm Technologies said it had 'designed and built a wire -less system capable of charging an electric car while it was moving would be a significant step. Two vehicles were able to use the 100-metre track to top up their batteries at the same time and it worked in both directions. Steve Pazol  , vice president and general manager of wireless charging at Qualcomm Incorporated, said, " We are inventors... this dynamic charging demonstration is embodiment of this.&qu

Virus - Since when

Image
Since when are viruses being spread through the internet? The first major attack was in 1999 when American, David L Smith, designed the Melissa virus (named after exotic dancer) that could spread through email. It required a host to run proper, which in this case word document attached to an email. . Once opened, the virus replicated and sent itself to 50 people in the email address book. the increased email traffic because of thousands of infected computers forced some companies to shut down email. So ur ce: Learning With The Times

Viruses - Malevolent for everyone

Image
What is a computer virus? In 1949, when computing was just about a decade old, Hungarian-American scientist John von Nuemann theorised the possiblity of writing a self-replicating program, which later came to be known as a computer virus. These programmes,  which need a host to function, are designed to make unauthorised and undesirable modifications in infected computers. Initially, viruses were designed and tested in university computer labs. The first virus that went 'inthe wild' - outside the lab/computer in which it was designed - was Elk Cloner which was written by Richard Skernta, a school student in the US.Viruses written during the period were spread through floppy disks and hence caused a major security threats. Source: Learning With The Times