Wednesday, November 16, 2016

Mass Spectrometry for Surveillance

Yet another way to collect personal data on people without their knowledge or consent: "Lifestyle chemistries from phones for individual profiling":

Abstract: Imagine a scenario where personal belongings such as pens, keys, phones, or handbags are found at an investigative site. It is often valuable to the investigative team that is trying to trace back the belongings to an individual to understand their personal habits, even when DNA evidence is also available. Here, we develop an approach to translate chemistries recovered from personal objects such as phones into a lifestyle sketch of the owner, using mass spectrometry and informatics approaches. Our results show that phones' chemistries reflect a personalized lifestyle profile. The collective repertoire of molecules found on these objects provides a sketch of the lifestyle of an individual by highlighting the type of hygiene/beauty products the person uses, diet, medical status, and even the location where this person may have been. These findings introduce an additional form of trace evidence from skin-associated lifestyle chemicals found on personal belongings. Such information could help a criminal investigator narrowing down the owner of an object found at a crime scene, such as a suspect or missing person.

News article.



from Mass Spectrometry for Surveillance

HTTP/2 is Here – What Now?

Hypertext Transfer Protocol (HTTP) is the protocol used primarily for communication between the user’s browser and the websites that users are accessing. Introduced in 1991, with a major revision in 1999 to HTTP 1.1, HTTP protocol has many limitations. In 2009, engineers at Google redesigned the protocol in a research project called SPDY (pronounced “speedy”) […]

The post HTTP/2 is Here – What Now? appeared first on Radware Blog.



from HTTP/2 is Here – What Now?

Anti-Bullying Week: “Monkey see, monkey do”

Have you ever wondered when and how bullying starts? Research has indicated that bullying can start as early as the preschool years, particularly at the age of 3.

Categories:

Tags:

(Read more...)



from Anti-Bullying Week: “Monkey see, monkey do”

Bad karma! Ransomware piggybacks on free software downloads

The Karma ransomware has been spread disguised as free software downloads in its mission of encrypting the data of unsuspecting users. David Bisson reports.

from Bad karma! Ransomware piggybacks on free software downloads

Hacker group targets Mark Zuckerberg’s online accounts — again

The hacker group has targeted the Facebook chief executive before. At least he learned from his mistake the first time, and beefed up security.

from Hacker group targets Mark Zuckerberg’s online accounts — again

Hacker group targets Mark Zuckerberg’s online accounts — again

The hacker group has targeted the Facebook chief executive before. At least he learned from his mistake the first time, and beefed up security.

from Hacker group targets Mark Zuckerberg’s online accounts — again

Malicious DNS Namespace Collisions

Over the last few weeks, I've noticed a problem come up again in multiple places that I first saw many years ago and apparently is still very common - DNS Namespace Collisions. DNS namespace collisions occur when a private domain name is able to be res...

from Malicious DNS Namespace Collisions