Squire1039

joined 1 year ago
 

Four black bear cubs at Woburn Safari Park in Bedfordshire, England, were treated to a unique enrichment activity - a swan pedalo ride!

Heavy rains created a small lake in their enclosure, and park keepers decided to place a swan pedalo on the water. The bears, named Harvard, Maple, Colorado, and Aspen, were immediately curious about the new object and wasted no time climbing aboard.

This enrichment activity is designed to stimulate the bears' natural foraging behaviors and keep their minds and bodies active. While a swan boat might not be a typical element in a bear's habitat, it proved to be a big hit with these curious cubs!

 

Summary:

  • The International Monetary Fund (IMF) detected the incident in February 2024.
  • Hackers compromised 11 email accounts, but no evidence suggests access to other systems.
  • The IMF uses Microsoft 365 for email and is investigating the incident with cybersecurity experts.
  • This is not the first IMF cyberattack; a major breach occurred in 2011.
  • Connection to recent Microsoft 365 breaches by a Russian hacking group is unclear.
 

Summary

An experiment is underway in the Arctic to save its sea ice from vanishing due to global warming. Scientists are pumping seawater onto the ice to thicken it, aiming to reduce the amount of solar energy absorbed by the dark ocean surface. This approach, part of the controversial field of geoengineering, faces skepticism from many experts who argue it could have unforeseen consequences and distract from the urgent need to cut carbon emissions. While the researchers stress that their efforts are still in the experimental stage, they acknowledge that geoengineering is not a standalone solution and that reducing emissions remains paramount. Despite the challenges, they believe innovative approaches are necessary to address the rapid decline of Arctic sea ice, which poses serious threats to the planet's ecosystems and climate.

 

This article discusses a new study on the link between gut bacteria and diet, particularly the ability to digest cellulose, a major component of plants.

Key Points:

  • Humans have gut bacteria that can break down cellulose, but the amount varies depending on diet.
  • Rural populations and hunter-gatherers have more of these bacteria compared to urban dwellers.
  • The decline is likely due to modern, processed diets low in fiber.
  • Some cellulose-digesting bacteria may have come from our primate ancestors, while others were acquired from domesticated herbivores like cows.
  • These bacteria, though digesting cellulose for themselves, may provide benefits to human health through byproducts and immune system interaction.

The study identified:

  • Four distinct groups of cellulose-digesting bacteria in humans.
  • A historical decline in these bacteria with dietary changes.
  • Potential benefits to gut health from these bacteria, even if they contribute minimally to direct food processing.
[–] Squire1039@lemm.ee 3 points 7 months ago* (last edited 7 months ago)

The canon is used to induce a radical evasive movement. Probably need lots of airbags. Looks awesome, though; would have loved it as a toy car.

 

Researchers presented new techniques to fight sophisticated hacking at a tech conference. Here are the highlights:

Self-destruct chips:

  • A team from Vermont and Marvell created chips with unique fingerprints that can destroy themselves (through increased voltage) if tampered with. This prevents both counterfeiting and unauthorized access to information.
  • Probe detection: Columbia and Intel researchers developed a circuit that detects probes attached to a circuit board, preventing hackers from gaining physical control of a system.
  • Signal Obscuring: Researchers from Texas and Intel created a method to hide a chip's power and electromagnetic signals, making it harder for attackers to steal information.

These innovations could improve chip security and save businesses billions from chip counterfeiting.

Comments

NGL. After I saw "Self-destruct chips", I was just overwhelmed by Mission Impossible theme song.

https://youtu.be/PeKW0stTThk

 

Summary:

A 62-year-old man in Germany got a whopping 217 COVID-19 vaccines over nearly 3 years. Surprisingly, he reported no side effects and seemed healthy. Researchers studied his case to see if such extreme vaccination would weaken his immune system, as some have theorized.

The man's immune response was indeed different, with higher antibody levels and specific immune cells. However, it functioned similarly to people with standard vaccination doses. He also hadn't contracted COVID-19 (though this might be due to other factors).

While this is just one case, it suggests over-vaccination might not be detrimental. However, researchers strongly advise against this as a strategy to boost immunity.

 

Tiny worms living in the radioactive Chernobyl Exclusion Zone (CEZ) surprisingly show no signs of radiation damage in their genes. Researchers compared the worms' genomes to those from non- irradiated areas and found no mutations caused by radiation.

This doesn't mean the zone is safe, but suggests these worms have remarkable resilience to radiation. Studying these worms might provide insights into DNA repair mechanisms that could benefit human health research, such as understanding why some people are more susceptible to cancers caused by DNA damage.

 

Summary

Hackers are compromising WordPress sites to inject malicious scripts. These scripts can either steal cryptocurrency from visitors' wallets or hijack their browsers to launch brute-force attacks against other websites. The hackers are likely building a larger pool of compromised sites to launch more extensive attacks in the future.

 

Summary

Thai customs officials arrested six Indian nationals at Bangkok airport for trying to smuggle 87 animals, including an endangered red panda, snakes, parrots, and monitor lizards. The animals were hidden in their checked luggage and they were all headed to Mumbai. This incident highlights Thailand's role as a wildlife smuggling hub, with animals often destined for China and Vietnam, but increasingly India as well.

[–] Squire1039@lemm.ee 3 points 8 months ago (1 children)

Have I been pawned is really nice, but only includes confirmed data leaks. If you use other services like Google or Malwarebyte, they will tell you more leaks. I was involved with the MoveIt data leak from a financial institution recently, which basically leaked all the information that possibly can be partly/wholely used for identity theft. This didn't show up in HIBP. Fidelity Financial Life Insurance just leaked enough info via Infosys for another 30,000 customers with enough data for identity thefts recently.

In the US, it seems if somebody is able financially to aggregate all these sensitive data leaks, they probably can cause havocs to many people. These info often come from financial institutions, which you can't totally withhold or lie about your personal information.

[–] Squire1039@lemm.ee 6 points 8 months ago (3 children)

Spoofing a number means they can call somebody and appears as calling from your number. In order to receive SMS or call made to your number, they would have to hijack your SIM, typically convincing your telecom provider to transfer your phone info over to theirs.

In the US, someone knowing your full name and phone number is commonplace. There is no wide-spead havoc because of this. Someone who wants to harm you would really have to be motivated to get more information from the info you gave them. This is obviously possible because of wide-spread data leaks, but does your emissary have the perseverance and the knowledge to do this?

[–] Squire1039@lemm.ee 6 points 8 months ago

I can't wait until they start delivering packages with humanoid robots... They could spike up Halloween.

 

The article discusses the mysterious nature of large language models and their remarkable capabilities, focusing on the challenges of understanding why they work. Researchers at OpenAI stumbled upon unexpected behavior while training language models, highlighting phenomena such as "grokking" and "double descent" that defy conventional statistical explanations. Despite rapid advancements, deep learning remains largely trial-and-error, lacking a comprehensive theoretical framework. The article emphasizes the importance of unraveling the mysteries behind these models, not only for improving AI technology but also for managing potential risks associated with their future development. Ultimately, understanding deep learning is portrayed as both a scientific puzzle and a critical endeavor for the advancement and safe implementation of artificial intelligence.

[–] Squire1039@lemm.ee 3 points 8 months ago (1 children)

The MLs have been shown to be extraordinarily good at statistically guessing your words. The words covered are probably comprehensive.

 

A trial program conducted by Pornhub in collaboration with UK-based child protection organizations aimed to deter users from searching for child abuse material (CSAM) on its website. Whenever CSAM-related terms were searched, a warning message and a chatbot appeared, directing users to support services. The trial reported a significant reduction in CSAM searches and an increase in users seeking help. Despite some limitations in data and complexity, the chatbot showed promise in deterring illegal behavior online. While the trial has ended, the chatbot and warnings remain active on Pornhub's UK site, with hopes for similar measures across other platforms to create a safer internet environment.

120
submitted 8 months ago* (last edited 8 months ago) by Squire1039@lemm.ee to c/science@lemmy.world
 

Fasting for a week:

  • Causes significant changes in protein levels across various organs.
  • May have health benefits beyond weight loss, but only after 3 days.
  • Switches energy source from glucose to fat after 2-3 days.
  • Average weight loss of 5.7 kg (fat and muscle), with most fat loss sustained after 3 days of eating.

Implications:

  • Provides insights into the molecular basis of fasting's health effects.
  • Paves the way for developing alternative treatments based on fasting benefits.
  • Confirms historical use of fasting for specific health conditions.
[–] Squire1039@lemm.ee 14 points 8 months ago

A speculation, https://www.phoronix.com/news/HDMI-2.1-OSS-Rejected, about HDCP, i.e. not exposing technical details as to prevent video copying, was offered.

[–] Squire1039@lemm.ee 2 points 8 months ago

both

Town-square when they lure you in, they own everything when they sell you ass off.

[–] Squire1039@lemm.ee 3 points 8 months ago

Yeah, the app data are separated and inaccessible, unless specified by the developer. Accessibility service is a separate permission, and should almost never be asked or granted, where as file/photo accesses are more common.

[–] Squire1039@lemm.ee 9 points 8 months ago

I agree with you. The article give a good warning about downloading applications in general, but hand-wave how they escalated from "file/photo" access to capturing your data. The recent Anatsa malware's details seem to imply accessibility service. This is a Thread Fabric article about Anatsa malware: https://www.threatfabric.com/blogs/anatsa-trojan-returns-targeting-europe-and-expanding-its-reach

[–] Squire1039@lemm.ee 4 points 8 months ago

From the project's page:

The wearable system captures peripheral neural signals when internal speech articulators are volitionally and neurologically activated, during a user's internal articulation of words.

It doesn't capture the central signal, but peripheral, most likely from the nerves running around your face and your neck used to produce speech.

[–] Squire1039@lemm.ee 7 points 8 months ago

No dirty thoughts! No dirty thoughts!

[–] Squire1039@lemm.ee 5 points 8 months ago* (last edited 8 months ago)

No, it appears to be an external headset, although it was noted that people wearing it looked like they had head injuries, but they are working on improving it so that it is less visible.

view more: next ›