Saturday 15 June 2019

Researchers explore RAMBleed attack in pilfering data

Do you remember Rowhammer, where an attacker could flip bits in the memory space of other processes?

* This article was originally published here

New energy-efficient algorithm keeps UAV swarms helping longer

A new energy-efficient data routing algorithm developed by an international team could keep unmanned aerial vehicle swarms flying—and helping—longer, report an international team of researchers this month in the journal Chaos.

* This article was originally published here

Researchers try to recreate human-like thinking in machines

Researchers at Oxford University have recently tried to recreate human thinking patterns in machines, using a language guided imagination (LGI) network. Their method, outlined in a paper pre-published on arXiv, could inform the development of artificial intelligence that is capable of human-like thinking, which entails a goal-directed flow of mental ideas guided by language.

* This article was originally published here

Nine out of ten pairs of baby socks on the market contain traces of bisphenol A and parabens, study finds

A team of scientists from the University of Granada and institutional collaborators has found that nine out of 10 pairs of socks for babies and children from zero to four years old contain traces of bisphenol A and parabens. The hormonal activities of these two endocrine disruptors have been linked to dysfunctions that can trigger illnesses in both children and adults.

* This article was originally published here

Maestro: a new attack that orchestrates malicious flows with BGP

Researchers at the University of Tennessee have recently identified the Maestro attack, a new link flooding attack (LFA) that leverages plane traffic control engineering techniques to concentrate botnet-sourced distributed denial of service (DDos) flows on transit links. In their paper, recently published on arXiv, the researchers outlined this type attack, tried to understand its scope and presented effective mitigations for network operators who wish to insulate themselves from it.

* This article was originally published here