The Neuroscientist Who Discovered He Was a Psychopath

Hugh Pickens DOT Com writes “Joseph Stromberg writes at the Smithsonian that one afternoon in October 2005, neuroscientist James Fallon was sifting through thousands of PET scans to find anatomical patterns in the brain that correlated with psychopathic tendencies in the real world. ‘Out of serendipity, I was also doing a study on Alzheimer’s and as part of that, had brain scans from me and everyone in my family right on my desk, ‘ writes Fallon. ‘I got to the bottom of the stack, and saw this scan that was obviously pathological.’ When he looked up the code, he was greeted by an unsettling revelation: the psychopathic brain pictured in the scan was his own. When he underwent a series of genetic tests, he got more bad news. ‘I had all these high-risk alleles for aggression, violence and low empathy, ‘ he says, such as a variant of the MAO-A gene that has been linked with aggressive behavior. It wasn’t entirely a shock to Fallon, as he’d always been aware that he was someone especially motivated by power and manipulating others. Additionally, his family line included seven alleged murderers, including Lizzie Borden, infamously accused of killing her father and stepmother in 1892. Many of us would hide this discovery and never tell a soul, out of fear or embarrassment of being labeled a psychopath. Perhaps because boldness and disinhibition are noted psychopathic tendencies, Fallon has gone in the opposite direction, telling the world about his finding in a TED Talk, an NPR interview and now a new book published last month, The Psychopath Inside. ‘Since finding all this out and looking into it, I’ve made an effort to try to change my behavior, ‘ says Fallon. ‘I’ve more consciously been doing things that are considered “the right thing to do, ” and thinking more about other people’s feelings.'” Read more of this story at Slashdot.

See more here:
The Neuroscientist Who Discovered He Was a Psychopath

Lead Contractor On Health-Care Web Site Led By Execs From Troubled IT Company

thomst writes “The Washington Post’s Jerry Markon and Alice Crites report that ‘The lead contractor on the dysfunctional Web site for the Affordable Care Act is filled with executives from a company that mishandled at least 20 other government IT projects, including a flawed effort to automate retirement benefits for millions of federal workers, documents and interviews show. CGI Federal, the main Web site developer, entered the U.S. government market a decade ago when its parent company purchased American Management Systems, a Fairfax County contractor that was coming off a series of troubled projects. CGI moved into AMS’s custom-made building off Interstate 66, changed the sign outside and kept the core of employees, who now populate the upper ranks of CGI Federal.'” Read more of this story at Slashdot.

Read More:
Lead Contractor On Health-Care Web Site Led By Execs From Troubled IT Company

The Second Operating System Hiding In Every Mobile Phone

Jah-Wren Ryel writes “Every smartphone or other device with mobile communications capability (e.g. 3G or LTE) actually runs not one, but two operating systems. Aside from the operating system that we as end-users see (Android, iOS, PalmOS), it also runs a small operating system that manages everything related to radio. So, we have a complete operating system, running on an ARM processor, without any exploit mitigation (or only very little of it), which automatically trusts every instruction, piece of code, or data it receives from the base station you’re connected to. What could possibly go wrong?” Read more of this story at Slashdot.

Read More:
The Second Operating System Hiding In Every Mobile Phone

Microsoft Warns Customers Away From RC4 and SHA-1

Trailrunner7 writes “The RC4 and SHA-1 algorithms have taken a lot of hits in recent years, with new attacks popping up on a regular basis. Many security experts and cryptographers have been recommending that vendors begin phasing the two out, and Microsoft on Tuesday said it is now recommending to developers that they deprecate RC4 and stop using the SHA-1 hash algorithm. RC4 is among the older stream cipher suites in use today, and there have been a number of practical attacks against it, including plaintext-recovery attacks. The improvements in computing power have made many of these attacks more feasible for attackers, and so Microsoft is telling developers to drop RC4 from their applications. The company also said that as of January 2016 it will no longer will validate any code signing or root certificate that uses SHA-1.” Read more of this story at Slashdot.

Read More:
Microsoft Warns Customers Away From RC4 and SHA-1

Music Industry Issues Take Down Notices to 50 Major Lyrics Sites

alphadogg writes “A music industry group is warning some 50 website that post song lyrics that they need to be licensed or face the music, possibly in the form of a lawsuit. The National Music Publishers Association said Monday that it sent take-down notices to what it claims are 50 websites that post lyrics to songs and generate ad revenue but may not be licensed to do so. The allegedly infringing sites were identified based on a complicated algorithm developed by a researcher at the University of Georgia.” The “complicated algorithm” (basis statistics using Excel and Google) is described in the NMPA’s “Undesirable Lyric Website List.” Anyone remember lyrics.ch? Read more of this story at Slashdot.

Read the original:
Music Industry Issues Take Down Notices to 50 Major Lyrics Sites

Researcher Allows Sand Flea To Grow Inside Her Foot To Study It

sciencehabit writes “Marlene Thielecke came to Madagascar to study the sand flea, an insect that spends part of its life cycle burrowed into the human foot — but she wound up getting more intimate with the critter than she cared for. Months into her project, Thieleckewas bitten by a flea herself. She decided to make the best of it, by taking regular photographs and videos and keeping track of her observations. ‘I thought it might be interesting’ to watch what happened, she says. As it turns out, her experience may help resolve an question entomologists have debated foor decades: Where, exactly, does the sand flea have sex?” Read more of this story at Slashdot.

View original post here:
Researcher Allows Sand Flea To Grow Inside Her Foot To Study It

Google Bots Doing SQL Injection Attacks

ccguy writes “It seems that while Google could really care less about your site and has no real interest in hacking you, their automated bots can be used to do the heavy lifting for an attacker. In this scenario, the bot was crawling Site A. Site A had a number of links embedded that had the SQLi requests to the target site, Site B. Google Bot then went about its business crawling pages and following links like a good boy, and in the process followed the links on Site A to Site B, and began to inadvertently attack Site B.” Read more of this story at Slashdot.

More:
Google Bots Doing SQL Injection Attacks

Ars: Cross-Platform Malware Communicates With Sound

An anonymous reader writes “Do you think an airgap can protect your computer? Maybe not. According to this story at Ars Technica, security consultant Dragos Ruiu is battling malware that communicates with infected computers using computer microphones and speakers.” That sounds nuts, but it is a time-tested method of data transfer, after all. Read more of this story at Slashdot.

Read More:
Ars: Cross-Platform Malware Communicates With Sound

FBI Seized 144,000 Bitcoins ($28.5 Million) From Silk Road Bust

SonicSpike writes “An FBI official notes that the bureau has located and seized a collection of 144, 000 bitcoins, the largest seizure of that cryptocurrency ever, worth close to $28.5 million at current exchange rates. It believes that the stash belonged to Ross Ulbricht, the 29-year-old who allegedly created and managed the Silk Road, the popular anonymous drug-selling site that was taken offline by the Department of Justice after Ulbricht was arrested earlier this month and charged with engaging in a drug trafficking and money laundering conspiracy as well as computer hacking and attempted murder-for-hire. The FBI official wouldn’t say how the agency had determined that the Bitcoin ‘wallet’ — a collection of Bitcoins at a single address in the Bitcoin network — belonged to Ulbricht, but it was sure they were his. ‘This is his wallet, ‘ said the FBI official. ‘We seized this from DPR, ‘ the official added, referring to the pseudonym ‘the Dread Pirate Roberts, ‘ which prosecutors say Ulbricht allegedly used while running the Silk Road.” Read more of this story at Slashdot.

Read this article:
FBI Seized 144,000 Bitcoins ($28.5 Million) From Silk Road Bust

UK Police Seize 3D-Printed ‘Gun Parts,’ Which Are Actually Spare Printer Parts

nk497 writes “Police in Manchester have arrested a man and seized what they claim are 3D printed components to a gun. They made the arrest after a ‘significant’ discovery of a 3D printed ‘trigger’ and ‘magazine, ‘ saying they were now testing the parts to see if they were viable. 3D printing experts, however, said the objects were actually spare parts for the printer. ‘As soon as I saw the picture… I instantly thought, “I know that part, “‘ said Scott Crawford, head of 3D printing firm Revolv3D. ‘They designed an upgrade for the printer soon after it was launched, and most people will have downloaded and upgraded this part within their printer. It basically pulls the plastic filament, and it used to jam an awful lot. The new system that they’ve put out, which includes that little lever that they’re claiming is the trigger, is most definitely the same part.'” Read more of this story at Slashdot.

Read this article:
UK Police Seize 3D-Printed ‘Gun Parts,’ Which Are Actually Spare Printer Parts