MilliDelta robot surgeon is the size of a one cent coin

Another tiny robot is gearing up to join the ranks of microsurgeons , but this one is small enough to fit in your coin purse. Inspired by pop-up books and origami, the milliDelta bot measures mere millimetres when unfolded (roughly the size of a one cent coin). But, even at that scale, the miniature helper packs flexible joints and bending, piezoelectric actuators that allow it to work with force, precision, and high speed. Its creators (from Harvard’s Wyss Institute for Biologically Inspired Engineering and the John A. Paulson School of Engineering and Applied Sciences) claim it can perform a range of microsurgery and manufacturing tasks in compact spaces. Unlike existing Delta robots, which scientists have been shrinking down for workspace use for years, the new bot is a swift operator. “Currently available Delta robots are only able to operate at a few hertz, ” said Hayley McClintock, a Harvard researcher who helped design the device. “So for our robot to be able to draw circles at frequencies up to 75 Hz is quite impressive.” Scientists developed the new bot using a technique known as pop-up microelectromechanical systems (MEMS), allowing them to create a complex structure from flat pieces of materials. The same approach was used to create the flying RoboBee . Next up for the milliDelta bot, the researchers plan to refine its specs in order to pin down its final design and add power and control electronics. Source: ScienceRobotics

Read the article:
MilliDelta robot surgeon is the size of a one cent coin

Malicious apps with >1 million downloads slip past Google defenses twice

Enlarge / One of the fee-based services ExpensiveWallpaper apps subscribed users to. Researchers recently found at least 50 apps in the official Google Play market that made charges for fee-based services without the knowledge or permission of users. The apps were downloaded as many as 4.2 million times. Google quickly removed the apps after the researchers reported them, but within days, apps from the same malicious family were back and infected more than 5,000 devices. The apps, all from a family of malware that security firm Check Point calls ExpensiveWall, surreptitiously uploaded phone numbers, locations, and unique hardware identifiers to attacker-controlled servers. The apps then used the phone numbers to sign up unwitting users to premium services and to send fraudulent premium text messages, a move that caused users to be billed. Check Point researchers didn’t know how much revenue was generated by the apps. Google Play showed the apps had from 1 million to 4.2 million downloads. Packing heat ExpensiveWall—named after one of the individual apps called LovelyWall—used a common obfuscation technique known as packing. By compressing or encrypting the executable file before it’s uploaded to Play, attackers can hide its maliciousness from Google’s malware scanners. A key included in the package then reassembled the executable once the file was safely on the targeted device. Although packing is more than a decade old, Google’s failure to catch the apps, even after the first batch was removed, underscores how effective the technique remains. Read 3 remaining paragraphs | Comments

More:
Malicious apps with >1 million downloads slip past Google defenses twice