Category Archives: Uncategorized

update

I also wanted to send this update that was published on US-CERT that was released a day AFTER I sent my email. One of the IS administrators sent out the email to us about this article.  Link:
https://www.us-cert.gov/ncas/alerts/TA13-309A

On the bottom of this article is some links to more information about CryptoLocker.  It seems that you need to purchase BitCoins to get key to decrypt your files.  Even experts cannot crack the encryption! Link:
http://www.bleepingcomputer.com/virus-removal/CryptoLocker-ransomware-information

This is some real scary  stuff and I hope no one ever has to see this windows appear in real life.  So backup and backup often!

Have a good weekend

Red Alert: 10 Computer Security Blogs You Should Follow Today

Red Alert: 10 Computer Security Blogs You Should Follow Today

Security is an absolute crucial part of computing, and whether it’s a strength of yours or not, you should strive to educate yourself and stay current — I believe anyone who uses a computer should understand and do what they can to prevent security risks. However, if security isn’t a primary interest of yours, this can be difficult to do. Thankfully, there are many experts in this field who do this for us and share their knowledge online. Dave Parrack already covered many security experts to follow on Twitter, if that’s where you prefer to get your information. If you prefer to follow blogs directly, then you’ll want to check out these ten security blogs.

Naked Security

1 naked security

Naked Security is a blog containing security news, opinions, advice, and research from Sophos, a widely recognized security company. Here you can find a wide range of categories from privacy to security threats to operating systems, including mobile, to cryptography and even specific organizations, among the many other categories.

Krebs on Security

2 krebs on security

If you want to stay updated on the most recent security news, Brian Krebs – the guy behind Krebs on Security – is the guy to follow. An informative blog is far more than even a knowledgeable writer behind the posts – it’s also about the community, which Krebs on Security most definitely has.

Troy Hunt

3 troy hunt

This is a personal/professional blog of software architect and Microsoft MVP (Most Valuable Professional), Troy Hunt. His blog primarily focuses on improving software development and application security, but it could consist of anything technology related. He has an excellent insight when it comes to security, but writes in an easily comprehensible style, which is a rare trait among security writers.

ThreatTrack Security Labs Blog

4 threattrack security

ThreatTrack Security specializes in helping organizations and consumers identify and prevent targeted attacks and sophisticated malware from breaking through their security parameters. Their mission is to “provide [their] customers with the best technology solutions to discover and eliminate unknown threats on their IT networks.” Their blog covers everything from current security news to security tips.

Veracode Security Blog

5 veracode blog

Veracode is a security company specialized in application security. Their blog focuses on application security research (of course), and security trends and opinions. Whether you’re a security expert or someone just trying to find some helpful information, Veracode’s blog will be of great assistance to you.

Security Bistro

6 Security Bistro

Although blogs need a community to thrive, they’re still primarily focused on what one or a handful of writers say about a particular topic. And the good bloggers interact with their readers. Security Bistro strives to end that “one-sided” type of blog. They say “it’s more than some journalists and analysts in need for a way of expressing themselves.” Security Bistro is set up like any other blog, but it’s their purpose that is intriguing. Although their readership seems a little low at this point, they’re still fairly new and as long as they continue publishing great content, the readers will come. Their topics cover news and analysis of the latest security threats, cyber attacks, network security, mobile security, data protection and much more.

Facecrooks.com

7 Facecrooks

Because Facebook has become such a significant part of most of our online habits, it makes sense to stay educated with the present security news and risks tied to Facebook. It’d be nice if we didn’t have to worry about them in the first place, but unfortunately Facebook is not free of potential security threats. In addition to protecting yourself from your friends, it would be a good idea to educate yourself on the latest Facebook scams and malicious hoaxes by following Facecrooks.

Darknet

8 darknet

“Don’t learn to hack – hack to learn” – that’s the motto and fundamental mindset of Darknet, a blog that focuses on ethical hacking, penetration testing and computer security. Darknet is an awarded security blog that has been around for quite some time and has generated a loyal reader base. Their content is in depth, interesting, and easy to follow, all of which are practically a must when it comes to trying to understand a new topic.

Microsoft Malware Protection Center

9 Microsoft Malware Protection Center

Microsoft isn’t a stranger to security blogs – TechNet has been around for quite some time. However, their Malware Protection Center blog is quite helpful and current on the most recent threats and news. Of course, there are other blogs – security and otherwise – but I found this one to be the most useful and comprehensive security-wise.

Security Bloggers Network

10 Security Bloggers Network

Security Bloggers Network seems to be a slightly lesser-known security blog, but its content is superb. The benefit of having a network of like-minded bloggers who focus on one specific topic is an overload of exceptional information from various backgrounds and expertise. So how does it work? Security Bloggers Network collects information security focused blog posts and podcasts from all over the world and consolidates them in a single feed, with the authors’ permission of course. Readers like you can then subscribe to their blog, and receive useful information far quicker than going out and finding each individual blog. It is also an excellent way to find new blogs and security experts to follow.

Gmail Stays Up as Google Rejects Microsoft DMCA Takedown Notice

While Google receives millions of DMCA notices for its search service every week, that’s not the only part of its system to be targeted by rightsholders. Working on behalf of entertainment companies, over the past year several anti-piracy companies. Microsoft included, have regularly identified and reported URLs used by Google’s Gmail service as infringing copyright. Fortunately, the system hasn’t come crashing down.

gmailAs thousands of news reports, articles and research papers agree, today’s Internet is absolutely awash with infringing content. As a result, dozens of companies have appeared to try and stem the tide by sending out DMCA takedown notices on behalf of rightsholders.

The number of notices being sent out is nothing short of incredible. During the last full week of September, Google reported that it had processed a record breaking 5.3 million URL takedowns, that’s around eight every second. But yet again the record was short lived.

During the first full week of October, Google processed very close to 6.5 million notices in a single week, that’s an incredible 10.7 notices every single second of every single day.

Faced with a monumental task it’s no surprise that rightsholders make mistakes, everyone is prone to them of course, but some have the potential to cause real havoc.

In an effort to keep an eye on the situation TorrentFreak regularly scours Google’s Transparency Report and the archives on Chilling Effects, and every now and again we find some classics. Yesterday was one of those days.

On the front page of Google’s report the company now lists a few takedown notices that it received but decided not to take action against. As can be seen from the image below listing four instances, the final one targets Gmail.

PiracyPatrol

The notice, which can be found here, was sent by a company called Piracy Patrol. It clearly lists https://mail.google.com/mail/u/1/ as an infringing URL. Of course, that cannot sensibly be the case, and Google spotted the mistake on this occasion and on several others (1,2,3).

“I can only say it was human error – and a rather silly one at that,” Piracy Patrol’s Michael Ward told TorrentFreak.

Of course we all make mistakes, but this incident piqued our interest – do other companies also try to take down parts of Gmail in error? It turns out they do.

In an effort to protect its products from piracy, Microsoft Russia has been sending Google DMCA takedown notices over the past year, around 61,400 in total. One of the products it targets is Windows 8 but as can be seen from this DMCA notice and the accompanying image below, Microsoft can make pretty big errors.

MicroDMCA

Strangely enough, there are even more instances. UK-based anti-piracy company RipBlock has targeted Gmail on many occasions over the past year, the image below illustrates just one.

RipBlockDMCA

Speaking with TorrentFreak, RipBlock said that the submissions were a genuine mistake.

“It’s a simple case of human error. We are not in any way trying to have parts of Google mail taken down,” operations director Lee explained.

“All URLs we submit to Google for removal are checked by our staff, who do their best to avoid submitting incorrect URLs – but we are human and we occasionally make mistakes. Embarrassing for us, for sure, but that’s all.”

Other companies targeting Gmail during the past year include Czech takedown outfit Netlook (notice).

We’re not sure what would’ve happened if Microsoft or the others had been successful in taking down https://mail.google.com/mail/, but we can’t imagine it would help the operation of Gmail. Fortunately Google appears to be staying sharp.

Microsoft bypasses carriers to deliver early Windows Phone updates

Windows Phone Updates
Microsoft may have only just announced Windows Phone 8 Update 3, but the company plans to start delivering it to developers later today. After over a year in the making, Microsoft is finally launching its Windows Phone Preview for developers. The program will provide registered developers with early access to Windows Phone 8 updates, bypassing the complex and lengthy carrier testing process. Microsoft is specifically targeting developers with this program, but for $19 a year any Windows Phone 8 user can sign up and get early access to updates. Even registered Windows Phone App Studio developers will be able to get early access.

Windows Phone 8 users that are registered developers or have a developer-unlocked device will be able to download a Windows Phone Preview for Developers app that enables the early access to updates. There are no restrictions on phone type, only that existing Windows Phone 8 handsets have General Distribution Release 2 (GDR2) installed in order to upgrade to Windows Phone 8 Update 3. After the special app is installed, phones will then update through the normal software update process. While this is the quickest way to access updates, and is similar to how Apple provides early access to iOS developers, Microsoft warns it may void any warranty with a mobile operator or device manufacturer.

YOU MAY HAVE TO TRADE YOUR WARRANTY FOR EARLY UPDATES

If a Windows Phone user opts to install the pre-release updates then they’ll have to wait until the update is released publicly to be in a “released state” as there’s no way to restore back to an older version of Windows Phone 8. The pre-release updates only contain Microsoft’s portion of the update, and the software maker isn’t rolling out any firmware or driver changes alongside its own OS update. Today’s update will bring 1080p display support for unreleased devices, rotation lock, a new Driving Mode, and much more.

Microsoft isn’t detailing how it plans to handle future updates through the Windows Phone Preview program, but it’s possible the company may take an Apple approach and place developers under NDA to provide early access to upcoming updates. Today’s announcement is focused on allowing developers to test apps on real devices ahead of the OS update roll out over the coming weeks. It also provides Microsoft with a way to address the growing frustration over carrier delayed Windows Phone updates. Enthusiasts now have a way to update their handsets before AT&T and others have finished testing the software. It’s a win win for both developers and Windows Phone users.

free-programming-books

Image

Index

Meta-Lists

Graphics Programming

Language Agnostic

Algorithms & Datastructures

Operating systems

Database

Networking

Compiler Design

Programming Paradigms

Parallel Programming

Software Architecture

Information Retrieval

Datamining

Mathematics

Misc

MOOC

Ada

Android

Autotools

ASP.NET MVC

Assembly Language

Bash

C

C++

Clojure

CoffeeScript

ColdFusion

D

DTrace

DB2

Delphi / Pascal

Django

Elasticsearch

Emacs

Erlang

Flask

Flex

F Sharp

Forth

Git

Go

Grails

Hadoop

Haskell

HTML / CSS

Icon

IDL

Java

JavaScript

Node.js

D3.js

LaTeX

Linux

Lisp

Lua

Mathematica

Maven

Mercurial

.NET (C# / VB / Nemerle / Visual Studio)

NoSQL

Oberon

Objective-C

OCaml

OpenSCAD

Oracle Server

Oracle PL/SQL

Parrot / Perl 6

Perl

PHP

PowerShell

Processing

Prolog

PostgreSQL

Python

R

Racket

Ruby

Ruby on Rails

Rust

Sage

Scala

Scheme

Sed

Smalltalk

Subversion

SQL (implementation agnostic)

Teradata

Theory

Vim

Websphere

Windows Phone

Norway will not have the source code for F-35

Norge vil ikke ha kildekoden til F-35

F-35: Crown Prince Haakon and representatives from the Ministry of Defence on tour with Lockheed Martin.

Inspector General of the U.S. Department of Defense has delivered a killer review of quality assurance to the development of what is also Norway’s future fighter aircraft, Lockheed Martin F-35 Lightning II.

F-35 is not only the world’s most advanced flying combat weapons. It is also in recognition of a computer that handles enormous amounts of sensor data and is the brain of a system that will ensure for example, navigation, visibility, communications, weapons, and more.

The disturbing message is that software problems are threatening the F-35 .

Of the eight countries which are America’s partners in the development and procurement of the F-35 is a number that has demanded transparency in combat aircraft source. Norway would however not.

– The source code is not the reason at all. What shall we do with it? We will not sit anyway to turn it. What we need is the insight to consider that everything is as it should be, and that we get, says press officer Change Lunde in the Ministry of Defence to digi.no.

Lunde communications for combat aircraft program emphasizes that all countries will drive the development of the F-35 in the community. – The principle underlying is for everyone to work together. Each country should not make a thousand changes.

But just the opportunity to study, change, and thus have full control of what is the heart and brain in combat weapon, there are several countries that have as requirements.

The government in London had previously put pressure on the United States and threatened to cancel the order, unless the United States gave the British full access to fighter aircraft software. The same has Turkey done without it helped.

Norge skal etter planen få sine første F-35 (modell A) levert i slutten av 2017. Kildekoden sitter imidlertid USA på.

Norway is scheduled to receive its first F-35 (model A) delivered in late 2017. The source code, however, the United States sits on. (Photo: Lockheed Martin)

In 2006, albeit then Prime Minister Tony Blair and President George W. Bush agreed that Britain would have “the opportunity to operate, upgrade, deploy and maintain the F-35 so that the British could have full operational sovereignty over the aircraft” itself.

It was interpreted that the source code would also accrue to the British.

But three years later, the pipe had a different sound. According to Reuters , the U.S. had changed his mind and refused to disclose the source code of some of the partner countries. Jon Schreiber at the Pentagon, press officer for the F-35 program, acknowledged at the time that the decision was not particularly popular among the eight countries that are helping to pay for development: UK, Italy, Netherlands, Turkey, Canada, Australia, Denmark and Norway .

– I’m not going to discuss what other countries have said, Lunde said the Defense Ministry in digi.no take up the issue.

– But what can it be that the British and the Turks have threatened to cancel orders in, if they do not get access to the source code?

– It’s probably a number of other considerations that underlie here, and not that they do not trust manufacturers’ software development. Among other things, some big ambitions around the development of new weapons and systems on their own, and it is probably also a matter of principle for some. It’s not that we have lower requirements to the quality of the software, or do not pay close attention.

– It’s a computer
When the report and answer Lunde that all aircraft projects face challenges with software, that’s it.

– The development of the F-35 is on track. It goes according to plan and will be ready at the time that is required. In Norway, we get our first airplane delivered in the United States for training of instructors in late 2015 and the first aircraft delivered to Norway in late 2017. Two years later, Norway will have planes ready in operation.

Lunde confirms that advanced weapon, the most expensive fighter plane ever, involves a tremendous programming job. No other planes have as much and as advanced data management.

– There was a computer in every possible way. F-35 will initially be upgraded with new software every two years. It will offer new features and capabilities. There is already a long wish list of participating countries about what should be the priority, he said.

The development of software is crucial in both the aircraft’s navigation and weapon system is managed by a joint program office outside of Washington DC in the United States, called Joint Project Office. There is, according to Lunde also ten Norwegians participating. Whether there is some Norwegians involved in programming work he could standing up not saying anything about.

Craig Venter: ‘This isn’t a fantasy look at the future. We are doing the future’

John Craig Venter at Synthetic Genomics

The pioneering American scientist, who created the world’s first synthetic life, is building a gadget that could teletransport medicine and vaccines into our homes or to colonists in space

Craig Venter reclines in his chair, puts his feet up on his desk and – gently stroking his milk chocolate-coloured miniature poodle, Darwin, asleep in his arms – shares his vision of the household appliance of the future. It is a box attached to a computer that would receive DNA sequences over the internet to synthesise proteins, viruses and even living cells.

It could, for example, fill a prescription for insulin, provide flu vaccine during a pandemic or even produce phage viruses targeted to fight antibiotic-resistant bacteria. It could help future Martian colonists by giving them access to the vaccines, antibiotics or personalised drugs they needed on the red planet. And should DNA-based life ever be found there, a digital version could be transmitted back to Earth, where scientists could recreate the extraterrestrial organism using their own life-printing box.

“We call it a Digital Biological Converter. And we have the prototype,” says Venter. I am visiting the office and labs of Venter’s company Synthetic Genomics Incorporated (SGI) in La Jolla, a wealthy seaside enclave north of San Diego, California, where he also lives, because the pioneering American scientist dubbed biology‘s “bad boy” wants to talk about his new book, released this week.

Receiving the 2009 National Medal of Science. Receiving the 2009 National Medal of Science. Photograph: AP

The west coast office of the J Craig Venter Institute (JCVI), his not-for-profit research institute whose research discoveries the company takes forward, is a five-minute drive away. Darwin’s squeaky toys litter the floor and Venter’s wife Heather Kowalski, who is also his publicist, sits within earshot, her legs tucked under her on a sofa. The walls are covered in awards, including his highest honour so far – his 2008 National Medal of Science award (America’s most prestigious scientific prize, bestowed by the president) for his dedication to advancing the science of genomics (the study of the genomes of organisms) and for his work in understanding and communicating its implications. The professional prizes are mixed in with sailing pictures and paraphernalia.

The book, Venter’s second after his 2007 autobiography, is called Life at the Speed of Light: From the Double Helix to the Dawn of Digital Life. It looks at the future Venter is aiming to create through his scientific endeavours in synthetic biology, a kind of turbo-charged version of genetic engineering where scientists design new biological systems – even synthetic life – rather than just tweaking existing organisms by inserting a gene here or there.

In 2010, Venter grabbed the attention of headline writers and scientists around the world by announcing what he calls the “world’s first synthetic life”. He took a synthetic bacterial genome constructed from chemicals in the laboratory and, as Venter puts it, “booted it up” by inserting it into a living single-celled bacterium. The cell replicated itself into a colony of organisms containing only the synthetic DNA.

“It is like a whole new concept of life that until our experiment, no one had,” he says. It was later reviewed by the Presidential Commission for the Study of Bioethical Issues, which gave it the green light and recommended self-regulation by synthetic biologists.

Venter, who has a reputation for arrogance, uses his book to describe the nearly 15 years of scientific work that led up to his 2010 breakthrough. It also positions that work at the pinnacle of years of landmark discoveries by the biggest names in biology.

A reader could be forgiven for thinking the book is really aimed at the Nobel prize committee, but Venter claims he just wants more people to understand him. “One of the motivations for the book is to put this in a historical context because of all the confusion out there when we did it,” he says. “I think the work that we have done with the first genome in history, the human genome and with the first synthetic cell is certainly of the world calibre that obviously earns big prizes. Nobel prizes are very special prizes and it would be great to get one. The book is not a campaign to get one.” Venter also wants people to know about what’s coming next – the futuristic home gadget he is building and how it could allow what Venter calls “biological teleportation”.

Venter With a gene map for a flu-causing bacterium. Photograph: Ruth Frenson/AP

The way he sees it, making a digital copy of an organism’s DNA in one place and sending the file to a device somewhere else that can then recreate the original life-form is not so different from the sci-fi ideal of teleportation where matter moves from place to place in an instant (in the style of “Beam me up, Scotty”). It is just that it was never envisioned this way.

Venter’s isn’t the only recent book by a leading scientist in the field to make wild claims about synthetic biology’s future. Last year, George Church of Harvard proposed in his own book, Regenesis, that Neanderthals might be resurrected with the help of an “extremely adventurous female human”. But Venter, who dismisses Church’s idea as “fanciful” in his book, tells me that his bold ideas are different because here in La Jolla they are becoming real. “Mine is not a fantasy look at the future,” says Venter, “The goal isn’t to imagine this stuff. We are the scientists actually doing this.”

Patrick McCray, a historian of science at the University of California, Santa Barbara, calls Venter a “visioneer”: a scientist who has not only a clear, big and somewhat hubristic view of the future and his role in it but the technical knowhow to make it happen along with the skills to bring money and people to their ideas. “He is no armchair futurist,” he says.

Paul Freemont at Imperial College London admits he can’t think of a scientist with a bigger ego, but believes it is important to have people like Venter, who doesn’t sit in the mainstream scientific establishment. “It invigorates the rapidity of our development and makes public funders aware of things that they are perhaps a bit slow to be aware of,” he says.

Craig Venter as a young boy. Venter as a young boy. Photograph: Book Publisher

John Craig Venter was born in 1946 in Salt Lake City, Utah, but grew up in San Francisco’s Bay Area. After scraping through high school, he moved to southern California to devote his life to the pleasures of surfing, only to be drafted into the Vietnam conflict. It was during those years that Venter the drifter gave way to Venter the over-achiever. Venter served in a navy field hospital caring for wounded soldiers before returning to the US to attend community college, transferring to University of California, San Diego, where he received an undergraduate degree in biochemistry and a PhD in physiology and pharmacology. He believes he has the shortest PhD on record for the University of California: “Just about three years and I published 21 scientific papers.”

Academic and research appointments followed, including at the US National Institutes of Health, where Venter developed a new strategy for rapidly discovering genes. But being a cog in a larger machine rankled, and in 1992 he founded his own non-profit research institute, The Institute for Genomic Research (later absorbed into the JCVI). In 1995, Venter’s team unveiled the first complete genome sequence of a free-living organism, the bacterium Haemophilus influenzae. It was made possible by a technique of Venter’s invention for rapidly reading the code of DNA sequences, called shotgun sequencing.

Venter earned his bad boy tag in 1998, when he created a new company, Celera Genomics, to try and beat the publicly funded effort to becoming the first to sequence the human genome. The $5bn public project was already three years in but had an estimated seven more to go. Venter said Celera would use shotgun sequencing and other new techniques to get the job done in only three years. With some in academia fearing Venter would be able to use patents to lock up access to vital information about human biology, the public project frantically reorganised and a scientific race ensued. Finally, after three years of very unfriendly competition, both efforts jointly announced that the genome had been mapped in 2000.

Erwin Schrödinger Erwin Schrödinger. Photograph: Mary Evans Picture Library / Ala/Alamy

“Some of those people still hate me today,” says Venter. “I tipped the system over and that $5bn was going to be the gravy train for a lot of people for a very long time.” He now dismisses the achievement that may yet earn him a Nobel prize as just a “three-year diversion” from his life’s true work on making synthetic life. The first major breakthrough from that line of work came in 2003, when Venter’s team made simple virus Phi X 174 synthetically. In 2008 he synthesised the genome of a bacteria that infects the human urinary tract, Mycoplasma genitalium. Finally, in 2010 Venter announced that he had made the first synthetic bacterial cell.

Venter is clearly still annoyed by the reception his 2010 result received from some fellow scientists, who argue that he had not created his life “from scratch” because he had used an existing, natural cell to “boot up” the artificial genome. “You see that statement over and over – but what does that even mean?” Venter asks, using the analogy of baking a cake to try to dismiss his sceptics. A baker who starts with flour, sugar, and eggs gets credit for his creation, not accusations that he should have begun with atoms and molecules. Besides, he adds, once the original cell reproduced, the question should be considered settled. “We did rely on pre-existing life as the ‘boot-up’ system for the chromosome,” he says, but then it took over and started running the cell to its own specifications. “In what we call the synthetic cell there is not a single molecule of the original form there – it is like converting you into a frog.”

Venter thinks that with the 2010 announcement he finally answered the question posed by physicist Erwin Schrödinger in his 1944 book written for the lay reader – and of which Venter owns a first edition – What is Life? “Life is a DNA software system,” says Venter. All living things are solely reducible to DNA and the cellular apparatus it uses to run on. The DNA software both creates and directs the more visible “hardware” of life such as proteins and cells.

With that question settled, says Venter, it’s clear that if you give an organism new software by rewriting its genome, you have rewritten the software and life itself. He dismisses his scientific critics who say there is more to remaking life than creating DNA molecules as guilty of a kind of modern day vitalism, the pre-scientific notion that an intangible something sets life apart from other things made from atoms and molecules.

Although Venter works on single cells, he says he believes it holds true for even the most complex organisms. “I can’t explain consciousness yet, but like anything else it will be explainable at the molecular level, the cellular level and therefore the DNA coding level.”

Another common complaint about his 2010 work – that it shows the scientist is intent on “playing God”, Venter seems happy to embrace. “In the restricted sense that we had shown with this experiment how God was unnecessary for the creation of new life, I suppose that we were,” he writes. “We now have a set of tools that never existed before to play ‘creator’,” he says.

Bill Clinton Shakes Hands With Craig Venter Venter meets President Clinton in 2000. Photograph: Mark Wilson/Getty Images

Venter’s current project, the Digital Biological Converter or DBC, is his attempt to put those tools into one convenient box. The current prototype is supported by the US Department of Defence’s research agency Darpa and is eight feet long and six feet high. “We have teams working to minimise it, make it faster and more reliable,” says Venter, who sees the devices – which Synthetic Genomics will sell – in hospitals, workplaces and homes. A major test of the prototype DBC’s capabilities is planned before the end of the year.

The current prototype can produce only DNA, not proteins or living cells, but even that could be enough to make the device practical. Some vaccines are made using just DNA molecules, points out Venter. “If there is a pandemic, everyone around you is dying and you cannot go outdoors, you can download the vaccine in a couple of seconds from the internet,” he says. That digital file would allow DBCs in homes, hospitals and companies to “just spit out a loaded syringe”. His researchers believe their current prototype is already capable of producing DNA precisely enough that it could be used as a vaccine.

Venter also sees a DNA-printing version of his device helping with more regular medical care. It could print out the DNA that encodes the hormone insulin so important to diabetics he says. Adding that DNA to a protein synthesis kit, a tool that is commonplace in research labs around the world, would produce the finished treatment for injection. Venter also has the antibiotics crisis in his sights. Before penicillin, it was common in Russia and eastern Europe to treat some infections using naturally occurring viruses, known as bacteriophages or phages, that killed the bacteria responsible. The DBC could bring back so-called phage therapy and make it more effective, says Venter. “The future will be that if you have a [bacterial] infection you quickly get its genome sequenced – that will take minutes – and in a very short period of time we could design a phage that would attack just that bacteria very specifically,” he says. Because of the way phages attack their bacteria victims, making just the DNA of the one a person needs is enough, says Venter. “The DNA is the drug that kills the bacteria.”

Looking further ahead, Venter intends DBCs to print living cells, using an automated and improved version of the process behind his 2010 breakthrough synthetic cell. Work on that is currently underway, with the focus on creating what he calls the “universal recipient cell”, a kind of biological blank slate able to receive any synthetic genome and come to life. “We have to engineer it but we think it is do-able,” says Venter. It would mean the possibility of ready access to new cells which currently Venter, in other arms of his work along with others, is currently trying to engineer to produce necessities such as therapeutics, food, fuel and clean water. Their genomes could be made available to be downloaded and printed on DBCs around the world.

In parallel to the development of the DBC, Venter’s scientists are also working on a machine called the “digitised life sending unit”, intended to complete his vision of an end-to-end system for biological teleportation. The sending unit’s job is to sample robotically, sequence a genome from the sample, and generate a digital DNA file that is then sent to a DBC to recreate the original life in a new location.

It’s a project that has attracted the support of Nasa, which doubtless hopes that future robotic Mars missions could pack a digitised-life-sending unit so that any Martian microbes discovered could have digital copies of their genomes sent back to Earth. No prototype of the device is yet ready, but Venter has JCVI scientists working in California’s Mojave desert trying to work out how a robot could autonomously isolate microbes from soil and sequence their DNA.

Venter believes that scientists using a DBC on Earth equipped with the universal recipient cell could then re-create a Martian organism in a maximally-contained laboratory. “Having alien species being beamed back here and being recreated does sound like science fiction but it is potentially real,” says Venter, who argues that approach would be far cheaper than trying to bring a sample back to Earth and come with much less risk of contaminating our planet.

Venter believes that any humans that make the trip to the red planet will be packing one of his DBCs, enabling them to receive supplies such as vaccines, antibiotics and cells that become new food sources. “The distances are too great to do it any other way,” he says. “My friend Elon Musk and others are determined to colonise Mars in the not to distant future,” he says, dropping the name of the billionaire founder of PayPal who leads both electric car maker Tesla and private rocket company SpaceX.

Synthetic Genomics Synthetic Genomics.

As to whether we will ever be biologically teleporting humans, Venter gives the notion short shrift. “That is not going to happen any time that we know of … They are two different worlds and two different scales and the science isn’t anywhere remotely supportive of that any more than it is recreating a Neanderthal with a willing woman.”

Venter believes he is able to envision and ultimately achieve such big goals because he has escaped the narrow-mindedness of academic science. He thinks the scientific establishment would get more done if it adopted his way of doing things.

“The trouble is the field of science, medicine, universities, biotech companies – you name it – have been so splintered, layers, sub-divided, hacked that people can spend their entire career studying one tiny little cog of life,” he says, “If I could change the science system my prescription for changing the whole thing would be organising it around big goals and building teams to do it. That is what we do – I have created team science versus the university system with 200 prima donnas each with their own little space.”

Interview over we leave Synthetic Genomics main building and take a short drive in Venter’s 1996 Aston Martin – Venter collects car and motorbikes – through the Synthetic Genomics campus and down past his algae greenhouses (where Venter’s scientists are experimenting with the cells of the future) to our destination: Venter’s new DNA synthesis factory. The dog, Darwin, who has travelled down separately with Kowalski, also joins us for the tour.

Inside the gleaming building, only six months old, white-coated technicians work with liquid-handling robots which pipette chemicals and enzymes to fill customers orders for pieces of synthetic DNA (pharmaceutical and agricultural companies are the main ones so far). Other companies also synthesise DNA commercially, but Venter’s is making the largest and most complex.Then someone mentions the DBC. “Should I show it to her … we have part of it here?,” one of the lab managers asks Venter. Looks are exchanged. However, it is clearly not in Venter’s master plan for today.

Comms giant pushes anti-spy network

Photo: DPA

Germany’s biggest communications company, Deutsche Telekom, has put forward plans for the country to use German only connections in a bid to combat the threat of foreign spy agencies and hackers.

 

The former state-owned communications giant outlined the plans at a secret meeting in the Economy Ministry, according to magazine Wirtschaftswoche.

The country’s three biggest email providers, Deutsche Telekom, GMX and Web.de, announced in August that they would bolster security by encrypting their email traffic.

But Telekom now wants to go a step further by using domestic only connections to protect the private data of German users in the wake of the NSA spying scandal. Whistleblower Edward Snowden revealed a massive electronic surveillance programme by the US and British security agencies.

Email data is currently exchanged between users worldwide via international network hubs, where the data is processed and then sent on to its destination.

But this system has come into disrepute since information leaked by Snowden showed the US and UK governments had used the hubs to spy on millions of private emails.

Deutsche Telekom’s plan would change the system so that emails between German users are no longer transferred via the international hubs, but stay in networks within German borders.

“We want to guarantee that between sender and receiver in Germany, not a single byte leaves the country, or even crosses the border temporarily,” explained Thomas Kremer, the firm’s director of data protection.

But on Monday it was unclear how Deutsche Telekom would achieve this feat, which would also require the company’s competitors to agree to bypass the international hubs, some of which are in the UK.

The alternative would be a law forcing providers to cooperate.

Deutsche Telekom and two subsidiaries of United Internet had already created the “Email made in Germany” initiative in August 2013.

The system aimed to prove a national network was possible by specially encrypting emails and saving them in secure databanks within German borders.

But web activists criticized the scheme as a cheap PR stunt. They pointed out the emails would only be protected while they were in transit, and will still be decrypted and re-encrypted by the providers to check for malware (malicious software).

Experts are not agreed on whether a secure national email network is even possible.

Thomas Bösel, head of data protection at internet service provider QSC, said: “On the internet it just isn’t possible to know without a doubt whether data will be routed nationally or internationally.”

What the World Would Look Like If Countries Were As Big As Their Online Populations

The Internet we each see every day is an infinitesimally tiny sliver of the whole—the parts we have curated for ourselves, the parts our network of friends and family sends to us, and the sites that we have made parts of our routines.

But beyond this micro-level editing, there are also macro forces at work: The Internet largely exists for and is created by the people who are on it. The map above gives a rough idea of who those people are—or, at least, where they are.

The map, created as part of the Information Geographies project at the Oxford Internet Institute, has two layers of information: the absolute size of the online population by country (rendered in geographical space) and the percent of the overall population that represents (rendered by color). Thus, Canada, with a relatively small number of people takes up little space, but is colored dark red, because more than 80 percent of people are online. China, by contrast, is huge, with more than half a billion people online, but relatively lightly shaded, since more than half the population is not online. Lightly colored countries that have large populations, such as China, India, and Indonesia, are where the Internet will grow the most in the years ahead. (The data come from the World Bank’s 2011 report, which defines Internet users as “people with access to the worldwide network.”)

Another map, from Nature provides a good point of comparison. This map shows countries by their population size, visually portraying the data that the shading in the first map is based on:

China, of course, dominates both. But what is interesting in comparing the two is how outsized Europe and South Korea are in the Internet population map, captured in their darker shading. In fact, all but four of the countries with more than 80 percent of their populations online are in Europe: South Korea, New Zealand, Qatar, and Canada. Together with much of Europe, these are the parts of the world that have gotten the vast majorities of their people online the fastest.

Mark Graham and Stefano De Sabbata, the creators of the top map (and also ofthe “Internet Empires” map from last week), highlight two additional trends:

First, the rise of Asia as the main contributor to the world’s Internet population; 42% of the world’s Internet users live in Asia, and China, India, and Japan alone host more Internet users than Europe and North America combined.

Second, few of the world’s largest Internet countries fall into the top category (>80%) of Internet penetration (and indeed India falls into the lowest category, at <20% penetration). In other words, in all of the world’s largest Internet nations, there is still substantial room for growth.

They also note that although many African countries appear relatively very small on the Internet penetration map, many of these countries have experienced the fastest growth since their last such map, from 2008, when they didn’t even appear:

Graham and De Sabbata write:

In the last three years, almost all North African countries doubled their population of Internet users (Algeria being a notable exception). Kenya, Nigeria, and South Africa, also saw massive growth. However, it remains that over half of Sub-Saharan African countries have an Internet penetration of less than 10%, and have seen very little grow in recent years.

The portrait of the world that the map depicts is one of very uneven access to the Internet, with the vast majority of people disconnected from this global network. Bear in mind, the authors say, that overall “only one third of the world’s population has access to the Internet.”

Microsoft Corp pays US$100K bounty to hacking expert who uncovered Windows bug that could have been used to launch remote attacks

James Forshaw, who heads vulnerability research at a London-based security consulting firm, won Microsoft’s first US$100,000 bounty for identifying a new “exploitation technique” in Windows, which will allow it to develop defenses against an entire class of attacks, the software maker said this week.

Mandy Cheng/AFP/Getty ImagesJames Forshaw, who heads vulnerability research at a London-based security consulting firm, won Microsoft’s first US$100,000 bounty for identifying a new “exploitation technique” in Windows, which will allow it to develop defenses against an entire class of attacks, the software maker said this week.

BOSTON — Microsoft Corp said on Tuesday it is paying a well-known hacking expert more than US$100,000 for finding security holes in its software, one of the largest such bounties awarded to date by a high-tech company.

Microsoft investors wait for next catalyst

Microsoft Corp.’s quarterly dividend hike to US28¢ per share and new US$40-billion share-buyback program on Tuesday caps a slew of recent announcements for the tech giant, but may not leave investors many further upside catalysts. Keep reading.

The software maker also released a much anticipated update to Internet Explorer, which it said fixes a bug that made users of the world’s most popular browser vulnerable to remote attack.

James Forshaw, who heads vulnerability research at London-based security consulting firm Context Information Security, won Microsoft’s first US$100,000 bounty for identifying a new “exploitation technique” in Windows, which will allow it to develop defenses against an entire class of attacks, the software maker said on Tuesday.

Forshaw earned another US$9,400 for identifying security bugs in a preview release of Microsoft’s Internet Explorer 11 browser, Katie Moussouris, senior security strategist with Microsoft Security Response Center, said in a blog.

Microsoft unveiled the reward programs four months ago to bolster efforts to prevent sophisticated attackers from subverting new security technologies in its software, which runs on the vast majority of the world’s personal computers.

Forshaw has been credited with identifying several dozen software security bugs. He was awarded a large bounty from Hewlett-Packard Co for identifying a way to “pwn,” or take ownership of, Oracle Corp’s Java software in a high-profile contest known as Pwn2Own (pronounced “pown to own”).

Microsoft also released an automatic update to Internet Explorer on Tuesday afternoon to fix a security bug that it first disclosed last month.

Researchers say hackers initially exploited that flaw to launch attacks on companies in Asia in an operation that the cybersecurity firm FireEye has dubbed DeputyDog.

Marc Maiffret, chief technology officer of the cybersecurity firm BeyondTrust, said the vulnerability was later more broadly used after Microsoft’s disclosure of the issue brought it to the attention of cyber criminals.

He is advising computer users to immediately install the update to Internet Explorer, if they do not have their PCs already set to automatically download updates.

“Any time they patch something that has already been used (to launch attacks) in the wild, then it is critical to apply the patch,” Maiffret said.

That vulnerability in Internet Explorer was known as a “zero-day” because Microsoft, the targeted software maker, had zero days notice to fix the hole when the initial attacks exploiting the bug were discovered.

In an active, underground market for “zero day” vulnerabilities, criminal groups and governments sometimes pay $1 million or more to hackers who identify such bugs.