忍者ブログ
Technical News
[21]  [22]  [23]  [24]  [25]  [26]  [27]  [28]  [29]  [30]  [31
×

[PR]上記の広告は3ヶ月以上新規記事投稿のないブログに表示されています。新しい記事を書く事で広告が消えます。

Mac Attack Targets Porn Surfers

Does a scheme for stealing personal information from Mac OS X users mean that a few bad Apples are about to spoil the bunch?
Science Image:

ENEMY AT THE GATE:  Reports surfaced earlier this week of a malicious new Trojan Horse-like piece of software that has the potential to let cyber thieves take control of infected Mac computers.

Be warned: Apple's comeback in the world of personal computing brings with it a heightened level of security risks for its customers, not unlike those Microsoft Windows devotees have faced for years. Reports surfaced earlier this week of a malicious new Trojan horse–like piece of software found on several pornography Web sites that has the potential to let cyber thieves take control of infected Mac computers so they can steal personal information.

Trojans are known for their ability to appear to be legitimate and necessary pieces of software that turn malicious once installed. Although the new Mac Trojan is easy to avoid because it is mostly limited to porn sites (and who visits those?), computer security experts say this piece of malware has the hallmark of being written by professional cyber criminals and is likely to be a sign of more bad things to come for Apple fans.

"This one comes from a professional source that's testing the water—maybe to see how Mac users react and how difficult it is to get Mac-specific malware out into the world," says David Harley, a computer security consultant based in England. "From the analyses that I've seen, it's got the fingerprints of the Zotob malware that's been around for awhile." Zotob, a type of computer infection called a worm, was written by a pair of programmers who were arrested shortly after its release in 2005. Zotob spawned a number of variant worms that continue to infect Windows PCs by spreading malicious code from computer to computer and installing backdoor programs that give cyber attackers access to personal information. These worms also allow attackers to remotely control the infected computers, which means they can use them as a launching pad for spam e-mail without the knowledge of the computers' owners.

 

Science Image

DON'T DO IT!:  Web surfers visiting a Web site infected with the Trojan will be greeted with a deceptive message stating that a special video codec is required to view free pornographic videos.

 
Even worse, Trojans often use a technique known as social engineering to trick Web surfers into downloading them onto their computers. If a surfer visits a pornographic Web site infected with the Trojan, she will be greeted with a message stating that a special video codec is required to view free videos. A codec is a program used to encode and decode digital information so that it can be viewed only by those with permission to do so. If the surfer proceeds with the installation, the Trojan downloads to her computer with the ability to manipulate that computer's Domain Name System (DNS) server, which is then used to look up the correspondences between domain names such as SciAm.com and the IP addresses of Web sites and other Internet services. From then on, cyber criminals can hijack that infected computer, redirecting Web surfers from legitimate Web sites to those designed to steal Social Security, credit card or other personal information.

The Mac Trojan uses "simple social engineering, which works time and time again on Windows users, and I see no reason why it won't work with Mac users as well," Harley says.

The most dangerous security threat to computer users is one that takes advantage of software flaws before Apple, Microsoft or any other software company is aware these defects exist. Although Microsoft Windows users have been dealing with such so-called zero-day threats for years, Apple Mac users have generally been spared by cyber attackers because there are simply more Windows users to target.

This new Trojan, however, affects Mac computers running OS X versions 10.4 (Tiger) and 10.5 (Leopard), according to reports from about a dozen information technology security research firms, including Austin, Tex.–based Intego, which first discovered the problem. Of course, such companies also sell software used to combat computer security threats and have been routinely criticized by Apple, Microsoft and other companies for pointing out security flaws (legitimate as they may be) in order to sell more of their security products. Apple did not respond to a request to be interviewed for this story.

The good news is that Web surfers can prevent infection simply by not downloading the fake codec software, or by avoiding porn sites altogether—whichever is easier.

 

PR

Pollock or Not? Can Fractals Spot a Fake Masterpiece?

Complex geometric patterns turn up in non-Pollock drip paintings
Science Image: drip painting

FRACTAL, BUT NOT A POLLOCK:  Researchers say that fractal patterns are no reliable way to distinguish genuine Pollock drip paintings from similar works such as this fractal-laced creation of two undergraduate students.  

A new study attacks the technique of using fractals, the repeating patterns found in everything from coastlines to fern fronds, to help distinguish authentic Jackson Pollock drip paintings from paint splattered by lesser hands.

In a paper submitted for publication to a major physics journal, researchers report that previously published criteria for identifying genuine Pollocks based on the presence of fractals—patterns that recur in varying sizes like Russian dolls nested inside one another—would wrongly grant Pollock status to a pair of amateur drip paintings.

Some researchers, however, are skeptical that the new method faithfully replicates that of University of Oregon physicist
Richard Taylor, who first reported eight years ago that five Pollock paintings contained distinctive splatters within splatters, which he has attributed to the way "Jack the Dripper" swayed over the canvas while dribbling paint from brushes, sticks or straight from the can.

The Pollock–Krasner Foundation, which represents the estates of Pollock and his wife Lee Krasner, commissioned Taylor last year to examine six of 32 alleged Pollock drip paintings for fractal clues as to whether the master dripper (dead since 1956) had truly created them; the paintings, discovered in 2003, turned up fractalless.

Upon learning the news, physicists Katherine Jones–Smith and Harsh Mathur of Case Western Reserve University in Cleveland, Ohio, published their own Nature paper reporting the discovery of a similar fractal signature in quick sketches of different size stars or circles.

Jones–Smith had drawn the images two years earlier while preparing a presentation on Taylor's work, which she initially believed was correct. Much to her surprise, she discovered that her unsophisticated images contained seemingly identical fractal patterns.

To rebut the obvious counterargument—that stars look nothing like drip paintings—she, Mathur and Case Western cosmologist Lawrence Krauss have now analyzed three known Pollock drip paintings that Taylor had not examined in detail: Free Form (1946), Untitled (circa 1950) and Wooden Horse: Number 10A, 1948.

Science Image: stars

STAR STRUCK:  This crude drawing of stars exhibited the same self-repeating fractal pattern as a Jackson Pollock drip painting, according to a 2006 study.

 
After using one of two separate computer techniques to isolate splatter marks of different colors, the researchers scanned for fractals in each layer of color by digitally counting colored pixels (or boxes) of various sizes. In this type of fractal, the number of boxes of each size relates to the box size raised to a power that holds constant over a range of sizes.

None of the Pollocks met stringent fractal criteria, although Free Form did satisfy what they consider a loose definition of a fractal and Wooden House failed its test in only two of six colors, they report in their paper submitted to Physical Review Letters, which has yet to be reviewed by other scientists.

Further complicating matters, the researchers identified fractals in two drip paintings created for the study by students [see image above]. They next examined two of the alleged Pollocks studied by Taylor, one of which, chosen for its resemblance to Free Form, passed the loose fractal test, whereas the other, resembling Wooden Horse, failed the test.

The new results clash with a 2006 Pattern Recognition Letters paper in which Taylor and colleagues reported identifying an identical fractal pattern in 14 known Pollocks but not among 37 drip paintings by University of Oregon undergraduates or 14 paintings of unknown origin thought to date to Pollock's era.

"Our position," Mathur says, "is that fractal analysis doesn't allow you to have a position" on the authenticity of a Pollock.

Hany Farid, a professor of computer science at Dartmouth College in New Hampshire who has followed the debate, says he sees flaws in the new study. "I think they took a fairly simplistic way of separating those colors," which he says could have skewed their results. 

Taylor argues that the researchers applied his fractal criteria incorrectly on Untitled and notes that their Wooden Horse analysis hinges on paint covering less than 5 percent of the canvas, which makes drawing conclusions tricky.

Moreover, he says, the group's conclusion turns on a misconception. "There's an image out there of fractal analysis where you send the image through a computer and if a red light comes on it means it isn't a Pollock and if a green light comes on it is. We have never supported or encouraged such a mindless view." 

Even if the new results are correct, Farid says, fractal analysis can still serve as one piece of evidence in the broader puzzle of authentication, which also involves historical and aesthetic judgments. Earlier this year, for example, a Harvard team reported that two pigments found in the 32 alleged Pollocks were not used in paints before 1996 and 1971.

"None of these tools stands by itself," Farid says.

Owners of authentic Pollocks, however, do stand to make a lot of money. Last year, the Pollock painting No. 5, 1948, was reportedly sold to a Mexican financier for a record $140 million. 

Robots Prepare for the Battlefield by First Fighting City Traffic

DARPA is set to crown the winner of its 2007 Urban Challenge, featuring autonomous autos that try to stop, go and merge as well as humans
 
Science Image:

NO DRIVERS WANTED:  The Caltech team's 2004 Ford E350 van named Alice was equipped with 12 computers, eight cameras, two radar devices and eight laser range finders that measure distance by emitting infrared pulses.

 

As sophisticated as machines are today, they still cannot navigate an automobile through crowded city streets as well as experienced human drivers. But the Defense Advanced Research Projects Agency (DARPA) is working to change that with an eye toward sending automated robotic ground vehicles into battle to evacuate wounded soldiers, collect reconnaissance and carry out other dangerous missions.

This weekend DARPA, the U.S. Department of Defense's central research and development arm, will move closer to that goal when it hosts the final round of its 2007 DARPA Urban Challenge, a competition testing the driving prowess of experimental unmanned autos. The agency has whittled the field down from 89 to 11 teams of gearheads, scientists and students who will test their autonomous creations at the former George Air Force Base in Victorville, Calif. The winner will drive away with $2 million and those snagging second and third places will get $1 million and $500,000, respectively.

Unlike the
DARPA Grand Challenges held in 2004 and 2005 in the Mojave Desert, this year's competition tests whether a vehicle—which must run entirely on its own using a system of sensors, global positioning systems and computers—can handle the types of driving conditions that city dwellers face every day, such as changing lanes, merging onto roadways with fast-moving traffic and traversing busy intersections. (Fortunately, they will not have to contend with iPod-wearing pedestrians, cell phone–gabbing drivers or unpredictable cabbies.)

Congress six years ago passed a measure mandating: "It shall be a goal of the Armed Forces to achieve the fielding of unmanned, remotely controlled technology such that…by 2015, one third of the operational ground combat vehicles are unmanned" with an eye toward one day handing over "dull, dirty or dangerous" tasks to machines.

The first Grand Challenge was held in March 2004 and featured a 142-mile (228.5-kilometer) desert course. Fifteen autonomous ground vehicles entered but nary a one made it to the finish line. The following year four autonomous vehicles successfully completed a 132-mile (212-kilometer) desert route within the required 10-hour limit. That year, "Stanley," a modified Stanford University Volkswagen Touareg R5 featuring six wireless laptop computers powered by Intel Pentium M processors running custom artificial intelligence software, claimed the top $2-million prize.

Science Image

CROSSROADS:  Oshkosh Truck Corp.'s TerraMax unmanned ground vehicle—one of 11 finalists competing November 3—waits patiently for traffic to clear.

 
Despite the initial dearth of finishers (not to mention the absence of a competition last year as DARPA retooled the event), the agency is satisfied that the military is on the right track, DARPA public information officer Jan Walker says. But an autonomous vehicle must be able to traverse all types of terrain—from the city to the desert to the jungle to the mountains—to meet military demands. "The biggest difference with this year's competition," Walker says, "is that they have to be able to respond to a dynamic, unpredictable environment."

Despite the dramatic exploits of fictionalized robots in books and movies (who could forget the Terminator's skill behind the wheel?), artificial intelligence may not be up to the multitasking required to analyze the constantly changing conditions and other demands of driving. "The really interesting challenge in technology is building machines that do the types of things that people do so you can put [these machines] deep under the ocean or in outer space," says Richard Murray, a professor of control and dynamical systems at the California Institute of Technology's Division of Engineering and Applied Science. Murray's Caltech team entered the DARPA competition with a 2004 Ford E-350 van named Alice, whose artificial intelligence was created by the joint effort of 80 undergraduate and graduate students, postdoctoral candidates and faculty as well as engineers from NASA's Jet Propulsion Laboratory in Pasadena, Calif.

Alas, despite some early success, Alice failed to advance to this weekend's final round. Equipped with eight cameras, two radar devices and eight laser range finders that measure distance by emitting infrared pulses, Alice nonetheless had trouble stopping and going at intersections and merging into traffic to DARPA's satisfaction. In one instance, Alice stopped at an intersection, advanced when the road was clear of traffic, but slowed down again because she mistakenly perceived a concrete guardrail to be an obstacle. "We would stop and not go and get honked at," Murray says. Alice at times also failed to identify the line in the road signaling her to stop at intersections and either stopped too late or not at all. (Although that may be good enough to get her a gig as a taxi in New York City.)

Alice has since been shipped back to Pasadena so that Murray and his team can study her computer's data logs and better understand her behavior. The van contains about a dozen computers running the open-source Linux operating system and a number of open-source software applications designed to process information gathered by the cameras, radar and laser range finders. Students plan to continue using Alice to test their research into the development of autonomous vehicles.

"Driving is a great example of something that humans [can] do really well that requires the need to think about a number of problems simultaneously, like working the pedals, steering the wheel and watching the road, all while thinking about where you're going," Murray says. "The DARPA challenges have really pushed the state of the art in that area." DARPA wants artificial intelligence that can measure a situation and make wise decisions based on the information it collects. "Right now we have people doing that," he says, "because we don't know how to make machines do it."

Melting Glacier Reveals Ancient Tree Stumps

Melting glaciers in Western Canada are revealing tree stumps up to 7,000 years old where the region's rivers of ice have retreated to a historic minimum, a geologist said today.

Johannes Koch of The College of Wooster in Ohio found the fresh-looking,
intact tree stumps beside retreating glaciers in Garibaldi Provincial Park, about 40 miles (60 kilometers) north of Vancouver, British Columbia.

Radiocarbon dating of
the wood from the stumps revealed the wood was far from fresh—some of it dated back to within a few thousand years of the end of the last ice age.

"The stumps were in very good condition, sometimes with bark preserved," said Koch, who conducted the work as part of his doctoral thesis at Simon Fraser University in Burnaby, British Columbia. Koch will present his results on Oct. 31 at the Geological Society of America annual meeting in Denver.

The pristine condition of the wood, he said, can best be explained by the stumps having spent all of the last seven millennia under tens to hundreds of meters of ice. All stumps were still rooted to their original soil and location.

"Thus they really indicate when the glaciers overrode them, and their kill date gives the age of the glacier advance," Koch said. The age of the newly revealed ancient trees also indicates how long the glaciers have covered this region.

The recently warming climate released the stumps from their icy tombs, Koch said.

Koch compared the kill dates of the trees in the southern and northern Coast Mountains of British Columbia and those in the mid- and southern Rocky Mountains in Canada to similar records from the Yukon Territory, the European Alps, New Zealand and South America. He also looked at the age of Oetzi, the prehistoric mummified alpine "Iceman" found at Niederjoch Glacier, and similarly well-preserved wood from glaciers and snowfields in Scandinavia.

The radiocarbon dates seem to be the same around the world, according to Koch. There have been many advances and retreats of these glaciers over the past 7,000 years, but no retreats that have pushed them back so far upstream as to expose these trees.

The age of the tree stumps gives new emphasis to the well-documented before-and-after photographs of retreating glaciers during the past 100 years.

"It seems like an unprecedented change in a short amount of time," Koch said. "From this work and many other studies looking at forcings of the climate system, one has to turn away from natural ones alone to explain this dramatic change of the past 150 years."

Scientists note brain's reaction to fear

Science is getting a grip on people's fears. As Americans revel in all things scary on Halloween, scientists say they now know better what's going on inside our brains when a spook jumps out and scares us. Knowing how fear rules the brain should lead to treatments for a major medical problem: When irrational fears go haywire.

"We're making a lot of progress," said University of Michigan psychology professor Stephen Maren. "We're taking all of what we learned from the basic studies of animals and bringing that into the clinical practices that help people. Things are starting to come together in a very important way."

About 40 million Americans suffer from anxiety disorders, according to the National Institute of Mental Health. A Harvard Medical School study estimated the annual cost to the U.S. economy in 1999 at roughly $42 billion.

Fear is a basic primal emotion that is key to evolutionary survival. It's one we share with animals. Genetics plays a big role in the development of overwhelming — and needless — fear, psychologists say. But so do traumatic events.

"Fear is a funny thing," said Ted Abel, a fear researcher at the University of Pennsylvania. "One needs enough of it, but not too much of it."

Armi Rowe, a Connecticut freelance writer and mother, said she used to be "one of those rational types who are usually calm under pressure." She was someone who would downhill ski the treacherous black diamond trails of snowy mountains. Then one day, in the midst of coping with a couple of serious illnesses in her family, she felt fear closing in on her while driving alone. The crushing pain on her chest felt like a heart attack. She called 911.

"I was literally frozen with fear," she said. It was an anxiety attack. The first of many.

The first sign she would get would be sweaty palms and then a numbness in the pit of the stomach and queasiness. Eventually it escalated until she felt as if she was being attacked by a wild animal.

"There's a trick to panic attack," said David Carbonell, a Chicago psychologist specializing in treating anxiety disorders. "You're experiencing this powerful discomfort but you're getting tricked into treating it like danger."

These days, thanks to counseling, self-study, calming exercises and introspection, Rowe knows how to stop or at least minimize those attacks early on.

Scientists figure they can improve that fear-dampening process by learning how fear runs through the brain and body.

The fear hot spot is the amygdala, an almond-shaped part of the deep brain.

The amygdala isn't responsible for all of people's fear response, but it's like the burglar alarm that connects to everything else, said New York University psychology and neural science professor Elizabeth Phelps.

Emory University psychiatry and psychology professor Michael Davis found that a certain chemical reaction in the amygdala is crucial in the way mice and people learn to overcome fear. When that reaction is deactivated in mice, they never learn to counter their fears.

Scientists found D-cycloserine, a drug already used to fight hard-to-treat tuberculosis, strengthens that good chemical reaction in mice. Working in combination with therapy, it seems to do the same in people. It was first shown effective with people who have a fear of heights. It also worked in tests with other types of fear, and it's now being studied in survivors of the World Trade Center attacks and the Iraq war.

The work is promising, but Michigan's Maren cautions that therapy will still be needed: "You're not going to be able to take a pill and make these things go away."

When it comes to ruling the brain, fear often is king, scientists say.

"Fear is the most powerful emotion," said University of California Los Angeles psychology professor Michael Fanselow.

People recognize fear in other humans faster than other emotions, according to a new study being published next month. Research appearing in the journal Emotion involved volunteers who were bombarded with pictures of faces showing fear, happiness and no expression. They quickly recognized and reacted to the faces of fear — even when it was turned upside down.

"We think we have some built-in shortcuts of the brain that serve the role that helps us detect anything that could be threatening," said study author Vanderbilt University psychology professor David Zald.

Other studies have shown that just by being very afraid, other bodily functions change. One study found that very frightened people can withstand more pain than those not experiencing fear. Another found that experiencing fear or merely perceiving it in others improved people's attention and brain skills.

To help overcome overwhelming fear, psychologist Carbonell, author of the "Panic Attacks Workbook," has his patients distinguish between a real threat and merely a perceived one. They practice fear attacks and their response to them. He even has them fill out questionnaires in the middle of a fear attack, which changes their thinking and causes reduces their anxiety.

That's important because the normal response for dealing with a real threat is either flee or fight, Carbonell said. But if the threat is not real, the best way to deal with fear is just the opposite: "Wait it out and chill." 

Vanderbilt University psychology professor David Zald is shown in front of his Nashville, Tenn. home decorated for Halloween Tuesday, Oct. 30, 2007. At the university, Zald studies how adults react to fear. At his home on Halloween, he watches how children respond to it. (AP Photo/Mark Humphrey)

Vanderbilt University psychology professor David Zald is shown in front of his Nashville, Tenn. home...



Calendar
12 2025/01 02
S M T W T F S
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31
Timepiece
タグホイヤー フォーミュラー1 ドリームキャンペーン
Blog Plus
SEO / RSS
Podcast
by PODCAST-BP
New TB
Bar Code
Data Retrieval
Oldest Articles
(09/30)
(09/30)
(09/30)
(09/30)
(09/30)
Photo Index
Reference
Latina




RSS Reader
無料RSSブログパーツ
Misc.
◆BBS


◆Chat


◆Micro TV


Maps



顔文字教室




Copyright © Tech All Rights Reserved.
Powered by NinjaBlog
Graphics by 写真素材Kun * Material by Gingham * Template by Kaie
忍者ブログ [PR]