Wearable motion capture tech uses a single fisheye camera

Typically, motion capture systems are confined to one studio containing multiple cameras, and they require subjects to wear sensor-equipped body suits. A new setup, however, is based around a single chest-mounted camera.Continue ReadingCategory: Scienc… Continue reading Wearable motion capture tech uses a single fisheye camera

Computer vision tech helps robots get a grasp on transparent objects

In order to see and then grasp objects, robots typically utilize depth-sensing cameras like the Microsoft Kinect. And while such cameras may be thwarted by transparent or shiny objects, scientists at Carnegie Mellon University have developed a work-aro… Continue reading Computer vision tech helps robots get a grasp on transparent objects

System uses smartphone video to produce detailed 3D facial models

Ordinarily, if you want to create a lifelike three-dimensional digital model of someone’s face, a 3D scanner and/or multiple cameras are required. Now, however, scientists from Pittsburgh’s Carnegie Mellon University have created a system that lets a s… Continue reading System uses smartphone video to produce detailed 3D facial models

Intel pushes for hardware-specific additions to vulnerability taxonomy

The professionals who work to uncover security vulnerabilities in hardware must find a “common language” for categorizing them in order to make important strides in securing those systems, according to chipmaking giant Intel Corp. Hardware researchers “do not have the same standard taxonomy that would enable them to share information and techniques with one another,” Intel researchers Arun Kanuparthi and Hareesh Khattri argued in an op-ed published this week on Help Net Security, an information security website. “If we expect hardware vendors and their partners to collectively deliver more secure solutions, we must have a common language for discussing hardware security vulnerabilities,” Kanuparthi and Khattri wrote. At issue is the Common Weakness Enumeration (CWE) system, a list that is used as a yardstick on which to map Common Vulnerabilities and Exposures (CVE). CVEs are more familiar to security researchers as signposts for potential threats, and they’re a notch in the belt […]

The post Intel pushes for hardware-specific additions to vulnerability taxonomy appeared first on CyberScoop.

Continue reading Intel pushes for hardware-specific additions to vulnerability taxonomy

Inside the FBI’s quiet ‘ransomware summit’

In March, officials in sparsely populated Jackson County, Georgia, made a painful decision. Rather than rebuild their networks from scratch, they paid $400,000 to hackers to get the county’s data back. The six-figure amount — eclipsed by a nearly $600,000 payment made by a Florida city in June — is symptomatic of a much larger problem. Across the U.S., poorly secured businesses, local governments, and schools have lost millions of dollars to attackers who can cheaply buy access to ransomware-as-a-service kits on underground forums. The problem is by some measures growing more acute: Over 100 public-sector ransomware attacks have been reported in 2019 alone, double the amount in 2018. To help stem the tide of file-locking attacks, the FBI quietly convened the country’s top ransomware experts in an unprecedented, closed-door conference in September. The briefings, which occurred over two days, were a recognition by law enforcement officials that their ability to […]

The post Inside the FBI’s quiet ‘ransomware summit’ appeared first on CyberScoop.

Continue reading Inside the FBI’s quiet ‘ransomware summit’

Microsoft Azure CTO Mark Russinovich will join us for TC Sessions: Enterprise on September 5

Being the CTO for one of the three major hypercloud providers may seem like enough of a job for most people, but Mark Russinovich, the CTO of Microsoft Azure, has a few other talents in his back pocket. Russinovich, who will join us for a fireside chat at our TechCrunch Sessions: Enterprise event in San […] Continue reading Microsoft Azure CTO Mark Russinovich will join us for TC Sessions: Enterprise on September 5

3D bioprinting breakthrough leads to full-scale, functioning heart parts

While in its early stages, bioprinting of human tissue is an emerging technology that is opening up some exciting possibilities, including the potential to one day 3D print entire human organs. This scientific objective has now grown a little… Continue reading 3D bioprinting breakthrough leads to full-scale, functioning heart parts