European laboratories testing food for dioxins now have lower-cost, smaller-footprint alternatives for confirming levels of toxic contaminants, thanks to a new European Union regulation. Thermo Fisher Scientific worked closely with national reference labs in the EU to support the development of the new regulation, which permits use of gas chromatograph-triple stage quadrupole mass spectrometers (GC-MS/MS) for confirmation.
Bridges become an infrastructure problem as they...
Researchers in Switzerland have created an Android...
Port scanners are programs that search the...
Russian hackers have stolen 1.2 billion user names and passwords in a series of Internet heists affecting 420,000 websites, according to a report published Tuesday. The thievery was described in a New York Times story based on the findings of Hold Security, a Milwaukee firm that has a history of uncovering online security breaches. For confidentiality reasons, the identities of the affected websites weren't identified by the Times.
Police in New York City are concerned that the increasing popularity of drones in such a tightly packed metropolis could carry major risks, even becoming a potential tool for terrorists to conduct surveillance or carry out attacks. Even though it's illegal to fly the devices just about anywhere in New York City without permission, recent incidents and breathtaking videos of Manhattan suggest that the restrictions are being widely flouted.
Systems that automatically read automobile license plates have the potential to save police investigative time and increase safety, but law enforcement officials must address issues related to staffing, compatibility and privacy before the technology can reach its full potential, according to a new RAND Corp. report.
In a basement laboratory at Fort Sam Houston military base in Texas, a research team has spent the last two years simulating improvised explosive device blasts on postmortem pig eyes using a high-powered shock tube. Their most striking discovery is that these blasts can damage the optic nerve, and these injuries can occur even at low pressures, causing visual defects that until now have been associated traumatic brain injuries.
In early March, a mysterious ship the size of a large passenger ferry left Romania and plotted a course toward Scandinavia. About a month later, at the fenced-in headquarters of Norway's military intelligence service, the country's spychief disclosed its identity. It was a $250 million spy ship, tentatively named Marjata, that will be equipped with sensors and other technology to snoop on Russia's activities in the Arctic beginning in 2016.
The need for robust password security has never been more critical than now, as people use smartphones or tablets to pay bills and store personal information. A new Rutgers study shows that free-form gestures can be used to unlock phones and grant access to apps. These gestures are less likely to be observed and reproduced than than traditional methods such as typed passwords.
Highlighting the impact of malicious software, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013. To help combat this worsening trend, Virginia Tech computer scientists have used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur. The work effectively isolates infected computer hosts and detects in advance stealthy malware.
Researchers at Oregon State Univ. have discovered that some compounds called polyoxoniobates can degrade and decontaminate nerve agents such as the deadly sarin gas, and have other characteristics that may make them ideal for protective suits, masks or other clothing. The use of polyoxoniobates for this purpose had never before been demonstrated, and the discovery could have important implications for both military and civilian protection.
As news reports of lithium-ion battery (LIB) fires in Boeing Dreamliner planes and Tesla electric cars remind us, these batteries, which are in everyday portable devices, like tablets and smartphones, have their downsides. Now, scientists have designed a safer kind of lithium battery component that is far less likely to catch fire and still promises effective performance.
Research in Australia may help in the fight against terrorism with the creation of a sensor that can detect tiny quantities of explosives with the use of light and special glass fibers. The researchers have created a new optical fiber sensor which can detect explosives in concentrations as low as 6.3 ppm (parts per million). It requires an analysis time of only a few minutes.
Farmers optimize crop production on their own lands by rotating crops, or testing soils to choose the right amount of fertilizers to apply. But is it possible to optimize production across a much bigger area, such as the eastern U.S.? That’s the question a team of U.S. Dept. of Agriculture scientists has begun to tackle by developing a sophisticated new modeling tool.
Counterfeit or adulterated olive oil has been a persistent presence on the market, in part because the oil is difficult to track. An invisible label, developed by researchers in Switzerland, could perform this task. The tag consists of tiny magnetic DNA particles encapsulated in a silica casing and mixed with the oil. Just a few grams of the new substance are enough to tag the entire olive oil production of Italy.
According to a new study, coupling commercially available spectral x-ray detectors with a specialized algorithm can improve the detection of uranium and plutonium in small, layered objects such as baggage. This approach enhances the detection powers of x-ray imaging and may provide a new tool to impede nuclear trafficking.
A major factor making driving difficult is hazards that are sudden and hard to predict. The wrong choice in this situation, known as the “dilemma zone,” may lead to crashes. Roadside and in-vehicle display warning systems may help drivers handle these hazards by predicting their occurrence and providing advanced warning to the driver, according to a new study.
Inspired by human biology, a revolutionary new method of encrypting confidential information has been patented by scientists. This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.
FOMO—or the fear of missing out—is a common complaint at the South By Southwest Interactive festival in Austin, Texas each year. It's here, after all, that "Girls" creator Lena Dunham spoke on Monday at the same time that NSA whistleblower Edward Snowden gave a teleconferenced talk. All the while, IBM showed off the capabilities of cognitive computing in a language anyone could understand: food.
Intelligence officials are planning a sweeping system of electronic monitoring that would tap into government, financial and other databases to scan the behavior of many of the 5 million federal employees with secret clearances. The system is intended to identify rogue agents, corrupt officials and leakers, in part to prevent cases similar to former National Security Agency analyst Edward Snowden.
For 15 years trucks have been hauling decades worth of plutonium-contaminated waste to what is supposed to be a safe and final resting place a half mile underground in the salt beds of the Permian Basin in New Mexico. But back-to-back accidents and an above-ground radiation release shuttered the government's only deep underground nuclear waste dump and raised questions about the $5-billion-a-year program for cleaning up legacy waste.
Standing in a full-body scanner at an airport isn’t fun, and the process adds time and stress to a journey. It also raises privacy concerns. But researchers now report making several key advances in terahertz wave sensor technology to create a more precise and direct method for using these waves to detect explosives from greater distances.
Imagine a user who intends to send $2 to a friend through PayPal. Embedded malware in the user’s laptop, however, converts the $2 transaction into a $2,000 transfer to the account of the malware author instead. Researchers at Georgia Institute of Technology have created a prototype software, Gyrus, that takes steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers.
An international partnerships is aiming to develop robust fingerprint sensors with resolution beyond today’s 500 dpi international standards, the minimum required by the U.S. Federal Bureau of Investigation. The new platform uses vertical piezoelectric nanowire matrices designed using multiphysics modeling software.
NIST and American Univ. researchers report in a new study that the bench-scale test widely used to evaluate whether a burning cigarette will ignite upholstered furniture may underestimate the tendency of component materials to smolder when these materials are used in sofas and chairs supported by springs or cloth. The study comes as regulations and methods for evaluating ignition in furniture are undergoing scrutiny.
Researchers in the George E. Brown, Jr. Network for Earthquake Engineering Simulation have studied concrete buildings constructed before roughly 1980 in the Los Angeles area. Their work has identified examples of this category of buildings, sometimes referred to as nonductile concrete buildings, which are known from experience in previous earthquakes to have the potential for catastrophic collapse during strong earthquakes.
Computer scientist Yi-Kai Liu at NIST has devised a way to make a security device that has proved notoriously difficult to build: a "one-shot" memory unit, whose contents can be read only a single time. The innovation, which uses qubits and conjugate coding, shows in theory how the laws of quantum physics could allow for the construction of such memory devices.
According to a report from The New York Times, the National Security Agency has implanted software in nearly 100,000 computers around the world that allows the U.S. to conduct surveillance on those machines. The technology, which is not used in the U.S., relies on radio waves that can be transmitted from tiny circuit boards and USB cards inserted covertly into the computers.
- Page 1