Rt Tiwari

29 Flips | 3 Magazines | 11 Likes | 2 Followers | @RtTiwari | Keep up with Rt Tiwari on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Rt Tiwari”

Your DNA Sequencing Might Be Interesting But You’re Still Going to Die

If you could mine your own DNA for lifestyle advice, would you do it? What if I told you it would cost between $215 and $320, plus another $150 if …

Genetics

Human Mind and Quantum Physics — A Strange Link

“I cannot define the real problem, therefore I suspect there’s no real problem, but I’m not sure there’s no real problem.” The American physicist …

Scientists find the world's oldest water that may hold clues to alien life

Considering that the sulphate in the sample originated from interactions between the water and the rocks around it, scientists suggest that the water …

This Classic Physics Experiment Could Finally Reveal The Long-Awaited 'Theory of Everything'

New physics is on the horizon.<p>An iconic physics experiment used to demonstrate the strange properties of the quantum world is now even stranger than …

Intel will add deep-learning instructions to its processors

Some of the latest Intel processors support the AVX-512 family of vector instructions. These instructions operate on blocks of 512 bits (or 64 …

Deep Learning

CVE-2016-4117: Flash Zero-Day Exploited in the Wild

On May 8, 2016, FireEye detected an attack exploiting a previously unknown vulnerability in Adobe Flash Player (CVE-2016-4117) and reported the issue …

Cybersecurity

New Angler Exploits Bypass EMET Mitigations

New Microsoft Silverlight and Adobe Flash exploits that bypass Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) have found their way into an …

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it is one of the …

Cybersecurity

According To Science This Is The One Exercise You Need To Burn Belly Fat

Whether you are a every-day-gym-bunny or a once-a-week-wonder, you will know that there are some areas that are harder to tone and shift weight from …

Exercise

NASA’s List Of The Best Air-Filtering Houseplants

Back in the late ‘80s, NASA was looking for ways to detoxify the air in its space stations. So it conducted a study to determine the most effective …

Houseplants

NASA Have Identified The Best Air-Filtering Houseplants

They say a man’s living quarters is never complete without a bit of greenery to balance things out. Little do most know that there’s also a health …

The FBI didn’t need an iPhone backdoor — $100 of electronics does the same thing

The Apple vs. FBI fight over breaking the encryption of the San Bernardino iPhone was one of the most important news topics of the beginning of the …

shellcode for execve penetration test.

<b>shellcode</b> for execve penetration test.<b>Main Program:</b><br>1. exec /bin/sh with shellcode.<br>2. call sys_exit with shellcode.debugging with gef<b>Dependencies:</b><br>+ …

Forensics

Tutorial: Natural Language Processing in Python

This repo contains material for a workshop on Natural Language Processing with Python.<p>Audience<p>The target audience of this workshop are students, …

You are almost definitely not living in reality because your brain doesn’t want you to

Every cognitive bias exists for a reason—primarily to save our brains time or energy.<p>I’ve spent many years referencing Wikipedia’s list of cognitive biases whenever I have a hunch that a certain type of thinking is an official bias but I can’t recall the name or details. But despite trying to …

Critical Thinking

Network insights into Vawtrak v2. Banking Trojan Report

Vawtrak is a serious threat to the financial sector and is predicted to be the next major banking Trojan. Blueliv’s investigation into Vawtrak v2 …

Cybercrime

Researchers Devise Method to Monitor your Keystrokes Using WiFi Signals

Researchers have devised a system that can recognize a user's keystrokes by exploiting available WiFi signals.<p>The research team, which is made up of …

The Dukes R&D Finds a New Anti-Analysis Technique

Threat actors constantly hunt for evasion and anti-analysis techniques in order to increase the success rate of their attacks and to lengthen the …

Cybersecurity

H1N1: Technical analysis reveals new capabilities – part 2

This is the second blog in a 3 part series that provides an in-depth technical analysis on the H1N1 malware. You can read the first entry here where I covered the evolution of H1N1, its infection vector and obfuscation techniques. This blog will provide an overview of its execution.<p>H1N1 …

GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016

Next month at VB2016, HPE Security's Oleg Petrovsky will speak about attacks on GPS. We conducted a short interview with Oleg and asked him about …

Cyber-attacks

Here's why you can't see all twelve black dots in this optical illusion

Now you see them, now you don’t<p>Optical illusions have a way of breaking the internet, and the latest visual trick looks like it’s well on its way. On Sunday afternoon, game developer Will Kerslake tweeted a picture of intersecting gray lines on a white background. Twelve black dots blink in and out …

The Logic-Defying Double-Slit Experiment Is Even Weirder Than You Thought

Just by observing the process of the experiment, everything changes.<p>Do you remember the double-slit experiment? It's one of the weirder experiments in modern physics, and cuts to the heart of the weirdness of quantum mechanics. Basically, waves that pass through two narrow, parallel slits will form …

Google Has A Plan To Stop ISIS Recruits

How do you stop a potential ISIS recruit? With information. That's Google's new plan to stop potential recruits before they become radicalized, …

This Camera Can Read a Book Without Opening It

A new imaging technique can read what is printed on the pages of a book without ever opening it.<p>On Friday, a team of researchers at MIT and Georgia Tech unveiled a new machine imaging technique that allows a computer to determine what is printed on individual sheets of stacked paper without having …

Nanotech