Drive cloning in Windows 10 with free tools – Computerworld

Thank you

Your message has been sent.

There was an error emailing this page.

Cloning a drive comes in handy for a variety of reasons, but primarily when you want to replace one drive on a PC with another that is either bigger or faster than the original drive, if not both.

Such a cloning operation becomes critical on Windows PCs when the drive to be replaced is the boot/system drive, meaning it contains the files used to boot up the machine when it's starting up or restarting, as well the operating system files used to run Windows itself. Its critical because its proper outcome is a machine that boots and runs when that operation is complete, the old drive removed, and the new drive put in its place.

[ Enter the brave new world of Windows 10 license activation ]

By definition, disk cloning means creating a true and faithful copy of one computer storage device onto another. The name comes from a time when this meant a spinning hard disk of some kind. But today, with solid-state disks (SSDs) as common as hard disks (HDs), this can mean copying the contents of one storage device onto another storage device, where both source and target can be either an HD or an SSD. In fact, it's still often the case that the source is an HD and the target an SSD when a boot/system disk is the focus for cloning, because of the improved performance that such a changeover invariably delivers.

Sponsored Links

Go here to see the original:

Drive cloning in Windows 10 with free tools - Computerworld

Phone cloning – Wikipedia

Phone cloning is the transfer of identity from one cellular device to another.

Analogue mobile telephones were notorious for their lack of security. Casual listeners easily heard conversations as plain narrowband FM; eavesdroppers with specialized equipment readily intercepted handset Electronic Serial Numbers (ESN) and Mobile Directory Numbers (MDN or CTN, the Cellular Telephone Number) over the air. The intercepted ESN/MDN pairs would be cloned onto another handset and used in other regions for making calls. Due to widespread fraud, some carriers required a PIN before making calls or used a system of radio fingerprinting to detect the clones.

Code Division Multiple Access (CDMA) mobile telephone cloning involves gaining access to the device's embedded file system /nvm/num directory via specialized software or placing a modified EEPROM into the target mobile telephone, allowing the Electronic serial number (ESN) and/or Mobile Equipment Identifier (MEID) of the mobile phone to be changed. The ESN or MEID is typically transmitted to the cellular company's Mobile Telephone Switching Office (MTSO) in order to authenticate a device onto the mobile network. Modifying these, as well as the phone's Preferred Roaming List (PRL) and the mobile identification number, or MIN, can pave the way for fraudulent calls, as the target telephone is now a clone of the telephone from which the original ESN and MIN data were obtained.

Cloning has been shown to be successful on CDMA, but rare on GSM. However, cloning of a GSM phone is achieved by cloning the SIM card contained within, but not necessarily any of the phone's internal data. GSM phones do not have ESN or MIN, only an International Mobile Station Equipment Identity (IMEI) number. There are various methods used to obtain the IMEI. The most common methods are to hack into the cellular company, or to eavesdrop on the cellular network.

A GSM SIM card is copied by removing the SIM card and placing a device between the handset and the SIM card and allowing it to operate for a few days and extracting the KI, or secret code.[citation needed] This is normally done with handsets that have the option of an "extended battery" by placing the normal size battery in the handset and the KI[clarification needed] in the now vacant extra space. This is done by allowing the device to log the interaction between the mobile telephone switching office and the handset.

Phone cloning is outlawed in the United States by the Wireless Telephone Protection Act of 1998, which prohibits "knowingly using, producing, trafficking in, having control or custody of, or possessing hardware or software knowing that it has been configured to insert or modify telecommunication identifying information associated with or contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization."[1]

The effectiveness of phone cloning is limited. Every mobile phone contains a radio fingerprint in its transmission signal which remains unique to that mobile despite changes to the phone's ESN, IMEI, or MIN. Thus, cellular companies are often able to catch cloned phones when there are discrepancies between the fingerprint and the ESN, IMEI, or MIN.[citation needed]

Go here to read the rest:

Phone cloning - Wikipedia

Gang arrested for cloning debit cards, stealing money – The Hindu – The Hindu

The East division police have busted a gang of African nationals who used a magnetic card reader to clone debit and credit cards and swipe them to withdraw huge amounts of money illegally. The police have also recovered Rs. 21 lakh from them.

Police said the HDFC debit card of a woman, Payal Mandal, was used for withdrawal of Rs. 94,318. She made a police complaint. Within a span of one week, 11 cases of fraudulent transactions of debit cards of different banks were reported in Banaswadi Police Station. On analysing the statement of accounts of all the complainants, some similarities were found pertaining to the last transaction prior to fraudulent transactions. These lead the investigation team to an ATM in Kammanahalli where the data of all these complainants was suspected to have been compromised (skimming). Further scrutiny showed that the accounts were used by some unknown person through an agent and fake cards were generated and swiped in a travel agency by name VIA.COM

The investigative officer approached VIA.COM located in Bengaluru and collected incriminating evidence which lead to the arrest of Eremhen Smart, a Nigerian national, on January 16 in Bengaluru. The officer recovered Rs. 2.64 lakh and freezed Rs. 2.40 lakh which was in the account of the agent of Smart.

The others arrested are Martin Nsamba of Uganda; Nambooze Jollly; Tinah of Uganda; Kenny of Nigeria; Oloadeji Olayem of Nigeria; and Vikram Rao Nikkam of Bengaluru.

Excerpt from:

Gang arrested for cloning debit cards, stealing money - The Hindu - The Hindu

Steve Bannon’s Unproduced Movie About Cloning, Nazis, and Walt … – Gizmodo

Steve Bannon, a man who once favorably compared himself to Darth Vader, Dick Cheney, and Satan, speaks with Kellyanne Conway on January 31, 2017 (Photo by Chip Somodevilla/Getty Images)

Steve Bannon, the white nationalist currently helping President Trump dismantle the United States, has produced a number of low budget conservative films. But the movies that Bannon couldnt get made over the years are even more interesting than the ones that were releasedlike an unmade documentary-style film from 2005 about the dangers of futuristic technology.

The Daily Beast obtained a copy of the proposal for the movie, which was being shopped around Hollywood in the mid-2000s. The working titles were The Singularity: Resistance Is Futile and The Harvest of the Damned. The unproduced film focused on a number of scifi elements, including human cloning, immortality, and eugenics. But based on the proposal, this wasnt just about the dangers of technology gone mad.

The entire film was to have a very ham-fisted political bent, drawing lines between the eugenics programs of the Nazis to the abortion and contraception advocates that were to come. Bannon is staunchly anti-abortion. The proposal even includes a frozen Walt Disney, presumably related to the urban legend that Disney was cryogenically frozen.

The acceleration of technological progress is the central feature of the 20th /21st century, one part of the proposal explains, according to the Daily Beast. We are on the edge of change brought about by Mans ability to create Man, the toolmaker, is on the verge of creating greater-than-human intelligence.

The film appears to have nods to various Illuminati conspiracies about an anti-religious elite that would take over the world and survive a post-humanity landscape. Much of this fear would likely be informed by his staunchly Catholic beliefs. Or at least a conspiratorial version of them.

China, a country that President Trump continues to needle over trade relations and military security, also seems to play a large part in instigating whatever the last futuristic element of the documentary was supposed to entail.

Bannon allegedly secured funding from conservative filmmaker Mel Gibson at one point. But when the Daily Beast asked about that, Gibsons publicist called it fake news.

This is far from the first unmade movie by Bannon (hes listed as a writer, director and producer) thats been making the rounds recently. The Washington Post recently found a 2007 proposal for a futuristic film titled The Islamic States of America. The proposal blamed the media and the Jewish community for allowing radical Islam to overtake the United States due to a culture of tolerance.

One scholar told the Washington Post that Bannons proposal for The Islamic States of America was designed to generate hate against not just Islamists, not just extremists, but Muslims writ large.

Bannon has previously cited Leni Riefenstahl as an influence on his filmmaking career, much to the concern of people knowledgable about the history of Nazi propaganda. Riefenstahls most famous film is 1935's Triumph of the Will, a Nazi propaganda movie that remains one of the most infamous examples to date of mass media that glorifies murderous dictators.

People have said Im like Leni Riefenstahl, Bannon told the Wall Street Journal in 2011 during the debut of his documentary The Undefeated, which celebrates Sarah Palin.

Ive studied documentarians extensively to come up with my own in-house style, Bannon continued. Im a student of Michael Moores films, of Eisenstein, Riefenstahl. Leave the politics aside, you have to learn from those past masters on how they were trying to communicate their ideas.

You can read more about the proposal for The Singularity: Resistance Is Futile at The Daily Beast. Say what you will about the proposal, at least it looks like the Nazis were supposed to be the bad guys in this one.

[The Daily Beast]

Read the original post:

Steve Bannon's Unproduced Movie About Cloning, Nazis, and Walt ... - Gizmodo

Police investigating recent reports of credit card cloning in Aiken … – Aiken Standard

People with credit and debit cards are urged to keep a watchful eye on their account activity as a recent wave of card fraud has left law enforcement investigating multiple reports in Aiken County.

Capt. Eric Abdullah, with the Aiken County Sheriffs Office, said reports of credit card cloning, or skimming, is a common problem. Over the past week, he said there have been several reports of card cloning in the area, some from the same exact location.

John Brooks, of North Augusta, said his debit card was cloned and used on Feb. 3 at the Wal-Mart on Wrightsboro Road in Augusta.

I woke up on (Feb. 4), checked my account and it was $205 short, Brooks said. I looked at my transactions and saw my card had been swiped at Wal-Mart the night before.

Brooks said he went to get a transaction statement from Wal-Mart, where he learned someone had used his information to put money on a gift card.

The Aiken County Sheriffs Office has reports filed on Feb. 2 and Feb. 3, in which three separate residents claimed to have had their card information stolen and used at the same Wal-Mart in Augusta.

I think this problem is getting worse, and it seems like theres not much being done to stop it, Brooks said.

Credit card cloning is a technique where someone obtains credit card information and copies it onto a fake card in order to illegally use it, according to the FBI.

A small, pocketsize device with a scanning slot is typically what is used to steal the information, the FBI's website states.

Brooks said police informed him that when a suspect clones information from someones card they usually use the card within a day or two. He said he believes his information was taken at a fast-food restaurant drive-thru in Aiken County.

I wont be purchasing anything at a drive-thru anymore, he said.

Abdullah said the Aiken County Sheriffs Office will continue to address the situation, but residents can still protect themselves by not providing any credit card or financial information to any person or company they are not familiar with.

He also suggested residents continually keep up with their accounts to make sure nothing is happening that isnt supposed to.

Credit card cloning has become one of the most popular form of credit card fraud over the past few years, growing 87 percent since 2010 and recently resulting in $6 billion in losses nationwide, according to Integrated Family Community Services.

Tripp Girardeau is the crime and courts reporter with the Aiken Standard. Follow him on Twitter at @trippgirardeau.

Read more from the original source:

Police investigating recent reports of credit card cloning in Aiken ... - Aiken Standard

Steve Bannon wanted to make a movie about cloning, abortion, and Nazis with Mel Gibson – A.V. Club (blog)

Feb 9, 2017 12:33 PM

Steve Bannon, the melting bacon fat candle that serves as President Donald Trumps most trusted advisor, had quite the Hollywood career before getting into politics. A few days ago, we wrote about the unproduced Shakespearean hip-hop musical he wrote about the 1992 Los Angeles riots; today, The Daily Beast is reporting on an 11-page outline it obtained for an unmade documentary-style film from 2005 about the dangers of futuristic technology. Bannon wrote it alongside his writing partner, Julie Jones.

Blessed with the very Coheed And Cambrian title of The Singularity: Resistance Is Futile, the sprawling, ambitious story concerns cloning, immortality, Walt Disney, eugenics, and, naturally, Nazis. Heres the broad scope (gird yourselves):

A heady, incomplete mix of science, history, religion, and politics, it sketches out a story in which mankinds unquenchable thirst for knowledge and scientific advancement has led to horrific, fascist atrocities and forced sterilization, drawing a direct line between those atrocities and modern bio-technology.

The draft is unfinished, so it is unclear precisely what Bannons full message and story arc were intended to be. But the theme that genetic and reproductive sciences has led to Nazi horrors and war crimes is a theme seen in a lot of conservative agitprop.

Essentially, Bannons is a Christian right-friendly story of arrogant scientists trying to perfect the human race at the expense of the natural order and Gods vision of humanity.

One ticket, please!

The Daily Beast goes into much, much more detail on the outlines gobbledygook, but whats equally interesting is that several sources claim rage-filled conservative Mel Gibson was once attached to the project (for the record, Gibsons publicist called this claim fake news). Bannon apparently loved name-dropping Gibson, and was also routinely entertained by Passion Of The Christ star Jim Caviezel at exclusive parties at a mansion in Santa Barbara.

Gizmodo provides some interesting context as well, elaborating on Bannons debt to Leni Riefenstahl, the German film director whose most famous film is a piece of Nazi propaganda.

People have said Im like Leni Riefenstahl, Bannon told the Wall Street Journal in 2011. At the time he was debuting his own piece of propaganda: The Undefeated, a documentary celebrating Sarah Palin.

The Singularity: Resistance Is Futile isnt Bannons only project to never take off. Along with his racist hip-hop musical, his shelf is also stacked a piece about Rwandan genocide (oh, brother), an anti-Semitic, anti-Muslim proposal called The Islamic States Of America, and, hey, an adaptation of Shakespeares Titus Andronicus that would be set on the moon with creatures from outer space and probably still somehow be racist.

[Note: Gizmodo, like The A.V. Club, is owned by Univision Communications.]

Submit your Great Job, Internet tips here.

Previous Great Job, Internet! Max Landis reboot of Power Rangers seems a lot more fun than the one were getting

Next Great Job, Internet! Bear witness to the political process with this long-running livestream of an empty room

Continue reading here:

Steve Bannon wanted to make a movie about cloning, abortion, and Nazis with Mel Gibson - A.V. Club (blog)

Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking – Photonics.com

Photonics.com Feb 2017 OTTAWA, Ontario, Feb. 7, 2017 Universal optimal quantum cloning of high-dimensional photonic states has been achieved using the symmetrization method. The work has led to the discovery of information that could help system administrators protect quantum computing networks from external attacks.

Researchers at the University of Ottawa demonstrated the feasibility of high-dimensional optimal cloning of orbital angular momentum (OAM) states of single photons and used their discovery to perform a cloning attack to a secure quantum channel. The team cloned the qubits of a secure quantum message as well as the no-cloning theorem allowed meaning that the teams clones were almost exact replicas of the original information. The no-cloning theorem, a fundamental law of quantum physics, prohibits perfect copies and is the backbone of security for quantum communications.

The team showed the universality of their technique by cloning several arbitrary input states and characterized the cloning machine by performing quantum state tomography on cloned photons. They experimentally demonstrated a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol to show the robustness of high-dimensional states in quantum cryptography.

But in addition to undermining what was previously thought to be a perfect way of securely transmitting information, the researchers analyses revealed promising clues about how to protect against such hacking.

"Our team has built the first high-dimensional quantum cloning machine capable of performing quantum hacking to intercept a secure quantum message," said professor Ebrahim Karimi. "Once we were able to analyze the results, we discovered some very important clues to help protect quantum computing networks against potential hacking threats."

The team hopes that their quantum hacking efforts could be used to study quantum communication systems and how quantum information travels across quantum computer networks.

The open access article was published in Science Advances (doi: 10.1126/sciadv.1601915).

View original post here:

Quantum Cloning Machine Reveals Clues That Could Protect Against Hacking - Photonics.com

Steve Bannon’s Unproduced Movie About Cloning, Nazis, and Walt Disney Sounds Nuts – Gizmodo India

Steve Bannon, a man who once favorably compared himself to Darth Vader, Dick Cheney, and Satan, speaks with Kellyanne Conway on January 31, 2017 (Photo by Chip Somodevilla/Getty Images)

Steve Bannon, the white nationalist currently helping President Trump dismantle the United States, has produced a number of low budget conservative films. But the movies that Bannon couldn't get made over the years are even more interesting than the ones that were released-like an unmade documentary-style film from 2005 about the dangers of futuristic technology.

The Daily Beast obtained a copy of the proposal for the movie, which was being shopped around Hollywood in the mid-2000s. The working titles were The Singularity: Resistance Is Futile and The Harvest of the Damned. The unproduced film focused on a number of scifi elements, including human cloning, immortality, and eugenics. But based on the proposal, this wasn't just about the dangers of technology gone mad.

The entire film was to have a very ham-fisted political bent, drawing lines between the eugenics programs of the Nazis to the abortion and contraception advocates that were to come. Bannon is staunchly anti-abortion. The proposal even includes a frozen Walt Disney, presumably related to the urban legend that Disney was cryogenically frozen.

"The acceleration of technological progress is the central feature of the 20th /21st century," one part of the proposal explains, according to the Daily Beast. "We are on the edge of change brought about by Man's ability to create... Man, the toolmaker, is on the verge of creating greater-than-human intelligence."

The film appears to have nods to various Illuminati conspiracies about an anti-religious elite that would take over the world and survive a "post-humanity" landscape. Much of this fear would likely be informed by his staunchly Catholic beliefs. Or at least a conspiratorial version of them.

China, a country that President Trump continues to needle over trade relations and military security, also seems to play a large part in instigating whatever the last "futuristic" element of the documentary was supposed to entail.

Bannon allegedly secured funding from conservative filmmaker Mel Gibson at one point. But when the Daily Beast asked about that, Gibson's publicist called it "fake news."

This is far from the first unmade movie by Bannon (he's listed as a writer, director and producer) that's been making the rounds recently. The Washington Post recently found a 2007 proposal for a futuristic film titled The Islamic States of America. The proposal blamed the media and the Jewish community for allowing radical Islam to overtake the United States due to a "culture of tolerance."

One scholar told the Washington Post that Bannon's proposal for The Islamic States of America was "designed to generate hate against not just Islamists, not just extremists, but Muslims writ large."

Bannon has previously cited Leni Riefenstahl as an influence on his filmmaking career, much to the concern of people knowledgable about the history of Nazi propaganda. Riefenstahl's most famous film is 1935's Triumph of the Will, a Nazi propaganda movie that remains one of the most infamous examples to date of mass media that glorifies murderous dictators.

"People have said I'm like Leni Riefenstahl," Bannon told the Wall Street Journal in 2011 during the debut of his documentary The Undefeated, which celebrates Sarah Palin.

"I've studied documentarians extensively to come up with my own in-house style," Bannon continued. "I'm a student of Michael Moore's films, of Eisenstein, Riefenstahl. Leave the politics aside, you have to learn from those past masters on how they were trying to communicate their ideas."

You can read more about the proposal for The Singularity: Resistance Is Futile at The Daily Beast. Say what you will about the proposal, at least it looks like the Nazis were supposed to be the bad guys in this one.

[The Daily Beast]

Excerpt from:

Steve Bannon's Unproduced Movie About Cloning, Nazis, and Walt Disney Sounds Nuts - Gizmodo India

Watch out for this crazy Facebook cloning scam! – Komando

We all know what cloning is. Scientists have been experimenting with physical cloning, and there are even experiments with "mind cloning" that some believe could be the key to immortality.

But, it goes without saying, the concept of cloning can be pretty scary. While science may still be decades away from accomplishing the impossible with physical cloning, scammers are using a form of digital cloning to trick people online.

This particular form of cloning is appearing primarily on Facebook, but can also show up on other social media platforms such as Instagram and Twitter. For the purposes of this article, we'll refer to it as "Facebook cloning," but keep this in mind so you can watch for it on other sites across the internet.

What is Facebook cloning, exactly? It's the act of copying someone's Facebook profileand using it to conduct scams across the web. The scary thing is, anyone could be targeted and have their profile photos and details stolen. In most cases, without even knowing about it.

Note: Facebook cloning isn't the only Facebook scam you need to watch out for. Click here and read this article before you take another Facebook quiz.

By stealing your photos and details from your profile, such as where you work, where you went to school, when you were born and your relationship status, cybercrooks are often able to convince your real contacts to accept your "Friend request." Any that do accept have just given hackers the permission they need to snoop through their photos and clone their profiles too. And the cycle continues from there.

The cloning itself is only part of the scam, which could take months or even years to pull off. Hiding behind their fake profiles, the scammers study and mimic the communication styles of your true contacts, until eventually, they've learned enough to put on an even more convincing act.

Imagine receiving a private message from an old roommate from college. She's in trouble. She's trying to get home, but her purse was just stolen. She couldn't think of anyone else to reach out to but you.

For many, this request would stand out as odd, but under the right circumstances, there are plenty of people who fall for it. This old "friend," of course, isn't truly a friend at all. It's a wolf hiding in sheep's clothing.

The first way to avoid this scam, and the most obvious, is to confirm that all profiles are real before you accept anyone's friend request. Use the search feature on Facebook to pull up their page and see how many friends the person has, and when the account was created. Fake accounts will likely have just been created within a few weeks or months, and chances are, the scammers won't take the time to build up a massive Friends list.

If you see anything that looks suspicious, don't accept the friend request. If you have the contact information (either a phone number or an email address) of the real person, reach out to confirm outside of Facebook.

Next, you need to edit your Facebook profile to ensure that it's private. (Click here for 3 essential Facebook privacy checks you need to do right now.) You also need to remove any unnecessary information about your private life. Delete your phone number, home address, and these three additional details that put your privacy at risk.

Lastly, if you have a Facebook account that you no longer use, you need to delete it. Old, unused accounts leave you at risk of having your private information stolen by hackers, and even through massive data breaches. If you're not sure how to delete your old Facebook account, click here and we'll walk you through the steps.

How to sell your stuff on Facebook Marketplace instead of Craigslist

How to see (and erase) your Facebook search history

5 ways to lock down your Facebook account for maximum security

Please share this information with everyone. Just click on any of these social media buttons.

Email

Facebook

Google+

Pinterest

Previous Happening Now

Next Happening Now

Read the original here:

Watch out for this crazy Facebook cloning scam! - Komando

Crustacean Cloning – ScienceBlog.com (blog)

Split into two,

I glisten in the shallow shore.

Split into two;

A bitter taste of dj vu.

You guard me with a tender claw,

Before deciding Im worth more

Split into two.

This is a Rondelet, inspired by recent research that investigates the relationship between the Lybia crab and a sea anemone species belonging to the genus Alicia.

Lybia crabs are often referred to as boxer crabs or pom-pom crabs because they are almost always seen carrying a pair of sea anemones in their claws. However, until now it was not known how the crabs acquired their adornments. Over a period of several years, researchers studied over 100 Lybia crabs from the shallow waters of the Red-Sea on the south shore of Israel in Eilat. As well as observing that the sea anemone only appeared in the wild in association with the Lybia crabs (i.e. no specimens were found away from the crabs), the researchers also found that these sea anemones reproduced via crab-induced cloning. Genetic analysis revealed that when a crab acquires a single sea anemone they tear it in two, creating an identical clone in the process. Furthermore, if a crab is in a position where they have no sea anemones in their claws, then they will steal one (or part of one) from another crab, and then go on to clone this stolen sea anemone.

Further investigations are necessary to determine why the crabs have such an attachment to the sea anemones, but for now this research has revealed a unique case in which one animal induces asexual reproduction (i.e. reproduction by which offspring arise from a single organism) of another, affecting its genetic diversity in the process.

An audio version of this poem can be heard here.

Like Loading...

Read the original post:

Crustacean Cloning - ScienceBlog.com (blog)

Hair Cloning & Multiplication | Bernstein Medical

What is Hair Cloning?

Hair cloning is a promising treatment for androgenetic alopecia, or common genetic hair loss that is being actively researched by pioneering hair restoration physicians, like Dr. Bernstein in conjunction with Columbia University, hoping to be the first to develop a cure for hair loss. In hair cloning, a sample of a persons germinative hair follicle cells are multiplied outside the body (in vitro), and then they are re-implanted into the scalp with the hope that they will grow new hair follicles and, thus, new permanent hair.

This fascinating field is not only interesting because of the rapidly-developing nature of the science of cloning hair, but, more specifically, because hair cloning methods have the potential to yield a treatment that effectively cures common hair loss - something that scientists and physicians have been seeking for decades.

Hair cloning is a term that is often used to broadly describe a set of ideas on how to use laboratory techniques to solve the problem of hair loss. Technically, however, there is a difference between true hair cloning and the technique of hair multiplication for treating baldness. We will explore these differences in the next section.

In contrast to hair cloning, where germinative cells are multiplied outside the body in essentially unlimited amounts, in hair multiplication, donor hair follicles are removed from the scalp and then manipulated in a way that the total amount of hair is increased. This can involve using transected, or cut, hair follicles and implanting them directly into the scalp with the hope that the follicles will regenerate and grow a complete hair. Another technique uses plucked hair fragments rather than whole or transected follicles.

The concept behind hair multiplication using plucked hair is that it is an easy, non-invasive method of obtaining germinative cells. Also, the hair shaft of the plucked hair acts as a ready-made scaffold to introduce and align the germinative cells at the new site. The hope is that removing a small proportion of the germinative cells, through plucking, may provide enough tissue for the formation of a new follicle while not diminishing the original one. The problem with this method has been that plucking generally yields a hair with insufficient cells to induce a new follicle to form.

In one form of hair multiplication, hairs are plucked from the scalp or beard and then implanted into the bald part of the scalp. The idea is that some germinative cells at the base of the hair follicle will be pulled out along with the hair. Once the hair is re-implanted, these cells would be able to regenerate a new follicle. Microscopic examination of the plucked hair helps the doctor determine which hairs have the most stem cells attached and thus which are most likely to regrow. The procedure is called hair multiplication since the plucked follicles would regrow a new hair, potentially giving an unlimited supply.

The problem with this technique has been that the cells that are adherent to the hair shaft when it is plucked do not seem to play a major role in follicular growth, and the stem cells around the bulge region of the follicle, the ones most important for hair growth, are not harvested to any significant degree. Recently, it has been speculated that the addition of an extra-cellular matrix (ECM) to stimulate growth would make these plucked hairs more likely to survive after implantation and then grow into a fully developed hair. This, however, has been hard to document in clinical trials. (See ACell Extracellular Matrix)

A limitation of the newer method, using ECM, is that plucked hairs often do not contain enough germinative material to stimulate the growth of new hair, so only a small number of the hairs that are actually plucked are useful to transplant.

Another concern with this technique is that part of the new hair is derived from the skin in the recipient site, rather than being only from the transplanted hair follicle. At this point, we are hopeful that this newly formed hair (which has cells from both the donor and recipient areas) will be resistant to the miniaturizing actions of DHT and not disappear over time.

When it comes to cloning, hair follicles present a significant challenge. Hair follicles are too complex to be simply multiplied in a test-tube and are not whole organisms (like Dolly the Sheep, see below) so they cannot grow on their own. Fortunately, a pair of clever scientists, Drs. Amanda Reynolds and Colin Jahoda (now working with Dr. Christiano at Columbia University), seem to have made great headway in solving the dilemma.

In their paper Trans-Gender Induction of Hair Follicles, the researchers have shown that dermal sheath cells, found in the lower part of the human follicle, can be isolated from one person and then injected into the skin of another to promote the formation of new intact hair. The implanted cells interacted locally to stimulate the creation of full terminal (i.e. normal) hair follicles. Although this is not actually cloning (see the definition above), the dermal sheath cells can potentially be multiplied in a Petri dish and then injected in great numbers to produce a full head of hair. The word potentially is highlighted, as this multiplication has not yet been accomplished. It seems, however, that this hair induction process is the model most likely to work.

Another interesting aspect of their experiment is that the donor cells came from a male but the recipient, who actually grew the hair, was a female. The importance of this is that donor cells can be transferred from one person to another without being rejected. Since repeat implantations did not provoke the typical rejection responses, even though the donor was of the opposite sex and had a significantly different genetic profile, this indicates that the dermal sheath cells have a special immune status and that the lower hair follicle is one of the bodies immune privileged sites.

In addition, there is some evidence that the recipient skin can influence the look of the hair. Thus, the final appearance of the patient may more closely resemble the bald persons original hair, than the hair of the person donating the inducer cells. The person-to-person transfer of cells would be important in situations where there was a total absence of hair. Fortunately, in androgenetic alopecia (genetic hair loss) there is a supply of hair on the back and sides of the scalp that would serve as the source of dermal sheath cells, so the transfer between people would rarely be necessary.

Probably the most important aspect of this experiment is the fact that these inducer dermal sheath cells are fibroblasts. Fibroblasts, as it turns out, are among the easiest of all cells to culture, so that the donor area could potentially serve as an unlimited supply of hair.

There are a number of problems that still confront us in cloning hair. First, there is the need to determine the most appropriate follicular components to use (dermal sheath cells, the ones used in the Collin/Jahoda experiment, are hard to isolate and may not actually produce the best hair). Next, these extracted cells must be successfully cultured outside the body. Third, a cell matrix might be needed to keep them properly aligned while they are growing. Finally, the cells must be successfully injected into the recipient scalp in a way that they will consistently induce hair to grow.

Unlike Follicular Unit Transplantation (FUT), in which intact follicular units are planted into the scalp in the exact direction the surgeon wants the hair to grow, with cell implantation there is no guarantee that the induced hair will grow in the right direction or have the color, hair thickness or texture to look natural. To circumvent this problem, one might use the induced hair in the central part of the scalp for volume and then use traditional FUT for refinement and to create a natural appearance.

However, it is not even certain that the induced follicles will actually grow long enough to produce cosmetically significant hair. And once that hair is shed in the normal hair cycle, there are no assurances that it will grow and cycle again. (Normal hair grows in cycles that last 2-6 years. The hair is then shed and the follicle lies dormant for about three months before it produces a new hair and starts the cycle over again.)

A major technical problem to cloning hair is that cells in culture begin to de-differentiate as they multiply and revert to acting like fibroblasts again, rather than hair. Finding the proper environment in which the cells can grow, so that they will be maintained in a differentiated (hair-like) state, is a major challenge to the researchers and appears to be the single greatest obstacle to this form of therapy coming to fruition. This is not unlike the problems in cloning entire organisms where the environment that the embryonic cells grow in is the key to their proper differentiation and survival.

There are four main experimental techniques that have been recently described by Teumer. These are: 1) Implanting Dermal Papillae cells alone, 2) Placing DP cells alongside miniaturized follicles, 3) Implanting DP cells with keratinocytes (Proto-hairs), and 4) Cell Implantation using a Matrix.

See our Hair Cloning Methods page for descriptions and charts about current methods of study regarding hair cloning.

Finally, although remote, there may be safety concerns that cells that induce hair may also induce tumors, or exhibit malignant growth themselves. Once these obstacles have been overcome, there are still the requirements of FDA approval which further guarantees safety as well as effectiveness. This process involves three formalized stages of clinical testing and generally takes years.

On the status of cloning it is still a work in progress. Although there has been much recent success, and we finally have a working model for how hair cloning might eventually be accomplished, much work still needs to be done.

Cloning is the production of genetically identical organisms. The first clone of an adult animal was Dolly, the famous Edinburgh sheep. Although technically not an exact replica of her mother (and therefore not a true clone), the revolutionary part of the experiment was that it overturned the long-held view that non-sex cells of an adult (somatic cells) were differentiated to such a degree that they lost any potential to develop into a new adult organism. Scientists had believed that once a cell became specialized as a lung, liver, or any other type of adult cell, the change was irreversible as other genes in the cell became permanently inactive. The other major challenge was to be able to initiate the multiplication of the genetically altered cell and then to provide the proper environment in which the growth of the new organism could take place.

With Dolly, scientists transferred genetic material from the nucleus of a donor adult sheep cell to an egg whose nucleus, and thus its genetic material, had been removed. This egg, containing the DNA from a donor cell, had to be treated with chemicals or an electric current in order to stimulate cell division. Once the cloned embryo reached a suitable stage, it was transferred to a very hospitable environment - the uterus of another sheep - where it continued to develop until birth.

In contrast to replicating whole organisms, in genetic engineering, one alters the DNA of a particular cell so that it can manufacture proteins to correct genetic defects or produce other beneficial changes in an organism. The initial step in genetic engineering is to isolate the gene that is responsible for the problem. The next step is to clone (multiply) the gene. The last step is to insert the gene inside the cell so that it can work to alter bodily function.

The first gene causing hair loss in humans was discovered by Dr. Angela Christiano at Columbia University. Individuals with this gene are born with hair that soon falls out (as infant hair often does) but then never grows back. They mapped the disease to chromosome 8p21 in humans and they actually cloned a related hair loss gene in mice. Although a huge step forward, this gene is not the same as the one(s) that cause common baldness. Luckily, Dr. Christianos lab continues its work to isolate the genetic material responsible for androgenetic alopecia. We will keep you posted on their progress.

A new drug that is an activator of the Hedgehog pathway has been shown to stimulate hair growth in adult mice. The study showed that a topically applied medication can initiate the Hedgehog signaling pathway to stimulate hair follicles to pass from the resting to the growth stage of the hair cycle in mice. This technology has not yet been applied to humans. (See Hedgehog Signaling Pathway Could Yield Hair Growth, Hair Loss Treatment in the Hair Cloning News section)

Hair Cloning Methods Hair Cloning News Hair Transplant Surgery Before & After Hair Transplant Photos Medical Treatment of Hair Loss Hair Loss in Men

Read the rest here:

Hair Cloning & Multiplication | Bernstein Medical

Boffins create quantum cloning machine to intercept ‘secure’ messages – The INQUIRER

BOFFINS AT THE University of Ottawa claim that quantum computing may not provide the virtually 'unbreakable' security that it has been claimed the technology could offer.

Physicists at the University claim that they were able to build a "quantum cloning machine" that was able to intercept a "secure quantum message".

Their research suggests that initiatives such as China's dedicated quantum encryption network, which will supposedly provide secure communications between Beijing, Shanghai and a number of cities in between when it is finished at the end of the year, might not provide the security that its designers had planned.

"Our team has built the first high-dimensional quantum cloning machine capable of performing quantum hacking to intercept a secure quantum message," said University of Ottawa Department of Physics professor Ebrahim Karimi.

"Once we were able to analyse the results, we discovered some very important clues to help protect quantum computing networks against potential hacking threats."

Quantum systems were believed to provide secure data transmission because, until now, attempts to copy the transmitted information resulted in an altered or deteriorated version of the original information, thereby defeating the purpose of the initial hack.

In conventional computing, anyone can simply copy-and-paste information and replicate it exactly. But this doesn't hold true in the quantum computing world, where attempts to copy quantum information - or qudits* - result in what Karimi refers to as "bad" copies.

Professor Karimi's team was able to clone the photons that transmit information, namely the single carriers of light known as qubits, as well as quantum theory allows, meaning that the clones were almost exact replicas of the original information.

At the same time, though, the researchers' analyses also revealed some clues as to how to protect against such hacking.

"What we found was that when larger amounts of quantum information are encoded on a single photon, the copies will get worse and hacking even simpler to detect," said Frdric Bouchard, a University of Ottawa doctoral student.

"We were also able to show that cloning attacks introduce specific, observable noises in a secure quantum communication channel. Ensuring photons contain the largest amount of information possible and monitoring these noises in a secure channel should help strengthen quantum computing networks against potential hacking threats."

Interest in quantum computing has been escalating for years as advances in conventional computing power slows down. Last week, a University of Surrey scientist published a blueprint for a large-scale quantum computer, while commercial developer D-Wave Systems has started to sell its 2000 qubit device to organisations that need to perform particular calculations at speed.

* The term "qudit" is used to denote a unit of quantum information in a d-level quantum system.

Go here to read the rest:

Boffins create quantum cloning machine to intercept 'secure' messages - The INQUIRER

Don’t fall for this Facebook cloning scam | WDTN – WDTN

NASHVILLE, Tenn.(NEWS10) Facebook scammers are targeting users by making fraudulent or fake profiles trying to obtain personal information.

Scammers use information on someones Facebook profile and create a new account with that persons information and photos. The scammer will then add that persons family and friends.

Security experts at the Identity Theft Resource Center say the scammers use the connections to find out as much information about the victim or their friends. They may send messages containing malware links to steal personal information.

Experts say the scammers are after personal information, contacts, account information, or access PC or phones.

If you suspect suspicious activity contact your friend or family member and Facebook so they can take the profile down.

Telltale signs that an account may be fake or fraudulent is not having a cover photo, few mutual friends, and limited account activity.

Keep checking WDTN.com for the latest news. To get alerts for breaking news, grab the FREE WDTN News App for iPhone or Android. You can also sign up for email alerts here. Dont miss another Facebook post or on Twitter for all the latest breaking news

Like Loading...

WDTN.com provides commenting to allow for constructive discussion on the stories we cover. In order to comment here, you acknowledge you have read and agreed to our Terms of Service. Commenters who violate these terms, including use of vulgar language or racial slurs, will be banned. Please be respectful of the opinions of others and keep the conversation on topic and civil. If you see an inappropriate comment, please flag it for our moderators to review.

Read more:

Don't fall for this Facebook cloning scam | WDTN - WDTN

This Crab Clones Its Allies by Ripping Them in Half – The Atlantic

The American novelist S. E. Hinton once said, If you have two friends in your lifetime, youre lucky. If you have one good friend, youre more than lucky. By that logic, boxer crabs are the luckiest creatures alive because they can turn one good friend into two by tearing it in half.

These tiny, inch-long crabs carry sea anemones, holding them in place with special hooks on the inner edges of their claws. With their crowns of wavy tentacles, the anemones look like pom-poms, and the crabs like cheerleaders. But those tentacles also pack powerful stings, and a quick jab from them is often enough to ward off an attacking fish. Hence the name: boxer crabs.

Most crabs gather food with their powerful claws, but boxer crabs have adapted so thoroughly to holding anemones that their claws are now feeble, delicate tweezers rather than powerful, crushing pincers. Instead, they rely on their anemones. Some species use the anemones like cutlery, dabbing them onto morsels of food and then bringing them over to their mouths. Others wait for the anemones to passively ensnare food, which they then scrape into their mouths with their front legs. If you remove the anemones, as Yisrael Schnytzer and his colleagues from Bar Ilan University have repeatedly done, the crabs struggle to gather enough to eat.

The anemones, however, flourish apart from the crabs. When Schnytzer freed them from the crabs grasp, their colors got brighter, their tentacles became longer, and they more than doubled in size. Left to their own devices, they can grow far bigger than the crabs that once held them. In the words of Schnytzers colleague Ilan Karplus, the crabs cultivate Bonsai anemones, deliberately stunting their growth to keep them at a manageable size.

But how do the crabs get their anemones in the first place? In 1905, zoologist James Edwin Duerden, in what remains the most thorough account of boxer crab habits, noticed a clue. He wrote that there appeared to be evidence that these crabs will tear a single anemone in two to provide one for each claw. Karplus saw similar signs a few decades ago. He noticed that if he took away one of a crabs two anemones, and came back a few days later, it would once again have two anemonesalbeit smaller ones.

He and Schnytzer have now caught several crabs in the act of dividing their partners. It takes around 20 minutes, and the technique is simple: The crab grabs the anemone in both claws, stretches it outwards, and uses its legs to slice through the middle. And since anemones can regenerate their bodies, each half eventually became a complete animal in its own right. The crab, by bisecting its partner, also clones it.

This explains why wild boxer crabs, even very young ones, almost always have two anemones. As long as a crab can get is claws on one, it can easily make a second. And if it has none at all, as Schnytzer found, it can steal a fragment from another crab. Its remarkable that these anemones are such a crucial commodity that small, juvenile crabs will actually initiate fights with larger crabs to steal their anemonesand will often win, says Kristin Hultgren from Seattle University.

These kinds of fights must happen a lot in the wild. The particular species of boxer crab that Schnytzer studied carries a species of sea anemone that has never been seen on its own in the wild. And yet the crabs always have them, so maybe they all steal them from one another.

Is this how the anemones reproduce? Perhaps partly. But they seem to fall into at least three distinct genetic lineages, and if they only reproduced by crab-cloning, the entire population would be genetically identical. That suggests the anemones do reproduce on their own, Schnytzer says. You can imagine that they could release sperm and eggs into the water, and still breed [while] being held by the crabs.

It seems that the anemonestheir food stolen, their growth stunted, and their bodies regularly torn in twoget very little out of their co-existence with the crabs. Then again, weve never found them free-living, says Schnytzer. If they cant manage on their own, presumably they need the crabs for something.

Randy Brooks from Florida Atlantic University, who has studied the relationships between sea anemones and other animals, says that some species are only found on the shells of hermit crabs. Those anemones, Brooks found, are capable of reproducing by splitting themselves in half, so perhaps the boxers are only accelerating a process that their anemone partners would naturally undergo. I've always wished I could work with the boxer crabs, Brooks says.

Read the rest here:

This Crab Clones Its Allies by Ripping Them in Half - The Atlantic

20 years after Dolly the sheep, human cloning is no closer – Genetic Literacy Project

On July 5, 1996, after 276 failed attempts, a team of scientists at the Roslin Institute at the University of Edinburgh achieved something remarkable:Theymanaged to clone a sheep.

After seeing her, the media went wild, quickly incitinghysteria about what would come next. If scientists knew how to clone a sheep, how soon would it be before they started cloning humans?

Over the last two decades, a number of different animals have been cloned in the same waycows, horses, cats, dogs, pigs. Despite the success in cloning various mammals through nuclear transfer, cloning is still very difficult to pull off. The process is prone to introducing genetic errors, which results in many cloned offspring dying young.

These days, Alta Charo, a professor of law and bioethics at the University of Wisconsin, said no one is really researching reproductive cloning for humans. Its simply too inefficient and error prone to make it worthwhile.Some researchers have suggested cloning technology could be used to rebirth lost children or prevent disease, but Charo said no one has filed an application with the Food and Drug Administration to get started onthis kind of research.

The GLP aggregated and excerpted this blog/article to reflect the diversity of news, opinion, and analysis. Read full, original post:Twenty Years After Dolly the Sheep, Were No Closer to Cloning Humans

Continue reading here:

20 years after Dolly the sheep, human cloning is no closer - Genetic Literacy Project

Don’t fall for this Facebook cloning scam | WFLA.com – WFLA

WTEN Published: February 5, 2017, 10:47 am Updated: February 5, 2017, 10:47 am

NASHVILLE, Tenn.(NEWS10) Facebook scammers are targeting users by making fraudulent or fake profiles trying to obtain personal information.

Scammers use information on someones Facebook profile and create a new account with that persons information and photos. The scammer will then add that persons family and friends.

Security experts at the Identity Theft Resource Center say the scammers use the connections to find out as much information about the victim or their friends. They may send messages containing malware links to steal personal information.

Experts say the scammers are after personal information, contacts, account information, or access PC or phones.

If you suspect suspicious activity contact your friend or family member and Facebook so they can take the profile down.

Telltale signs that an account may be fake or fraudulent is not having a cover photo, few mutual friends, and limited account activity.

WFLA.com provides commenting to allow for constructive discussion on the stories we cover. In order to comment here, you acknowledge you have read and agreed to our Terms of Service. Commenters who violate these terms, including use of vulgar language or racial slurs, will be banned. Please be respectful of the opinions of others and keep the conversation on topic and civil. If you see an inappropriate comment, please flag it for our moderators to review.

View post:

Don't fall for this Facebook cloning scam | WFLA.com - WFLA

Beware of ‘Facebook Cloning’ | KGW.com – kgw.com

Beware of "Facebook Cloning"

Patrick Wright, WXIA 8:57 PM. PST February 01, 2017

GREENSBORO, N.C. -- Most Facebook friend requests come from actual friends, but some are from anonymous people with ulterior motives. And, if you fall for their tricks, it could cost you.

Some hackers are using a tactic called "Facebook Cloning." They steal your Facebook name, add your friends and use your photos to clone your account. Then, they use the fake account to approach your friends and family online.

"Maybe theyre trying to get you to send them money," said Danielle Hatfield, owner of Experience Farm. "However, other scammers are trying to do something a little more nefarious, and thats steal your identity."

Hatfield says the clonersmight even check your statuses to learn to mimic your style of communication.

"When they finally get around to the scam of maybe asking for money, your friends and family will fall for it.," Hatfield said.

Patrick Wright's great aunt fell victim to Facebook cloning.

"I get upset because this is about the third time this has happened," Yvonne Allen said.

A fake account, made to look like Allen's, reached out to Patrick on Facebook Messenger. The user told him they'd received a $50 million grant from the government and wanted to share the news of how others could get their own.

"I didnt receive anything! If they want to send me $50 million, Ill take it," Allen laughed.

RELATED |Decode your children's texting slang

Hatfield says, if you come across an account you aren't sure is real, just search it on Facebook to see if you're already friends with that person. If they send you a questionable post or link, give them a call or text message and ask if it's really them. If the account is fake, report it to Facebook immediately.

If your account gets cloned, Hatfield says you should change your password, warn others, and then check your privacy settings to make sure only friends can view your profile.

Common text/social media acronyms

( 2017 WFMY)

Continued here:

Beware of 'Facebook Cloning' | KGW.com - kgw.com

Beware of Facebook ‘cloning’ scam – USA TODAY

140

Let friends in your social network know what you are reading about

Some hackers steal your Facebook name, add your friends and use your photos to clone your account. Then they use the fake account to approach your friends and family online.

Try Another

Audio CAPTCHA

Image CAPTCHA

Help

CancelSend

A link has been sent to your friend's email address.

A link has been posted to your Facebook feed.

USA Today Network Patrick Wright, WFMY-TV, Greensboro, N.C. Published 8:37 p.m. ET Feb. 2, 2017 | Updated 1:26 a.m. ET Feb. 3, 2017

Facebook is on track to hit 2 billion users this year.(Photo: Loice Venance, AFP/Getty Images)

GREENSBORO, N.C. Most Facebook friend requests come from actual friends, but some are from anonymous people with ulterior motives. Falling for their tricks could cost you.

Some hackers are using a tactic called Facebook cloning. They steal your Facebook name, add your friends and use your photos to clone your account. Then they use the fake account to approach your friends and family online.

"Maybe theyre trying to get you to send them money," said Danielle Hatfield, a social media expert and owner of Experience Farm. "However, other scammers are trying to do something a little more nefarious, and thats steal your identity."

Hatfield said the cloners might even check your statuses to learn to mimic your style of communication.

"When they finally get around to the scam of maybe asking for money, your friends and family will fall for it," Hatfield said.

USA TODAY

Facebook on track to hit 2 billion users this year, analyst predicts

Hatfield said that if you come across an account you aren't sure is real, just search it on Facebook to see if you're already friends with that person. If they send you a questionable post or link, give them a call or text message and ask if it's really them. If the account is fake, report it to Facebook immediately.

If your account gets cloned, Hatfieldsaid you should change your password, warn others, and then check your privacy settings to make sure only friends can view your profile.

Read or Share this story: http://usat.ly/2k6WwNt

THANKS FOR SIGNING UP FOR THE Tech NEWSLETTER

We're sorry.

something went wrong.

Please try again soon, or contact Customer Service at 1-800-872-0001

0) { %>

0) { %>

The rest is here:

Beware of Facebook 'cloning' scam - USA TODAY

Facebook cloning debunked – The i newspaper online iNews – iNews

Warnings about Facebook cloning have been circulating on the platform (Getty)

Facebook users may be seeing posts from their friends warning them about Facebook cloning. Some concerned account holders are urgingothers not to accept a second friend request from accounts purporting to belong to them.

The warning might look something like this:

Heads-up!! Almost every account is being cloned. Your picture and your name are used to create a new face book account (they dont need your password to do this this). They want your friends to add them to their Facebook account. Your friends will think that its you and accept your request. From that point on they can write what they want under your name. I have NO plans to open a new account. Please DO NOT accept a 2nd friend request from me. Copy this message on your wall.

Or this:

HEADS UP: I have been hacked. There is a new hack on Facebook. It includes trying to befriend you, asking for money, or wanting to give you money, and or hurtful phrase coming from you to one of your contacts. Its very dirty and it appears that you have written it. You do not see it but your friends do. This situation can create many misunderstandings. I would like to say to all my contacts that if something shocking appears, it absolutely does NOT come from me and I would be grateful if you let me know. Thank you very much! HEADS UP!!!! Almost every account is beingcloned. Your picture and your name are used to create a new face book account (they dont need your password to do this this). They want your friends to add them to their Facebook account. Your friends will think that its you and accept your request. From that point on they can write what they want under your name. I have NO plans to open a new account. Please DO NOT accept a 2nd friend request from me. Copy this message on your wall.

Some elements of the warnings are true. But some are false:

It is true that scammers can usepeoples names and profile pictures to create a second, fake account under the same name. This has been happening for a while.

It is true that the fake account can then send friend requests to your friends the scammers can see Friends lists if they are public who might accept.

It is true that the scammers behind the fake account could post, leading friends that have accepted the request to believe the posts are genuine.

It is not true thatFacebook cloning is a hack. The word hack implies that someone has gained unauthorised access to your account. Actually the scammersare just using information that is public to create the second account.

It is not true that almost all accounts are being affected. Facebooks1.79 billion monthly active users are unlikely to have all had their accounts cloned.

So what is happening?

Scammers are creatingfake accountsin existing users names. The more information that a user has madepublic, the more genuine the fake account can seem.

People who accept friend requests from the fake account, believing that it genuinely belongs to their friend, might be at risk.The Hoax-Slayer warns that scammers, using a more elaborate scam, might be able to draw money out of friends. Identity theft is also a possible consequence, the website says.

What canI do?

Make your Facebook account as private as possible. Using the privacy shortcuts button in the Facebook masthead, you can check what others can see.

You can also hide your Friends list to deny the scammers this information.

You can find out how to report a cloned account to Facebookhere.

If you want information about the timeline from the account that was impersonating you, check out Facebooks advice here.

If you receive a friend request from someone who you think you may already be friends with, double check before accepting it.

Facebook considers cloned accounts to be a violation of its policies. The site has experts focused on identifying fake profiles and is continuously building and updating tools to tackle the problem.

Continue reading here:

Facebook cloning debunked - The i newspaper online iNews - iNews

Beware Of ‘Facebook Cloning’ | 9news.com – 9NEWS.com

Patrick Wright, WVEC 8:53 AM. MST February 01, 2017

GREENSBORO, N.C. -- Most Facebook friend requests come from actual friends, but some are from anonymous people with ulterior motives. And, if you fall for their tricks, it could cost you.

Some hackers are using a tactic called "Facebook Cloning." They steal your Facebook name, add your friends and use your photos to clone your account. Then, they use the fake account to approach your friends and family online.

"Maybe theyre trying to get you to send them money," said Danielle Hatfield, owner of Experience Farm. "However, other scammers are trying to do something a little more nefarious, and thats steal your identity."

Hatfield says the clonersmight even check your statuses to learn to mimic your style of communication.

"When they finally get around to the scam of maybe asking for money, your friends and family will fall for it.," Hatfield said.

13News Now sister stationWFMY News 2's Patrick Wright's great aunt fell victim to Facebook cloning.

"I get upset because this is about the third time this has happened," Yvonne Allen said.

A fake account, made to look like Allen's, reached out to Patrick on Facebook Messenger. The user told him they'd received a $50 million grant from the government and wanted to share the news of how others could get their own.

"I didnt receive anything! If they want to send me $50 million, Ill take it," Allen laughed.

Hatfield says, if you come across an account you aren't sure is real, just search it on Facebook to see if you're already friends with that person. If they send you a questionable post or link, give them a call or text message and ask if it's really them. If the account is fake, report it to Facebook immediately.

If your account gets cloned, Hatfield says you should change your password, warn others, and then check your privacy settings to make sure only friends can view your profile.

( 2017 WFMY)

Continue reading here:

Beware Of 'Facebook Cloning' | 9news.com - 9NEWS.com