{"id":211161,"date":"2017-08-11T17:48:11","date_gmt":"2017-08-11T21:48:11","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/technobabble-dancing-hot-dog-is-ars-first-king-and-yes-dna-is-hackable-cio-dive\/"},"modified":"2017-08-11T17:48:11","modified_gmt":"2017-08-11T21:48:11","slug":"technobabble-dancing-hot-dog-is-ars-first-king-and-yes-dna-is-hackable-cio-dive","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/technobabble-dancing-hot-dog-is-ars-first-king-and-yes-dna-is-hackable-cio-dive\/","title":{"rendered":"Technobabble: Dancing hot dog is AR&#8217;s first king and yes, DNA is hackable &#8211; CIO Dive"},"content":{"rendered":"<p><p>      Technobabble is our look at the more colorful aspects of      technology and the tech industry.Be sure to check out      our most recent edition, which has       microchips on the brain.    <\/p>\n<p>    In the last few weeks humans became a part of the    technological infrastructure with employee    microchipping. Potential privacy concerns    aside,employees of Three Square    Market volunteered for the seemingly sci-fi    microchipping.  <\/p>\n<p>    While many of us would prefer to keep    technical hardware outside our immediate    biology, two DNA researchers decided to    reverse that idea. In fact, they used DNA to infiltrate    technology and their experiment proved    successful.  <\/p>\n<p>    This week, researchers from the University of    Washington tested a self-inflicted malware attack within their    DNA research lab, according to Wired. The team    introduced malicious code into a sample of DNA that when tested    by a gene sequencer, the resulting data became malware on the    computer that received it.  <\/p>\n<p>    In conducting their experiment, the researchers    intentionally created a high-risk environment, susceptible to a    \"bioterrorist\" attack. This included muting security programs    and creating vulnerabilities in their software.  <\/p>\n<p>    The attack is supposedly the first    \"DNA-based exploit of a computer system,\"    according to MIT Technology    Review.   <\/p>\n<p>    While genetic specialists have shrugged off the    effort, claiming the attack was destined to succeed because of    the controlled environment, it is now evident that such an    attack is possible. Hackers could become    biohackers or something even more sinister.  <\/p>\n<p>    Vulnerabilities in security and software systems    are common on the cybersecurity landscape. In fact, most    cyberattacks depend on them, as was the case with    May's WannaCry attack.    The only difference between the deliverance of a traditional    cyberattack and a DNA attack,is their point of    entry.  <\/p>\n<p>    The University of Washington researchers are now    arguing that biohackers could send faulty, manipulated or    simply fake DNA samples with malicious encryptions to    industries that study and store such data. These include    college campuses, police forensics and genetic processing labs.    The idea is that hackers, motivated by the plethora of personal    data stored in these industries, could send maliciously coded    DNA to be tested and thus infect computers and    networks.  <\/p>\n<p>    Previously, DNA scientists only had to worry about    genetic miscalculations or those that could harm the human    biology, not the safety of their computer    software.  <\/p>\n<p>    Traditional cyberattacks are estimated to cost    the U.S. $121 billion per    year. Companies are highly scrutinized and legally penalized    when personal information is either leaked or exposed to    malicious actors. Now that DNA could become the next phishing    scam, it seems like threats within cybersecurity have expanded    once again. When hacking evolves, so must    cybersecurity.  <\/p>\n<p>    Since a corrupt sample of saliva could potentially    be the next ransomware or wiper,    what developments will take place to test a genetic sampling    before they reach a networked gene sequencer?  <\/p>\n<p>    For the first time since its inception 16 years    ago, an American has won Certiport's annual Microsoft Office Specialist World    Championship in the Excel division, according    to an announcement. John Dumoulin, a    17-year-old from Virginia, took home a $7,000 cash prize and    serious bragging rights for his college    applications.  <\/p>\n<p>    Most of the other 560,000 worldwide student entries    and 157 finalists ranging from ages 13 to 22 were    not so fortunate in their efforts to prove their mastery of    Microsofts Excel, Word and PowerPoint products.  <\/p>\n<p>    Students were required to take a Microsoft Office    Specialist certification exam, and finalists were selected at    regional competitions. The project-based tests not only    highlight the technical skills of youth worldwide, but also    engage students with computer-based technology and develop    competitive skills tailored to real-world    applications.  <\/p>\n<p>    With past and present victors hailing from every    continent except Antarctica, the championship offers a small    glimpse into the global presence of and dependence upon office    technology.  <\/p>\n<p>    It stands among the ranks of other prestigious    international technology competitions such as the    IEEE Student Branch    Website Contest, the ACMInternational Collegiate    Programming Contest and Microsoft's Imagine    Cup.  <\/p>\n<p>    Augmented and virtual reality is taking off,    with leading companies investing heavily in    enterprise and consumer technology. Now, AR is even finding a    home in earnings calls.  <\/p>\n<p>    That's right, Evan Spiegal, CEO of Snap Inc.,    declared SnapChat's dancing hot dog the \"worlds first    augmented reality superstar,\" BuzzFeed    reports.  <\/p>\n<p>    The hot dog was a hit, viewed 1.5 billion times on    SnapChat since its debut. Snap's earnings, however, were not    quite so hot. In its latest earnings report, Snap Inc. missed    analysts' earnings expectations and its stock is down    16%.  <\/p>\n<p>    The internet caught fire earlier this week when it    was revealed the creator of current password policies has    regrets. In 2003, Bill Burr wrote an 8-page document on    password policies for the National Institute of Standards and    Technology advising users to change passwords regularly,    employing a mix of characters, numbers and capital    letters, The Wall Street Journal    reports.  <\/p>\n<p>    Those password policies became law, triggering    hair-pulling and vehement exclamations every 90 days when    programs insisted users change passwords.  <\/p>\n<p>    But Burr, now retired, said those 2003 policies    don't actually stop hackers. After all, is there really much    difference between PaSsWord1! and PaSsWord!1? Changes are too    subtle, making passwords easy to guess. And, it just causes    problems for users too.  <\/p>\n<p>    This year, NIST has revamped its password policies    and done away with some of the long-standing best    practices for passwords. The new framework gets rid of    arbitrary characters and frequent password resets, instead    favoring long password phrases and password resets only if    there is evidence of a compromised password.  <\/p>\n<p>    Soon the most-common passwords    could change from \"123456\" to    \"thequickbrownfoxjumpsoverthelazydog.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.ciodive.com\/news\/technobabble-dancing-hot-dog-is-ars-first-king-and-yes-dna-is-hackable\/449156\/\" title=\"Technobabble: Dancing hot dog is AR's first king and yes, DNA is hackable - CIO Dive\">Technobabble: Dancing hot dog is AR's first king and yes, DNA is hackable - CIO Dive<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Technobabble is our look at the more colorful aspects of technology and the tech industry.Be sure to check out our most recent edition, which has microchips on the brain. In the last few weeks humans became a part of the technological infrastructure with employee microchipping <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/technobabble-dancing-hot-dog-is-ars-first-king-and-yes-dna-is-hackable-cio-dive\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-211161","post","type-post","status-publish","format-standard","hentry","category-dna"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211161"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211161"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211161\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}