{"id":211162,"date":"2017-08-11T17:48:11","date_gmt":"2017-08-11T21:48:11","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/scientists-successfully-infiltrate-computer-using-malware-coded-into-dna-the-verge\/"},"modified":"2017-08-11T17:48:11","modified_gmt":"2017-08-11T21:48:11","slug":"scientists-successfully-infiltrate-computer-using-malware-coded-into-dna-the-verge","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/scientists-successfully-infiltrate-computer-using-malware-coded-into-dna-the-verge\/","title":{"rendered":"Scientists successfully infiltrate computer using malware coded into DNA &#8211; The Verge"},"content":{"rendered":"<p><p>    In what reads like science fiction becoming reality,    researchers at the University of Washington have been able to    successfully infect a computer with malware coded into a    strand of DNA. In order to see if a computer could be    compromised in that way, the team included a known security    vulnerability in a DNA-processing program before creating a    synthetic DNA strand with the malicious code embedded. A    computer then analyzed the infected strand, and as a result    of the malware in the DNA, the researchers were able to    remotely exploit the computer. The results were published    in a    recent paper.  <\/p>\n<p>    We wanted to understand what new computer security risks are    possible in the interaction between biomolecular information    and the computer systems that analyze it, the researchers    wrote, led by Tadayoshi Kohno,    a professor of computer science at the University of    Washington.  <\/p>\n<p>    The basic structural units of DNA are called nucleotides, and    theyre stored as letters A, C, G, and T. Sequencing allows    scientists to determine the order of the nucleotides, which in    turn means scientists are able analyze the genetic information    carried in the strands. The cost of sequencing has sharply fallen by over    100,000 times in the last 10 years.  <\/p>\n<p>    After sequencing, this DNA data is processed and analyzed using    many computer programs. Modern technology means hundreds of    millions of DNA strands can be processed at the same time.    Though taking over computers using DNA seems like something out    of the movies, creepily played out in real life, the    researchers say theres no reason for concern. We have no    evidence to believe that the security of DNA sequencing or DNA    data in general is currently under attack. Instead, we view    these results as a first step toward thinking about computer    security in the DNA sequencing ecosystem, the scientists said.  <\/p>\n<p>    A primary goal of this study was to better understand the    feasibility of DNA-based code injection attacks. We also know    of no efforts by adversaries to compromise computational    biology programs, they explain.  <\/p>\n<p>    Just last month, scientists revealed they were able to insert a        GIF of a horse into the DNA of living bacteria.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.theverge.com\/2017\/8\/11\/16130568\/scientists-infiltrate-computer-malware-code-dna\" title=\"Scientists successfully infiltrate computer using malware coded into DNA - The Verge\">Scientists successfully infiltrate computer using malware coded into DNA - The Verge<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In what reads like science fiction becoming reality, researchers at the University of Washington have been able to successfully infect a computer with malware coded into a strand of DNA.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/scientists-successfully-infiltrate-computer-using-malware-coded-into-dna-the-verge\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-211162","post","type-post","status-publish","format-standard","hentry","category-dna"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211162"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211162"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211162\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}