681 resultados para malware attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are many tales describing ferocious schools of piranha attacking humans, but there are few scientific data supporting such behavior. The very few documented instances of humans attacked and eaten by piranha schools include 3 that occurred after death by other causes (eg, heart failure and drowning). These predaceous fishes, however, do occasionally injure bathers and swimmers in lakes and rivers. The characteristic profile of most injuries is a single bite per victim, generally related to the fish defending its brood. This paper describes an outbreak of piranha bites in a dammed river portion in southeast Brazil. The outbreak was caused by the speckled piranha, Serrasalmus spilopleura, a widespread species which benefits from the growing tendency of damming rivers all over Brazil. This article focuses on the epidemiological and clinical aspects of the injuries, as well as on piranha biology, to gain a better understanding of the natural history of bite outbreaks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objectives of the present study were to verify if the males of the wasp Mischocyttarus cerberus participate in defense of the nest as they react to attack by ants, and to observe if they use chemical defense. First, wasps were stimulated with an empty pair of tweezers and a second stimulation was done with a pair of tweezers containing an ant, Camponotus crassus. The behaviors of the wasps were recorded and analyzed. The males can participate in defense of the nest, presenting some aggressive behaviors, even so, most of the time they ignore the stimulation, hide behind the nest and stay immobile.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and classification schemes that analyze malware behavior. In this paper we propose a distributed architecture to improve malware collection using different honeypot technologies to increase the variety of malware collected. We also present a daemon tool developed to grab malware distributed through spam and a pre-classification technique that uses antivirus technology to separate malware in generic classes. © 2009 SPIE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. © 2011 Wilderness Medical Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial of service attacks are common place and cause great inconvenience. Thus, this study presents simulations of denial of service attacks on 802.11 wireless networks using the network simulator OMNeT++. Furthermore, we present an approach to mitigate such attack, obtaining significant results for improving wireless networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is with great astonishment and concern that I read the letter to the editor by Barreiros et al1 in which the authors report an attack by a blue shark on a spear fisherman in the Azores. Whereas the first part of the article accurately details the circumstances of the accident, Barreiros et al, in the second part, devise a far-fetched and illegitimate connection with shark diving, in particular with shark feeding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several pharmacological targets have been proposed as modulators of panic-like reactions. However, interest should be given to other potential therapeutic neurochemical agents. Recent attention has been given to the potential anxiolytic properties of cannabidiol, because of its complex actions on the endocannabinoid system together with its effects on other neurotransmitter systems. The aim of this study was to investigate the effects of cannabidiol on innate fear-related behaviors evoked by a prey vs predator paradigm. Male Swiss mice were submitted to habituation in an arena containing a burrow and subsequently pre-treated with intraperitoneal administrations of vehicle or cannabidiol. A constrictor snake was placed inside the arena, and defensive and non-defensive behaviors were recorded. Cannabidiol caused a clear anti-aversive effect, decreasing explosive escape and defensive immobility behaviors outside and inside the burrow. These results show that cannabidiol modulates defensive behaviors evoked by the presence of threatening stimuli, even in a potentially safe environment following a fear response, suggesting a panicolytic effect. Neuropsychopharmacology (2012) 37, 412-421; doi:10.1038/npp.2011.188; published online 14 September 2011

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: To observe postpartum migraine recurrence among migraine sufferers before pregnancy, its classifications and associated factors and to compare women, who were exclusively breastfeeding, with those that used other forms of infant feeding. Methods: Out of 686 consecutively assisted women, at the first postnatal week, 266 were identified as migraine sufferers before pregnancy. Among those, one in five that were exclusively breastfeeding (53) and all the ones consecutively using others forms of infant feeding (40) were interviewed at the first and forth postpartum weeks. Results: After multivariable analysis, exclusive breastfeeding, no breastfeeding problems, and low income were associated with decrease in migraine recurrence at the first postpartum week. At the fourth week, exclusive breastfeeding continued to be a protective factor. Conclusions: A decrease in postpartum migraine recurrence seems to be another advantage of exclusive breastfeeding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To review the clinical characteristics of patients with neuromyelitis optica (NMO) and to compare their visual outcome with those of patients with optic neuritis (ON) and multiple sclerosis (MS). Methods: Thirty-three patients with NMO underwent neuro-ophthalmic evaluation, including automated perimetry along with 30 patients with MS. Visual function in both groups was compared overall and specifically for eyes after a single episode of ON. Results: Visual function and average visual field (VF) mean deviation were significantly worse in eyes of patients with NMO. After a single episode of ON, the VF was normal in only 2 of 36 eyes of patients with NMO compared to 17 of 35 eyes with MS (P < 0.001). The statistical analysis indicated that after a single episode of ON, the odds ratio for having NMO was 6.0 (confidence interval [CI]: 1.6-21.9) when VF mean deviation was worse than -20.0 dB while the odds ratio for having MS was 16.0 (CI: 3.6-68.7) when better than -3.0 dB. Conclusion: Visual outcome was significantly worse in NMO than in MS. After a single episode of ON, suspicion of NMO should be raised in the presence of severe residual VF deficit with automated perimetry and lowered in the case of complete VF recovery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[EN]Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati. Il lavoro è stato svolto in un contesto aziendale come parte di un tirocinio. Come incipit, ho effettuato un attacco mirato contro l’azienda in questione per valutare la validità dei sistemi di difesa. L’attacco ha avuto successo, dimostrando l’inefficacia di moderni sistemi di difesa. Analizzando i motivi del fallimento nel rilevare l’attacco, sono giunto a formulare una strategia di difesa contro attacchi mirati sotto forma di servizio piuttosto che di prodotto. La mia proposta è un framework concettuale, chiamato WASTE (Warning Automatic System for Targeted Events) il cui scopo è fornire warnings ad un team di analisti a partire da eventi non sospetti, ed un business process che ho nominato HAZARD (Hacking Approach for Zealot Attack Response and Detection), che modella il servizio completo di difesa contro i targeted attack. Infine ho applicato il processo all’interno dell’azienda per mitigare minacce ed attacchi informatici.