In ‘Bullet Train’, Brad Pitt’s new screen hero Ladybug is a hired assassin with a reverse midas touch. Seemingly straightforward contracts have a tendency to, ahem, hit the buffers and you don’t have to be one of his targets to get hurt during an operation. It’s a quirky concept, and ‘Bullet Train’ makes the most […]
NEWS
New bionic 3D cameras “see” like flies and bats
A pair of bioengineers and an academic at UCLA have devised a new 3D scanning camera system that is significantly more advanced than the current state-of-the-art and can figure out the size and shape of objects hidden round corners or behind other objects. The technology could find its initial home in autonomous vehicles and medical […]
MIT deep learning project generates real-time holograms on an iPhone
An MIT project supported by Sony has demonstrated that photorealistic 3D colour holograms can now be generated quickly, even on a smartphone. Generating the vast amounts of data required to enable stable holography has already been considered a significant 3D visualisation challenge, so this could represent a big breakthrough. Obvious applications include VR and AR […]
New NFTS Virtual Production course starts January 2023
The UK’s National Film & Television School in Beaconsfield, Bucks has announced the creation of a brand-new 24 week part-time blended learning Virtual Production course that will begin in January 2023. The course synopsis Virtual Production (VP) is a rapidly growing area of content production. By combining CGI, game-engines, and virtual reality technologies, VP enables […]
Ransomware & ransomware DoS: similar but different
Ransomware and RDoS (Ransomware Denial Of Service or Ransomware DoS) have a common objective and some of their tactics overlap, but techniques and success rates vary wildly. Ransomware With ransomware attacks, which use a crypto-locking malware that destroys systems and makes data inaccessible. that malware needs to be deployed on servers inside the organisation, from where they can wreak havoc. Initial Access Brokers often make the initial access, then sell that access to ransomware gangs. Ransomware DoS […]
C2 Cyber CEO’s top five protection tips
As IT teams and businesses brace themselves for more and more sophisticated cyber attacks in 2022, Jonathan Wood, CEO of risk management platform C2 Cyber offers his thoughts on how businesses can best protect themselves in this interview on the Professional Security website. 1 – Ransomware will continue to be the number one cyber threat: […]