AirAsia crash Divers may have found copilots body

first_imgIndonesian divers have found a body believed to be the French co-pilot who was steering an AirAsia plane when it crashed in December with 162 people onboard, an official said on Saturday.Coordinator of the search and rescue effort S B Supriyadi said the body was retrieved from the front part of the fuselage during a search operation on Friday.“It is likely the body of the French co-pilot, wearing uniform with three stripes on (the) shoulder,” he told AFP, adding that the body is still being held onboard the Pacitan warship before being taken to land. Also Read – Pro-Govt supporters rally as Hong Kong’s divisions deepenA formal confirmation will be given after the Disaster Victims Identification (DVI) team finish identifying the body, which is in poor condition, S B Supriyadisaid.Indonesian investigators last month said French co-pilot Remi Plesel was flying the plane before it crashed, rather than Captain Iriyanto, an experienced former fighter pilot.Flight QZ8501 went down in stormy weather on December 28 in the Java sea during what was supposed to be a short trip from the Indonesian city of Surabaya to Singapore.Divers also found three bodies inside the main body of the plane yesterday and another three bodies near the fuselage today, bringing a total number of dead retrieved to 101, Supriyadi said.Rescue services are still trying to lift the fuselage from the seabed using giant inflatable bags after earlier attempts failed.last_img read more

The mystery trail

first_imgThey say, nobody reads a mystery in search of the middle; they read it to get to the crux – if it’s a downer, quite simply, they won’t buy you anymore. A detective fiction, in itself, must necessarily be a predicament – a seam, screaming to be deboned, the obligation being constant and the powers of supply variable. With time, the reader grows more refined and tricky to gratify and the novelist, more fatigued. And, this is what happens in the case of Barbara Cleverly, a British writer, whose first novel The Last Kashmiri Rose takes place in India, 1922. Also Read – ‘Playing Jojo was emotionally exhausting’Setting a story against an exotic historical milieu is a time-honoured practice. Sir Arthur Conan Doyle loved to create elaborate backdrops for characters in his Sherlock Holmes tales. Likewise, Agatha Christie liked to position her contemporary novels in far-flung lands. Cleverly tries treading on their footsteps but doesn’t quite match up to the standards.  As the star of the series, Cleverly creates Commander Joe Sandilands of London’s Metropolitan Police. He is a World War I veteran, who entered into police work as an expected progression from military intelligence service. Other than being tall and good-looking, except for a battle scar, he is also single, which leaves him at ease to shape sporadic liaisons with fascinating ladies along the journey, as and when required. Unlike many protagonists in this genre, Sandilands doesn’t have any noteworthy vices or idiosyncrasies. Also Read – Leslie doing new comedy special with NetflixThe primary action of The Last Kashmiri Rose takes place at a military and government base in Panikhat, about 50 miles south of Calcutta, where an officer’s wife has just been murdered in a rather horrific way. Joe quickly learns that this murder is only the latest in a series of similar crimes that began in 1910 with the death of another officer’s wife in a terrible house fire. Cleverly begins her narrative with a brief telling of the events surrounding that incident – a tactic that she makes use of in the succeeding novels in the series, as well. For this escapade, Joe has two companions – Nancy Drummond, a sharp, quick-witted and eye-catching young woman, who is married to one of the high-ranking government officials on the base and Naurung Singh – a young Sikh officer, who is assigned to work with Joe on the investigation. Cleverly does a neat job of demarcating the imbalance of British India’s hierarchical society. However, as austerely as it might have begun, the issue of a possible native turbulence once the mystery is solved, dies a hushed death. None of the characters lose sleep over it again; instead, in a perfectly parlour-mystery mode, the murders are solved and society easily slips back normalcy. Equally disquieting is the romance between Sandilands and Nancy Drummond, for it’s hardly plausible that two members of the British upper-middle-class in the early 1920s would foxtrot so gaily into an affair, without so much as fluttering an eyelid over the potential scandal. With just about an ephemeral mention of “looseness of morals” in colonial India, this anachronistically modern couple appear blithely nonchalant about taking a roll or two in the hay in broad daylight!Moving on, Ragtime in Simla picks up from where The Last Kasmiri Rose ends, around March 1922. After the opening episode prepares the leg for the mystery, we find our hero aboard a train to the mountain town of Simla. In this novel, Joe has Simla’s Police Superintendent Charlie Carter as his sidekick, who courteously accepts Joe’s participation in the investigation that is to follow. Alarm rings as Joe’s travelling companion; a Russian opera singer is shot at his side on the road up to Simla and the detective finds himself neck-deep into a murder investigation, which has its roots in the aftermath of the First World War. As the obscurity unfolds, he finds that behind the dazzling facade of the social life in Simla, lies a shadow of murder, vice and blackmail.And as far as The Damascened Blade is concerned, it is once again, like the former, a tale of revenge, tracing the legacy of a bitter grudge, with roots embedded deep in the past. Where Cleverly distinctly falls short, is her characterisation, not to mention her uncanny tendency of revealing more than requisite at inopportune moments. A criminal demands unusual detecting – he is the creative artiste, the detective – merely a critic. Sandilands, who is up on his Freud and Jung is full of elaborate theories – as to how killers are created and sustained; he needs to realise that criminal profiling is hardly news! Noticeably thin on personality, he is easy-going and diplomatic and appears anything but intelligent (despite repeated claims by those around him)! Also, Cleverly lacks precision. The long descriptive passages; dallying with side issues and atmospheric preoccupation hold up the action and introduces issues irrelevant to the chief purpose. Where the crime should disrupt the status quo for readers to take pleasure in the transgressive thrill; to survey approvingly as the detective sets things right, Sandilands becomes monotonously predictable and that’s where Cleverly fails to make the grade!last_img read more

6 artificial intelligence cybersecurity tools you need to know

first_imgRecently, most of the organizations experienced severe downfall due to an undetected malware, Deeplocker, which secretly evaded even the stringent cyber security mechanisms. Deeplocker leverages the AI model to attack the target host by using indicators such as facial recognition, geolocation and voice recognition. This incidence speaks volumes about the big role AI plays in the cybersecurity domain. In fact, some may even go on to say that AI for cybersecurity is no longer a nice to have tech rather a necessity. Large and small organizations and even startups are hugely investing in building AI systems to analyze the huge data trove and in turn, help their cybersecurity professionals to identify possible threats and take precautions or immediate actions to solve it. If AI can be used in getting the systems protected, it can also harm it. How? The hackers and intruders can also use it to launch an attack–this would be a much smarter attack–which would be difficult to combat. Phishing, one of the most common and simple social engineering cyber attack is now easy for attackers to master. There are a plethora of tools on the dark web that can help anyone to get their hands on phishing. In such trying conditions, it is only imperative that organizations take necessary precautions to guard their information castles. What better than AI? How 6 tools are using artificial intelligence for cybersecurity Symantec’s Targeted attack analytics (TAA) tool This tool was developed by Symantec and is used to uncover stealthy and targeted attacks. It applies AI and machine learning on the processes, knowledge, and capabilities of the Symantec’s security experts and researchers. The TAA tool was used by Symantec to counter the Dragonfly 2.0 attack last year. This attack targeted multiple energy companies and tried to gain access to operational networks. Eric Chein, Technical Director of Symantec Security says, “ With TAA, we’re taking the intelligence generated from our leading research teams and uniting it with the power of advanced machine learning to help customers automatically identify these dangerous threats and take action.” The TAA tools analyze incidents within the network against the incidents found in their Symantec threat data lake. TAA unveils suspicious activity in individual endpoints and collates that information to determine whether each action indicate hidden malicious activity. The TAA tools are now available for Symantec Advanced Threat Protection (ATP) customers. Sophos’ Intercept X tool Sophos is a British security software and hardware company. Its tool, Intercept X, uses a deep learning neural network that works similar to a human brain. In 2010, the US Defense Advanced Research Projects Agency (DARPA) created their first Cyber Genome Program to uncover the ‘DNA’ of malware and other cyber threats, which led to the creation of algorithm present in the Intercept X. Before a file executes, the Intercept X is able to extract millions of features from a file, conduct a deep analysis, and determine if a file is benign or malicious in 20 milliseconds. The model is trained on real-world feedback and bi-directional sharing of threat intelligence via an access to millions of samples provided by the data scientists. This results in high accuracy rate for both existing and zero-day malware, and a lower false positive rate. Intercept X utilizes behavioral analysis to restrict new ransomware and boot-record attacks.  The Intercept X has been tested on several third parties such as NSS labs and received high-scores. It is also proven on VirusTotal since August of 2016. Maik Morgenstern, CTO, AV-TEST said, “One of the best performance scores we have ever seen in our tests.” Darktrace Antigena Darktrace Antigena is Darktrace’s active self-defense product. Antigena expands Darktrace’s core capabilities to detect and replicate the function of digital antibodies that identify and neutralize threats and viruses. Antigena makes use of Darktrace’s Enterprise Immune System to identify suspicious activity and responds to them in real-time, depending on the severity of the threat. With the help of underlying machine learning technology, Darktrace Antigena identifies and protects against unknown threats as they develop. It does this without the need for human intervention, prior knowledge of attacks, rules or signatures. With such automated response capability, organizations can respond to threats quickly, without disrupting the normal pattern of business activity. Darktrace Antigena modules help to regulate user and machine access to the internet, message protocols and machine and network connectivity via various products such as Antigena Internet, Antigena Communication, and Antigena network. IBM QRadar Advisor IBM’s QRadar Advisor uses the IBM Watson technology to fight against cyber attacks. It uses AI to auto-investigate indicators of any compromise or exploit. QRadar Advisor uses cognitive reasoning to give critical insights and further accelerates the response cycle. With the help of IBM’s QRadar Advisor, security analysts can assess threat incidents and reduce the risk of missing them. Features of the IBM QRadar Advisor Automatic investigations of incidents QRadar Advisor with Watson investigates threat incidents by mining local data using observables in the incident to gather broader local context. It later quickly assesses the threats regarding whether they have bypassed layered defenses or were blocked. Provides Intelligent reasoning QRadar identifies the likely threat by applying cognitive reasoning. It connects threat entities related to the original incident such as malicious files, suspicious IP addresses, and rogue entities to draw relationships among these entities. Identifies high priority risks With this tool, one can get critical insights on an incident, such as whether or not a malware has executed, with supporting evidence to focus your time on the higher risk threats. Then make a decision quickly on the best response method for your business. Key insights on users and critical assets IBM’s QRadar can detect suspicious behavior from insiders through integration with the User Behavior Analytics (UBA) App and understands how certain activities or profiles impact systems. Vectra’s Cognito Vectra’s Cognito platform uses AI to detect attackers in real-time. It automates threat detection and hunts for covert attackers. Cognito uses behavioral detection algorithms to collect network metadata, logs and cloud events. It further analyzes these events and stores them to reveal hidden attackers in workloads and user/ IoT devices. Cognito platform consists of Cognito Detect and Cognito Recall. Cognito Detect reveals hidden attackers in real time using machine learning, data science, and behavioral analytics. It automatically triggers responses from existing security enforcement points by driving dynamic incident response rules. Cognito Recall determines exploits that exist in historical data. It further speeds up detection of incident investigations with actionable context about compromised devices and workloads over time. It’s a quick and easy fix to find all devices or workloads accessed by compromised accounts and identify files involved in exfiltration. Just as diamond cuts diamond, AI cuts AI. By using AI to attack and to prevent on either side, AI systems will learn different and newer patterns and also identify unique deviations to security analysts. This provides organizations to resolve an attack on the way much before it reaches to the core. Given the rate at which AI and machine learning are expanding, the days when AI will redefine the entire cybersecurity ecosystem are not that far. Read Next DeepMind AI can spot over 50 sight-threatening eye diseases with expert accuracy IBM’s DeepLocker: The Artificial Intelligence powered sneaky new breed of Malware 7 Black Hat USA 2018 conference cybersecurity training highlights Top 5 cybersecurity trends you should be aware of in 2018last_img read more