Workflow
工程学
icon
Search documents
Aflac Data Breach By Scattered Spider Hackers Is No Quacking Matter
Forbes· 2025-06-21 16:10
Core Points - Aflac disclosed a data breach on June 20th, which may have compromised sensitive personal information, including social security numbers [3] - The breach was detected on June 12th, and Aflac is investigating the extent of the breach with external cybersecurity experts [3] - The hacking group Scattered Spider is believed to be responsible for the breach, which has previously targeted the insurance industry [4][5] - Scattered Spider employs social engineering tactics, posing as employees to manipulate IT support staff [6] - Aflac is offering free credit monitoring and identity theft insurance to affected customers for two years [8] Industry Insights - The insurance industry is currently under threat from cybercriminals, particularly from groups like Scattered Spider, which focus on specific sectors [5] - Managed Service Providers are often targeted as they can be weak links in security, allowing hackers to access multiple companies through one breach [7] - Companies in the insurance sector should remain vigilant against social engineering schemes that could compromise their security [5]
MIT工科生跨界AI,独作论文登Nature:只需3.5小时修复600年前名画
量子位· 2025-06-16 06:59
不过需要揭晓的是,修复后画作并非数字复制品,而是真真切切的原画(doge)。 他在原画表面贴上了一层"遮罩" (很薄的塑料薄膜) —— 一水 发自 凹非寺 量子位 | 公众号 QbitAI MIT理工男跨界艺术,一不小心就以一篇独作论文登上Nature?! 由他设计的AI算法,将原本需要数月/数年才能搞定的名画修复工作,极限压缩至几小时。 Alex Kachkine,打破画作修复只能对原作数字扫描品进行"缝缝补补"的传统艺能,提出一种 "以数字方式修复一幅画,并在物理上实现效果" 的全新方法。 以下面这幅15世纪的油画为例,从左到右依次为受损原画、具体受损类型扫描、修复后画作,一眼看去修复效果确实还不错。 贴上后能直接修复画上的破损、褪色等问题,而且能在不损害原画的情况下,被化学品轻松去除。 当然最最重要的是,由于新方法引入了AI算法,这一修复过程从数年、数月转变为几小时。 拿上面的油画来说,面对5612个需要修复的区域 (需要用57314种不同的颜色填充) ,整个过程从开始到结束耗时 3.5小时 ,这比传统修 复方法快了 约66倍 。 下面揭晓Alex Kachkine修复油画的具体过程。 "缺损越多,新方 ...
避坑“美丽陷阱”!上海九院皮肤科副主任医师陈骏博士起底玻尿酸与胶原蛋白科学美容
当"早C晚A"成为护肤公式、玻尿酸与胶原蛋白争议不断,中国美妆市场在成分浪潮中迎来高增长的繁 荣期。在"成分至上"的营销口号下,消费者对功效的狂热追求与尚待完善的国家标准体系之间,正形成 一道日益扩大的认知鸿沟。 监管标准的滞后性成为争议发酵的关键催化剂。伴随"生物活性肽""天然植物提取物""基因工程技术"等 新兴词汇爆发式涌入,美妆产品的技术复杂度已显著超越现有国标的覆盖范围。 21世纪:当下玻尿酸和胶原蛋白在医疗美容的主要应用场景分别是什么?它们的核心适应症和针对的皮 肤问题有何显著区别?在实际选择时,医生的决策依据是什么? 陈骏医生:玻尿酸是一种广泛存在于人体皮肤、结缔组织和关节中的天然多糖,具有保湿和填充功能。 在医疗美容领域,不同分子量的玻尿酸主要用于面部填充与塑形,如法令纹、苹果肌、泪沟、鼻背、下 巴等,帮助恢复面部轮廓的立体感。 而胶原蛋白是皮肤的主要结构蛋白,占皮肤干重的70%以上,对维持皮肤的紧致度和弹性至关重要。在 医疗美容中,主要用于皮肤紧致与修复,刺激皮肤自身胶原蛋白的生成,增强皮肤的保水能力,使皮肤 更加水润、光泽,改善皮肤松弛、毛孔粗大等问题。 从核心适应症来看,玻尿酸主要针对皮肤 ...
让未来汽车设计融入表演艺术和自然之美
在初期创作期间,朱晨澜度过了无数个推翻重来的夜晚。他面临的首个挑战,是如何在有限的车载空间 内实现"功能"与"疗愈"的平衡。传统汽车设计强调人机工程学,而《MOS》则试图在此基础上叠加"情 感工程学"——通过动态投影、生物反馈、场景化交互等技术,构建多维度的治愈体系。 据介绍,车身搭载的可编程LED屏与投影系统,并非单纯的视觉噱头,而是希望借此打破车与人的边 界。当车辆行驶时,车身图案可随环境动态变化,也可自行设置场景主题;当车辆停靠广场时,乘客可 通过触摸、声音参与画面创作,让汽车从"私有空间"转化为"城市公共艺术的参与者"。事实上,这种设 计逻辑,暗合了95后、00后对"社交化出行"的隐性需求。 "东风梦想车"大赛自诞生以来,为汽车相关专业学子求学就业、创新创造提供了许多支持。图为加兰德 队的朱晨澜与获奖作品《MOS-mind open space》。 作为国内知名的汽车领域青年设计大赛,"东风梦想车"大赛自诞生以来,为汽车相关专业学子求学就 业、创新创造提供了许多支持。近日,第七届"东风梦想车"中国青年汽车创意设计大赛决赛在东风汽车 全球创新中心落幕,经过激烈角逐,来自清华大学的"绝对队"凭借作品《灵驭 ...
科普书单·新书|鸟界戏精观察报告
Xin Lang Cai Jing· 2025-04-22 06:13
《证明的故事:从勾股定理到现代数学》 [澳]约翰·史迪威 著,程晓亮 张浩 译,人民邮电出版社 | 图灵新知,2025年2月版 本书从古希腊几何学时代讲起,涵盖代数、微积分、集合、数论、拓扑、逻辑等几乎全部数学分支中的证明故事,讲述了证明的演变及其在数学 中的重要作用和启发意义。我们将看到欧几里得、康托尔、哥德尔、图灵等数学大师的精彩发现和发明。本书作者约翰·史迪威(John Stillwell) 是澳大利亚数学家,美国麻省理工学院博士,旧金山大学荣休教授,首届美国数学学会会士。 [英]安东尼奥·帕迪拉 著,阳曦 译,天津科学技术出版社 | 未读,2025年3月版 《非凡之数:9个神奇数字中的宇宙真相》 从"0.000 000 000 000 000 1"到"无限",数字既能揭示微观粒子世界的奥秘,也能让广袤的宇宙展露真相。从麦克斯韦、爱因斯坦、狄拉克,到费 曼、霍金,伟大的物理学家们总是在对数学真理的探索中一步步迈向对现实的本质理解,而到底哪些数字才是宇宙的终极答案?在本书中,理论 物理学家、宇宙学家安东尼奥·帕迪拉将展示9个神奇数字如何成为黑洞、相对论、量子力学等舞台上的主角,以及它们如何带领我们接近物理 ...
中国开盒产业链
创业邦· 2025-03-25 08:35
Core Viewpoint - The article discusses the emergence and implications of the "opening box" industry, which allows individuals to easily access personal information about others, leading to significant privacy concerns and potential abuse [3][4][81]. Group 1: Incident Overview - The article begins with the incident involving a Baidu executive's daughter, clarifying that the data accessed was not from Baidu but from foreign software [3][4]. - It highlights the ease with which personal information can be accessed through the "opening box" service, likening it to an upgraded version of "human flesh search" [5][6]. Group 2: Evolution of Information Access - The transition from an anonymous internet era to one where personal information is easily exposed is discussed, emphasizing the role of social media in this shift [9][10][13]. - The article explains how "human flesh search" initially served as a form of public oversight but has evolved into a tool for online violence due to its accessibility [14][15]. Group 3: The "Opening Box" Industry Chain - The "opening box" industry has developed a complete supply chain, with data leaks primarily originating from social engineering and insider threats [17][18]. - Social engineering is defined as exploiting human weaknesses to gain access to sensitive information, making it difficult to ensure data security [19][20]. Group 4: Data Leakage Mechanisms - The article describes how hackers can easily breach databases and sell the information, with two main methods: spontaneous and customized data extraction [22][25]. - The concept of "credential stuffing" is introduced, where hackers exploit reused passwords across different platforms to gain unauthorized access [29][30]. Group 5: Role of Insiders - Insiders, such as employees with access to sensitive data, pose a significant risk, as they may sell information for personal gain [33][34]. - The article illustrates how the vast and unregulated data systems in China contribute to the ease of data leaks [34][35]. Group 6: Social Engineering Databases - The "social engineering database" serves as a middle layer in the "opening box" industry, where data is aggregated and sold to various entities, including fraudsters [42][45]. - The article notes that these databases allow for the creation of comprehensive profiles on individuals, leading to severe privacy violations [54][55]. Group 7: Market for Personal Information - The primary customers for social engineering databases are often involved in fraudulent activities, as they can purchase large volumes of personal data [60][61]. - The article explains how the ease of accessing personal information has led to a rise in scams and targeted harassment [62][63]. Group 8: Legal and Regulatory Challenges - Existing laws regarding online privacy and data protection are discussed, highlighting the challenges in enforcement and the need for more robust regulations [83][84]. - The article emphasizes that while there are laws against data misuse, the execution and effectiveness of these laws remain questionable [87][88]. Group 9: Future Implications - The article concludes by stressing the urgent need for national attention to the "opening box" industry, likening it to the fight against fraud [98][99]. - It calls for a comprehensive approach to protect individual privacy and dignity in the digital age, as the current trajectory poses significant risks to society [96][97].