145 research outputs found
Parsing a Perceptual Decision into a Sequence of Moments of Thought
Theoretical, computational, and experimental studies have converged to a model of decision-making in which sensory evidence is stochastically integrated to a threshold, implementing a shift from an analog to a discrete form of computation. Understanding how this process can be chained and sequenced â as virtually all real-life tasks involve a sequence of decisions â remains an open question in neuroscience. We reasoned that incorporating a virtual continuum of possible behavioral outcomes in a simple decision task â a fundamental ingredient of real-life decision-making â should result in a progressive sequential approximation to the correct response. We used real-time tracking of motor action in a decision task, as a measure of cognitive states reflecting an internal decision process. We found that response trajectories were spontaneously segmented into a discrete sequence of explorations separated by brief stops (about 200âms) â which remained unconscious to the participants. The characteristics of these stops were indicative of a decision process â a âmoment of thoughtâ: their duration correlated with the difficulty of the decision and with the efficiency of the subsequent exploration. Our findings suggest that simple navigation in an abstract space involves a discrete sequence of explorations and stops and, moreover, that these stops reveal a fingerprint of moments of thought
A Large-Scale Study of Phishing PDF Documents
Phishing PDFs are malicious PDF documents that do not embed malware but trick
victims into visiting malicious web pages leading to password theft or drive-by
downloads. While recent reports indicate a surge of phishing PDFs, prior works
have largely neglected this new threat, positioning phishing PDFs as
accessories distributed via email phishing campaigns.
This paper challenges this belief and presents the first systematic and
comprehensive study centered on phishing PDFs. Starting from a real-world
dataset, we first identify 44 phishing PDF campaigns via clustering and
characterize them by looking at their volumetric, temporal, and visual
features. Among these, we identify three large campaigns covering 89% of the
dataset, exhibiting significantly different volumetric and temporal properties
compared to classical email phishing, and relying on web UI elements as visual
baits. Finally, we look at the distribution vectors and show that phishing PDFs
are not only distributed via attachments but also via SEO attacks, placing
phishing PDFs outside the email distribution ecosystem.
This paper also assesses the usefulness of the VirusTotal scoring system,
showing that phishing PDFs are ranked considerably low, creating a blind spot
for organizations. While URL blocklists can help to prevent victims from
visiting the attack web pages, PDF documents seem not subjected to any form of
content-based filtering or detection
TRIM8 Blunts the Pro-proliferative Action of ÎNp63α in a p53 Wild-Type Background
The p53 gene family network plays a pivotal role in the control of many biological processes and therefore the right balance between the pro-apoptotic and pro-survival isoforms is key to maintain cellular homeostasis. The stability of the p53 tumor suppressor protein and that of oncogenic ÎNp63α, is crucial to control cell proliferation. The aberrant expression of p53 tumor suppressor protein and oncogenic ÎNp63α contributes to tumorigenesis and significantly affects anticancer drug response. Recently, we demonstrated that TRIM8 increases p53 stability, potentiating its tumor suppressor activity. In this paper, we show that TRIM8 simultaneously reduces the level of the pro-proliferative ÎNp63α protein, in both a proteasomal and caspase-1 dependent way, thereby playing a critical role in the cellular response to DNA damaging agents. Moreover, we provided evidence that ÎNp63α in turn, suppresses TRIM8 gene expression by preventing p53-mediated transactivation of TRIM8, therefore suggesting the existence of a negative feedback loop. These findings indicate that TRIM8 exerts its anticancer power through a joint action that provides on one hand, the activation of the p53 tumor suppressor role, and on the other the quenching of the oncogenic ÎNp63α protein activity. The enhancement of TRIM8 activity may offer therapeutic benefits and improve the management of chemoresistant tumors
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
Clickbait PDFs are PDF documents that do not embed malware but trick victims into visiting malicious web pages leading to attacks like password theft or drive-by download. While recent reports indicate a surge of clickbait PDFs, prior works have largely neglected this new threat, considering PDFs only as accessories of email phishing campaigns.
This paper investigates the landscape of clickbait PDFs and presents the first systematic and comprehensive study of this phenomenon. Starting from a real-world dataset, we identify 44 clickbait PDF clusters via clustering and characterize them by looking at their volumetric, temporal, and visual features. Among these, we identify three large clusters covering 89% of the dataset, exhibiting significantly different volumetric and temporal properties compared to classical email phishing, and relying on web UI elements as visual baits.
Finally, we look at the distribution vectors and show that clickbait PDFs are not only distributed via attachments but also via Search Engine Optimization attacks, placing clickbait PDFs outside the email distribution ecosystem.
Clickbait PDFs seem to be a lurking threat, not subjected to any form of content-based filtering or detection: AV scoring systems, like VirusTotal, rank them considerably low, creating a blind spot for organizations. While URL blocklists can help to prevent victims from visiting the attack web pages, we observe that they have a limited coverage
Recommended from our members
Documentos de JĂłvenes Investigadores, no. 8
Los informes y los casos presentados dan cuenta de un conjunto de cambios estructurales en el espacio de vida, en donde los diferentes segmentos analizados han trazado sus trayectorias sociolaborales. Esperamos que este primer acercamiento a un enfoque cualitativo sobre anĂĄlisis de trayectorias permita captar algunos de los efectos de los cambios estructurales sobre el microcosmos de relaciones sociales de los sujetos afectados, los cuales deben ser categorizados como nuevos pobres. Al respecto creemos que la formaciĂłn de segmentos de trayectorias, cada uno siguiendo diferentes estrategias, presenta herramientas importantes para poder entender las consecuencias que tienen sobre las subjetividades los profundos cambios sociales, polĂticos y econĂłmicos que afectan el mundo del trabajo en la Argentina de hoy.UT Librarie
Whole transcriptome profiling of Late-Onset Alzheimer's Disease patients provides insights into the molecular changes involved in the disease
Alzheimer's Disease (AD) is the most common cause of dementia affecting the elderly population worldwide. We have performed a comprehensive transcriptome profiling of Late-Onset AD (LOAD) patients using second generation sequencing technologies, identifying 2,064 genes, 47 lncRNAs and 4 miRNAs whose expression is specifically deregulated in the hippocampal region of LOAD patients. Moreover, analyzing the hippocampal, temporal and frontal regions from the same LOAD patients, we identify specific sets of deregulated miRNAs for each region, and we confirm that the miR-132/212 cluster is deregulated in each of these regions in LOAD patients, consistent with these miRNAs playing a role in AD pathogenesis. Notably, a luciferase assay indicates that miR-184 is able to target the 3'UTR NR4A2 - which is known to be involved in cognitive functions and long-term memory and whose expression levels are inversely correlated with those of miR-184 in the hippocampus. Finally, RNA editing analysis reveals a general RNA editing decrease in LOAD hippocampus, with 14 recoding sites significantly and differentially edited in 11 genes. Our data underline specific transcriptional changes in LOAD brain and provide an important source of information for understanding the molecular changes characterizing LOAD progression
Elective cesarean section on maternal request: ethical and legal considerations
Cesarean is defined as the delivery of a fetus through surgical incisions made through the uterine wall. Primary cesarean sections often lead to repeat cesareans, which may lead to placenta accreta spectrum disorders. The ethic of exposing mothers to these risks, as well as performing surgery on what is otherwise a healthy patient, become entangled with the demand for patient choice, as well as the increasing financial strain on our healthcare system. The main question to be examined is whether it is ethical to allow women to opt for cesarean delivery in the absence of obstetric indication (i.e. cesarean delivery on maternal request), taking into account the increased risk to the mother and her future offspring
Mutual Guarantee Institutions (MGIs) and small business credit during the crisis
The recent economic and financial crisis has drawn attention to how mutual guarantee institutions (MGIs) facilitate small and medium enterprises in accessing bank financing. The aim of this paper is twofold. First, we describe the structural features of the Italian market for mutual guarantees and its significance for small business credit. To this end, we use extensive databases (the Central Credit Register and the Central Balance Sheet Register) as well as specific surveys, which allow us to fill information gaps about this industry and to quantify regional diversity. Second, we investigate whether MGIsâ support to small firms continued to be effective in 2008-09, when credit constraints to Italian firms peaked. We find that MGIs played a role in avoiding a break-up in credit flows to affiliated firms, which also benefited from a lower cost of credit. However, this came at the cost of a deterioration in credit quality, which was more intense for customers with guarantees from MGIs.microfinance, peer monitoring, small business finance
Dakwah Dalam Membangun Etika Kerukunan Hidup Umat Beragama
Indonesia is multi-ethnics, culture and religions,require normative values to regulate social relations.Normative values on religion, social values and moresthat have been prevailing in the community, is thebasis for building a culture of inter-religious relations.Pancasila and the 1945âs Constitution is a collectiveagreement in regulating the society and the state.National unity took place in the community where thevalues of religion has lived and practiced. Religiousdiversity has become a reality of history and they havebeen living side by side. Today, Daâwah activities inbuilding awareness in the practice of religion amongthe other religious communities, is needed. Therefore,the practice of the âinclusive religionâ should beapplied
- âŠ