145 research outputs found

    Parsing a Perceptual Decision into a Sequence of Moments of Thought

    Get PDF
    Theoretical, computational, and experimental studies have converged to a model of decision-making in which sensory evidence is stochastically integrated to a threshold, implementing a shift from an analog to a discrete form of computation. Understanding how this process can be chained and sequenced – as virtually all real-life tasks involve a sequence of decisions – remains an open question in neuroscience. We reasoned that incorporating a virtual continuum of possible behavioral outcomes in a simple decision task – a fundamental ingredient of real-life decision-making – should result in a progressive sequential approximation to the correct response. We used real-time tracking of motor action in a decision task, as a measure of cognitive states reflecting an internal decision process. We found that response trajectories were spontaneously segmented into a discrete sequence of explorations separated by brief stops (about 200 ms) – which remained unconscious to the participants. The characteristics of these stops were indicative of a decision process – a “moment of thought”: their duration correlated with the difficulty of the decision and with the efficiency of the subsequent exploration. Our findings suggest that simple navigation in an abstract space involves a discrete sequence of explorations and stops and, moreover, that these stops reveal a fingerprint of moments of thought

    A Large-Scale Study of Phishing PDF Documents

    Full text link
    Phishing PDFs are malicious PDF documents that do not embed malware but trick victims into visiting malicious web pages leading to password theft or drive-by downloads. While recent reports indicate a surge of phishing PDFs, prior works have largely neglected this new threat, positioning phishing PDFs as accessories distributed via email phishing campaigns. This paper challenges this belief and presents the first systematic and comprehensive study centered on phishing PDFs. Starting from a real-world dataset, we first identify 44 phishing PDF campaigns via clustering and characterize them by looking at their volumetric, temporal, and visual features. Among these, we identify three large campaigns covering 89% of the dataset, exhibiting significantly different volumetric and temporal properties compared to classical email phishing, and relying on web UI elements as visual baits. Finally, we look at the distribution vectors and show that phishing PDFs are not only distributed via attachments but also via SEO attacks, placing phishing PDFs outside the email distribution ecosystem. This paper also assesses the usefulness of the VirusTotal scoring system, showing that phishing PDFs are ranked considerably low, creating a blind spot for organizations. While URL blocklists can help to prevent victims from visiting the attack web pages, PDF documents seem not subjected to any form of content-based filtering or detection

    TRIM8 Blunts the Pro-proliferative Action of ΔNp63α in a p53 Wild-Type Background

    Get PDF
    The p53 gene family network plays a pivotal role in the control of many biological processes and therefore the right balance between the pro-apoptotic and pro-survival isoforms is key to maintain cellular homeostasis. The stability of the p53 tumor suppressor protein and that of oncogenic ΔNp63α, is crucial to control cell proliferation. The aberrant expression of p53 tumor suppressor protein and oncogenic ΔNp63α contributes to tumorigenesis and significantly affects anticancer drug response. Recently, we demonstrated that TRIM8 increases p53 stability, potentiating its tumor suppressor activity. In this paper, we show that TRIM8 simultaneously reduces the level of the pro-proliferative ΔNp63α protein, in both a proteasomal and caspase-1 dependent way, thereby playing a critical role in the cellular response to DNA damaging agents. Moreover, we provided evidence that ΔNp63α in turn, suppresses TRIM8 gene expression by preventing p53-mediated transactivation of TRIM8, therefore suggesting the existence of a negative feedback loop. These findings indicate that TRIM8 exerts its anticancer power through a joint action that provides on one hand, the activation of the p53 tumor suppressor role, and on the other the quenching of the oncogenic ΔNp63α protein activity. The enhancement of TRIM8 activity may offer therapeutic benefits and improve the management of chemoresistant tumors

    From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!

    Get PDF
    Clickbait PDFs are PDF documents that do not embed malware but trick victims into visiting malicious web pages leading to attacks like password theft or drive-by download. While recent reports indicate a surge of clickbait PDFs, prior works have largely neglected this new threat, considering PDFs only as accessories of email phishing campaigns. This paper investigates the landscape of clickbait PDFs and presents the first systematic and comprehensive study of this phenomenon. Starting from a real-world dataset, we identify 44 clickbait PDF clusters via clustering and characterize them by looking at their volumetric, temporal, and visual features. Among these, we identify three large clusters covering 89% of the dataset, exhibiting significantly different volumetric and temporal properties compared to classical email phishing, and relying on web UI elements as visual baits. Finally, we look at the distribution vectors and show that clickbait PDFs are not only distributed via attachments but also via Search Engine Optimization attacks, placing clickbait PDFs outside the email distribution ecosystem. Clickbait PDFs seem to be a lurking threat, not subjected to any form of content-based filtering or detection: AV scoring systems, like VirusTotal, rank them considerably low, creating a blind spot for organizations. While URL blocklists can help to prevent victims from visiting the attack web pages, we observe that they have a limited coverage

    Whole transcriptome profiling of Late-Onset Alzheimer's Disease patients provides insights into the molecular changes involved in the disease

    Get PDF
    Alzheimer's Disease (AD) is the most common cause of dementia affecting the elderly population worldwide. We have performed a comprehensive transcriptome profiling of Late-Onset AD (LOAD) patients using second generation sequencing technologies, identifying 2,064 genes, 47 lncRNAs and 4 miRNAs whose expression is specifically deregulated in the hippocampal region of LOAD patients. Moreover, analyzing the hippocampal, temporal and frontal regions from the same LOAD patients, we identify specific sets of deregulated miRNAs for each region, and we confirm that the miR-132/212 cluster is deregulated in each of these regions in LOAD patients, consistent with these miRNAs playing a role in AD pathogenesis. Notably, a luciferase assay indicates that miR-184 is able to target the 3'UTR NR4A2 - which is known to be involved in cognitive functions and long-term memory and whose expression levels are inversely correlated with those of miR-184 in the hippocampus. Finally, RNA editing analysis  reveals a general RNA editing decrease in LOAD hippocampus, with 14 recoding sites significantly and differentially edited in 11 genes. Our data underline specific transcriptional changes in LOAD brain and provide an important source of information for understanding the molecular changes characterizing LOAD progression

    Elective cesarean section on maternal request: ethical and legal considerations

    Get PDF
    Cesarean is defined as the delivery of a fetus through surgical incisions made through the uterine wall. Primary cesarean sections often lead to repeat cesareans, which may lead to placenta accreta spectrum disorders. The ethic of exposing mothers to these risks, as well as performing surgery on what is otherwise a healthy patient, become entangled with the demand for patient choice, as well as the increasing financial strain on our healthcare system. The main question to be examined is whether it is ethical to allow women to opt for cesarean delivery in the absence of obstetric indication (i.e. cesarean delivery on maternal request), taking into account the increased risk to the mother and her future offspring

    Mutual Guarantee Institutions (MGIs) and small business credit during the crisis

    Get PDF
    The recent economic and financial crisis has drawn attention to how mutual guarantee institutions (MGIs) facilitate small and medium enterprises in accessing bank financing. The aim of this paper is twofold. First, we describe the structural features of the Italian market for mutual guarantees and its significance for small business credit. To this end, we use extensive databases (the Central Credit Register and the Central Balance Sheet Register) as well as specific surveys, which allow us to fill information gaps about this industry and to quantify regional diversity. Second, we investigate whether MGIs’ support to small firms continued to be effective in 2008-09, when credit constraints to Italian firms peaked. We find that MGIs played a role in avoiding a break-up in credit flows to affiliated firms, which also benefited from a lower cost of credit. However, this came at the cost of a deterioration in credit quality, which was more intense for customers with guarantees from MGIs.microfinance, peer monitoring, small business finance

    Dakwah Dalam Membangun Etika Kerukunan Hidup Umat Beragama

    Get PDF
    Indonesia is multi-ethnics, culture and religions,require normative values to regulate social relations.Normative values on religion, social values and moresthat have been prevailing in the community, is thebasis for building a culture of inter-religious relations.Pancasila and the 1945‟s Constitution is a collectiveagreement in regulating the society and the state.National unity took place in the community where thevalues of religion has lived and practiced. Religiousdiversity has become a reality of history and they havebeen living side by side. Today, Da‟wah activities inbuilding awareness in the practice of religion amongthe other religious communities, is needed. Therefore,the practice of the “inclusive religion” should beapplied
    • 

    corecore