Scientists have been able to hack into human brain and obtain crucial data such as PIN numbers and bank details with the help of a $299 device.

What Specially You're Expecting From Apple In This WWDC?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

Scientists have been working on ways through which the thoughts of a person can be accurately ‘read’ with the help of brain-computer interfaces. Until now, they have had little success. But now, scientists have successfully been able to read the subject’s thoughts and even retrieve important data simply with help of signals from his brain.


Emotiv Brain Computer Interface

This significant achievement was accomplished by researchers from University of Oxford and University of California. The most interesting part is that they didn’t have to make use of any fancy, expensive lab equipment. Rather, they simply used an off-the-shelf Emotiv brain-computer interface and with the help of it, hacked into the subject’s brain. The equipment costs a mere $299 and is readily available.

So, how exactly did they ‘hack’ into a subject’s brain? The success primarily depends on a specific brain signal called ‘P300.’ This signal is usually transmitted when a person recognizes something which he is shown.

The researchers showed the subject images of different banks and digits and based on the transmission of P300 signal, and they were successfully able to find out the PIN numbers and other bank details of the subject.

A significant application of this, the researchers argue, can be in lie detection. It’s quite hard to guard the brain and stop it from sending a recognition signal when a person sees something which is familiar.

According to the scientists, “The P300 can be used as a discriminative feature in detecting whether or not the relevant information is stored in the subject’s memory. For this reason, a GKT based on the P300 has a promising use within interrogation protocols that enable detection of potential criminal details held by the suspect.”

However, this is not a fully reliable method yet and can be prone to errors. Moreover, the very same method can be used by hackers, in the future, to hack user details by employing the same P300-signal recognition method.

Source: Usenix

Courtesy: CBS Local

Buy Cheapest Related Product From Amazon.com


Google Says Court’s Verdict Against Samsung Doesn’t Concern Core Android

Australian Federal Data Surveillance Proposals Snubbed By The Public
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On August 28, 2012(1 year, 10 months ago.)

Recent Products

Compare  
Buy Now | Compare  

What Do You Think?

Loading Disqus Comments ...
Loading Facebook Comments ...

Recent Search

Recent Tutorials

Want to repair your memory card? It's very easy to fix corrupted or damaged memory card. In fact you can fix it by yourself.
Are you the one who is frustrated because of the speed of your Android device? No worries, the article will help you increase the speed of that device.
Lately, Google has updated its Google Docs. Now users can crop, rotate, and add borders to images in a document without leaving Google Docs.
Adobe CS products are not free, but the good news is you can now download Photoshop CS2 & all other CS2 product completely free and it's absolutely legal.
At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook