{"id":1739,"date":"2016-08-04T14:00:59","date_gmt":"2016-08-04T14:00:59","guid":{"rendered":"http:\/\/brl.ee.washington.edu\/?p=1739"},"modified":"2016-08-04T14:00:59","modified_gmt":"2016-08-04T14:00:59","slug":"neuralsecurityinthenews","status":"publish","type":"post","link":"https:\/\/wp.ece.uw.edu\/brl\/2016\/08\/04\/neuralsecurityinthenews\/","title":{"rendered":"Neural Security in the news"},"content":{"rendered":"<p>\t\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1740 aligncenter\" src=\"https:\/\/ada.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2016\/08\/Screen-Shot-2016-08-04-at-6.54.49-AM.png\" alt=\"Screen Shot 2016-08-04 at 6.54.49 AM\" width=\"500\" height=\"303\" srcset=\"https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2016\/08\/Screen-Shot-2016-08-04-at-6.54.49-AM.png 1310w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2016\/08\/Screen-Shot-2016-08-04-at-6.54.49-AM-300x182.png 300w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2016\/08\/Screen-Shot-2016-08-04-at-6.54.49-AM-1024x621.png 1024w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2016\/08\/Screen-Shot-2016-08-04-at-6.54.49-AM-768x465.png 768w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>When VICE Motherboard <a href=\"http:\/\/brl.ee.washington.edu\/brl-research-on-telerobotic-security-featured-on-vice-motherboard\/\">visited us last month to talk about surgical hacking<\/a>, they also took some time to learn about the lab&#8217;s work on neural security and brain hacking. \u00a0Several articles are now available:<\/p>\n<p>VICE Motherboard:\u00a0<a href=\"http:\/\/motherboard.vice.com\/read\/how-hackers-could-get-inside-your-head-with-brain-malware\">How Hackers Could Get Inside Your Head With \u2018Brain Malware\u2019<\/a><\/p>\n<p>Daily Mail UK:\u00a0<a href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-3722558\/Hackers-inside-BRAIN-Experts-warn-growing-threat-monitoring-controlling-neural-signals.html\">Hackers could get inside your BRAIN: Experts warn of growing threat from monitoring and controlling neural signals<\/a><\/p>\n<p>Naked Security by Sophos:\u00a0<a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/08\/05\/how-hacking-brainwaves-could-reveal-our-deeply-guarded-secrets\/\">How hacking brainwaves could reveal our deeply guarded secrets<\/a><\/p>\n<p>This research is by Tamara Bonaci, Katherine Pratt, and Howard Chizeck.\t\t\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When VICE Motherboard visited us last month to talk about surgical hacking, they also took some time to learn about the lab&#8217;s work on neural security and brain hacking. \u00a0Several articles are now available: VICE Motherboard:\u00a0How Hackers Could Get Inside Your Head With \u2018Brain Malware\u2019 Daily Mail UK:\u00a0Hackers could get inside your BRAIN: Experts warn &#8230; <a title=\"Neural Security in the news\" class=\"read-more\" href=\"https:\/\/wp.ece.uw.edu\/brl\/2016\/08\/04\/neuralsecurityinthenews\/\" aria-label=\"Read more about Neural Security in the news\">Read more<\/a><\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[14,3,8],"tags":[],"class_list":["post-1739","post","type-post","status-publish","format-standard","hentry","category-bci-security","category-neural-engineering","category-team-news"],"_links":{"self":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/posts\/1739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/comments?post=1739"}],"version-history":[{"count":0,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/posts\/1739\/revisions"}],"wp:attachment":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/media?parent=1739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/categories?post=1739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/tags?post=1739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}