Thursday 19 March 2015

PREMERA BLUE CROSS HACKED!!!MORE THAN 11M RECORDS EXPOSED

A recently discovered cyberattack on health insurance provider Premera Blue Cross last, the company revealed Tuesday, the latest security breach at a health industry organization.
Hackers gained illegal access to customer's personal information, including names, birth dates, Social Security numbers, and claims information during the May 2014 intrusion, said Premera, a health benefits provider in the Pacific Northwest. Other informations which were exposed included bank account information, email addresses and telephone numbers, according to Premera.
The security breach was discovered January 29, just days before Anthem, the No. 2 health insurer in the US, revealed that they are the victim of what may be the largest ever data breach involving a US health insurer. According to Anthem the attack on company's servers comprmised unencrypted information which includes names, dates of birth, member IDs, and Social Security numbers for as many as 80 million current and former members and employees.
Premera said they are working with the FBI to investigate the attack but said it has not yet determined whether any information was removed from the servers or "used inappropriately." The customer information that may have been compromised dates as far back as 2002, Premera said.
It was not immediately clear whether the information exposed in Premera's hack was encrypted. Under the federal Health Insurance Portability and Accountability Act (HIPAA), health insurance companies are not required to encrypt the data stored on their servers.
Premera did not immediately respond to a request for comment.
The combination of sensitive customer information held by health care organizations - especially Social Security numbers -- make them particularly attractive to hackers looking to steal identities.
Law enforcement began warning health care industry companies last year that they may face an increased risk of data breach attacks. Following a hacking attack on us hospital group community health system in August, the FBI issued a flash warning to companies that it had observed "malicious actors targeting healthcare related systems," perhaps for the purpose of obtaining health care information or personal identification information, according to Reuters.
The security breach affected Premera Blue Cross, Premera Blue Cross Blue Shield of Alaska, and affiliated brands Vivacity and Connexion Insurance Solutions.

Tuesday 17 March 2015

TYRONE THE DRONE

 Not every drone is created equally. Some are specifically programmed to provide surveillance, others are used to film weddings and concerts and some are just flown around for fun. Now, there's a new drone that's a bit more subversive -- Tyrone the Drone.
This drone can breathe fire, deploy spray paint and, possibly even more egregiously, squirt silly string on unsuspecting victims.

Tyrone made its debut here at the south by southwest festival, which brings together technorati, filmmakers and musicians. Consumer drones have surged in popularity over the past couple of years, coming in all sorts of shapes and sizes. According to CNBC more than 200,000 drones are sold each month worldwide.Tyrone is a bit different from them. Made by mobile software design and development studio Chaotic Moon, this drone is meant to be part proof of concept, part harebrained stunt.

"We're always asking 'what if, what if, what if,'" said Chad Darbyshire, director of marketing for Chaotic Moon. "Our philosophy is technology is neither good nor bad, it's inert."
The idea for Chaotic Moon is to create curiosity around technology. So Tyrone the flamethrower isn't meant to burn anything down, it's meant to get people asking questions about the capabilities of drones.
"We're pushing the limits of drones and what they're capable of," said Eric Schneider, a creative technologist at Chaotic Moon.
Unfortunately for Tyrone, its outdoor flying freedom was temporarily constrained during SXSW. The Austin Police Department declared the city a drone-free zone just days before the festival began. Officials said the ban was due to safety issues around congested Wi-Fi signals since drones are controlled wirelessly.
But that didn't stop Tyrone from zooming around the Chaotic Moon studios. In a demo Sunday, Schneider showed off the drone's capabilities.
chaoticmoon-4-of-122015.jpg
He placed Tyrone on the ground of an open room with big windows and a mannequin propped up against a wall. Schneider then stepped back and switched on the remote used to control Tyrone. The shoebox-size quadcopter's blades started humming and the machine lifted off making its way toward the mannequin. When Tyrone was about two feet from the mannequin it ejected a stream of florescent green silly string straight into the mannequin's face.
Tyrone works with anything that can be aerosolized -- so besides silly string, spray paint or even Cheez Whiz works. The flame-throwing version of Tyrone squirts hairspray onto a makeshift pilot light mounted to the drone. But it looks like the fire-breathing Tyrone will never see the light of day.
"We were burning all of these effigies and the chief of police was like you're never going to do that ever again," said Darbyshire.
chaoticmoon-9-of-122015.jpg

Tyrone the Drone hitting a mannequin with silly string.

Sunday 15 March 2015

BLACKBERRY ANNOUNCED SECUTABLET

In an event on Saturday Blackberry announced its new most highly secured SecuTablet, a tablet which it says is perfect for privacy lovers, businesses and government offices.
SecuTablet is based on Samsung Galaxy S 10.5 and has been developed by BlackBerry in coalition with two brands IBM and Samsung.The SecuTablet can also be considered result of BlackBerry’s purchase of security firm, Secusmart last year and is BlackBerry’s attempt to woo buyers who are more inclined towards privacy and security of phones.
New BB tablet Priced at $2,380.oo BlackBerry has made it clear that, SecuTablet is not intended for common users but for elite niche because it is built with the sole purpose of preventing data on the tablet being leaked by any hacking/cracking methods. SecuTablet also gives total encryption to voice and data services through a built-in Secusmart Security Card.
In a statement about the new device Chief Executive Office of Secusmart GmbH a Blackberry company Dr. Hans-Christoph Quelle said, 
 “Security is ingrained in every part of BlackBerry’s portfolio, which includes voice and data encryption solutions. National and international government customers have entrusted their voice and data communications with the Secusmart Security Card for years. This same technology is what secures the new SecuTABLET. Working alongside IBM and Samsung, we have added the last link in the chain of the Federal Security Network. Subject to certification of the SecuTABLET, German government agencies will have a new way to access BlackBerry’s most secure and complete communications network in the world”.
Apart from all the security features, SecuTablet will also be able to run your Apps like Facebook, Twitter and YouTube without worry of security breaches or compromises. SecuTablet runs Apps and data services separately and totally isolated from personal information stored on the device, most probably like Samsung’s Knox secure container method.
In fact, Samsung has collaborated with BlackBerry to provide secure working environment. SecuTablet runs on Android and BlackBerry hopes that SecuTablet will be the go to solution for businesses and privacy lovers.
Lets wait and watch how this product will do 

Friday 13 March 2015

GOOGLE WENT DOWN BECAUSE OF "ROUTING LEAK"

Google went down because of "Routing leak" for short period of time.


Mega search engine Google user's suffered accessing its services throughout the day today because of minor routing leak. Even now, some of Google services such as Google search and Gmail don’t appear to be working properly for people in countries including the UK, Netherlands, Iceland, and India, and in other countries 
isitdownrightnow.com also confirmed this news:

'Routing leak' hiccup briefly takes Google down worldwide

Lots of people on Twitter also reported issue while using Google services.
Google goes down too? How refreshing!

Thursday 12 March 2015

FACEBOOK TO FACE LAWSUIT

Facebook will for sure will find itself in front of judiciary later this year defending itself against a lawsuit over children spending their parents' money.

On Tuesday, US District Judge Beth Labson Freeman in San Jose, Calif., gave remarks that the company must face a nationwide lawsuit that aims to provide refunds when kids spent their parents money on facebook, Reuters said Wednesday. Estimated to number in the hundreds of thousands, the plaintiffs contend that Facebook  has violated California law by claiming "all sales are final" policy in denying the refunds.

This issue of children buying stuff online without the permission of their parents is growing day by day and has cost other big names in technology a decent amount of money.
In January 2014, Apple was orderes to refund $32.5 million in a settlement with the Federal Trade Commission over act of children to make in-app purchases without parental consent. Last September, this issue caused GOOGLE $19 million in refunding. over the same issue, while in July, the FTC ordered AMAZON over unauthorized in-app charges made by children. Given the outcome of these past cases, Facebook is most probably to face a tough challenge in court and may end up having to settle the suit and refund the purchases.
The lawsuit mentions that the company allowed children to use their parents' credit cards to buy Facebook Credits, a virtual currency which has retired in favor of Facebook Payments. Facebook argued against class action status for the suit by saying that the individual claims were too different. But the judge didn't buy that argument.
Though some minors undoubtedly may wish to continue making purchases through credit or debit cards they do not have permission to use, such a desire cannot prevent the named plaintiffs from bringing suit to demand that Facebook's policies comply with the law," Judge Freeman wrote in remarks, according to Reuters.
Even as the suit, which was initiated in April 2012, moves ahead using class action status, Freeman ruled that any refunds would be doled out on a case-by-case basis rather than to the group of plaintiffs as a whole. A trial date is set for October 19.
A Facebook spokesman said in his statement: "The court correctly found that it would be inappropriate to permit plaintiffs to seek refunds on behalf of the proposed class. We believe the remaining claims about our policy are without merit and we will continue to defend ourselves vigorously."

Wednesday 11 March 2015

APPLE TO ADD FORCE TOUCH FEATURE IN NEXT IPHONE

The new feature would allow your phone to respond differently depending on the intensity and how hard you touch the screen.

Apple may bring its newly launched Force Touch feature from the MacBook to next iPhone.

The new feature which was Unveiled at the APPLE WATCH event on Monday, the Force touch feature is incorporated into the new 12 inch macbook. Which brings pressure sensitivity to the trackpad of device. That means you can trigger different actions depending on how much pressure you exert on pad.

That newly launched feature could be included in next iphone, the Wall Street Journal reported on Wednesday, citing "people familiar with the matter." Specifically, the sources disclosed that Apple is planning to add this feature later on this year, though that isn't guaranteed that it will show up in 2015. Assuming the information is accurate, however, the feature seems to at least be on the table and the APPLE'S excellent think tank might be planning something cool regarding this feature.

Force Touch sounds cool for a touch-driven device like the iPhone. Currently, you might be using different gestures to navigate the screen. For example, you need to use a two-finger swipe to zoom in or out of the screen. In MacBook, Force Touch can detect the difference between a light tap and a deep/hard press. Adapting that for the iPhone could remove the two-finger swipe, allowing you to simply employ a deep press to zoom in or out of the screen.

Touch sensitivity has been on Apple's drawing board for a while, according to patent application published in January 2014. The patent states "Gesture and Touch Input Detection Through Force Sensing" it will become imperative to add force sensors to touch screen.
Force Touch is just one feature Apple is eyeballing for this year's iPhone lineup, according to the Journal's sources. The company is aiming to stick with the 4.7-inch and 5.5-inch screens on the iphone 6 and iphone 6 plus, respectively. But it also may add another case color with addition of pink color phone it can be a good choice for girls.

Details about Apple's plans for this year's iPhone come from Apple suppliers, the Journal said, they further added that the company tests different technologies that may not end up in the actual product. Whichever features wend their way into the next iPhone, mass production for some of its parts is expected to kick off in May, the sources noted.




MADISON POLICE DEPARTMENT WEBSITE TAKEN DOWN BY ANONYMOUS

Hackers affiliated to Anonymous take down Madison PD website to protest against shooting of  biracial teenager Tony Robinson Jr. by white police Officer Matt Kenny 

The hacker collectively took down the website of police department in Madison, Wisconsin in protest against the shooting of unarmed Tony Robinson Jr
The Madison Police Department website along with its email servers and in-car laptop servers sufered DDoS attack by Anonymous and were intermittently going offline according to the police authorities. The attacks were planned and executed by American chapter of Anonymous and came in retaliation of Friday’s shooting incident whichresulted indeath of unarmed biracial teenager Tony Robinson Jr. by white police Officer Matt Kenny.
Anonymous posted a video on YouTube to sent his message demanding that the Madison Police Department and its chief, Michael Koval to, “release all audio and visual recordings from the scene immediately, and arrest the officers responsible for murdering Mr. Robinson.”
There were protests organised by several youth in Capitol rotunda. Observers aid that around 1500 youth who ranged from 13 years to college student aged recorded protest against Tony Johnson’s shooting.
View image on Twitter
Protests have been going on since Friday. I'm so proud of my adopted town.

Tuesday 10 March 2015

WIKIMEDIA FILED A LAWSUIT AGAINST NSA AND DEPARTMENT OF JUSTICE

The Wikimedia Foundation which operates the world famous online encyclopedia Wikipedia has filed a lawsuit against the National Security Agency (NSA) and the US Department of Justice (DOJ) of United States for violating user privacy.
Wikimedia filed a lawsuit on Tuesday in the US District Court for the District of Maryland against the National Security Agency (NSA) and the US Department for Justice (DOJ) for allegedly violating its constitutional rights.
The organization states that an NSA program.Which collect's information across the Internet, known as upstream surveillance, is a violation of its First Amendment  which is right of free speech and a violation of the Fourth Amendment which is ban on unreasonable search and seizure.

The American Civil Liberties Union, Human Rights Watch, Amnesty International, and other human rights organizations, are co-plaintiffs on the lawsuit."The organization has been working on the lawsuit for approximately one year" said Wikimedia general Wikimedia general counsel Geoff Brigham.
When one NSA contractor Edward Snowden started leaking official US government documents in 2013.According to the Snowden leaks Wikipedia was mentioned as a target of government surveillance,he further added that the US government is using a dragnet to collect nearly all Internet communication and store it. This whole process is governed by the Foreign Intelligence Surveillance Act (FISA) that Congress amended in 2008, which now provides more support and freedom to US spy agencies to collect Internet information at will.
"In the course of its surveillance, the NSA copies and combs through vast amounts of Internet traffic, which it intercepts inside the United States with the help of major telecommunications companies," the ACLU said in a statement on Tuesday. He further said"It searches that traffic for keywords called 'selectors' that are associated with its targets. The surveillance involves the NSA's warrantless review of the emails and Internet activities of millions of ordinary Americans."
Ultimately, Wikimedia wants  US government stop its upstream surveillance and has asked the judiciary to rule it as unconstitutional activity. The lawsuit also requests that a permanent ban on upstream surveillance should be imposed and order US  government to destroy all communications it has collected as part of the upstream surveillance program.

"Our role at the Wikimedia Foundation is to protect Wikipedia, its sister projects, and the Wikimedia community of users," the organization wrote on Tuesday. "This means providing our users with the right conditions to facilitate their work, and protecting them when necessary. Defending the privacy of our editors, readers, and community is paramount to us. We believe privacy is essential to facilitating and advancing free knowledge."said wikimedia
 The time will tell that wether the US court will give decision in favor of wikimedia and will ask NSA to stop this program or the court will allow NSA to continue their survillience job.

Monday 9 March 2015

ISIS HAS 46000 TWITTER ACCOUNTS

The Brookings Institute has recently find that even while the social networking sites deleted thousands of accounts associated with the terrorist group in 2014, but still new one kept  popping.

twitter-isis.jpg
Terrorist groups and their supporters have reportedly long used social media to communicate. AL-QAEDA and the TALIBAN have been believed to frequently use Facebook, and HAMAS had been reported to use Twitter.
Now,ISIS, is believed to be quite active on social networks. In fact, ISIS supporters are believed to be operating least 46,000 Twitter accounts between the month of September and December 2014, according to study released this week.Which is done by the Brookings Institute think tank.
ISIS "has exploited social media, most notoriously Twitter, to send its propaganda and messaging out to the world and to draw in people vulnerable to radicalization," J.M. Berger and Jonathan Morgan, the study's authors, wrote in the report. The firther added that the group is "using social media to attract new recruits and inspire lone actor attacks."
The whole point of using social media is to let people connect with them to exchange ideas and information.Sites like Facebook, Twitter and YouTube perfect platforms for terrorist organizations who are looking to spread their rech or ideas.
ISIS is known as one of the world's most popular terrorist groups. The group has made headlines in past few months for recording videos of its members beheading hostages, majority  of them were Western journalists and aid workers, and they uploaded that videos on youtube.
Brookings wanted to know the method how ISIS used Twitter and how far it was able to plot the traps on social network. Besides pinpointing 46,000 Twitter accounts associated with ISIS supporters, the think tank was also able to locate where many of those accounts were being operated, including Syria, Iraq, Saudi Arabia, United States and Egypt. While the majority of the accounts used Arabic as their primary language, one in five of the accounts uses English as their primary language.These accounts which are identified by Brookings had an average of 1,000 followers each, which is more than the typical Twitter user has. The accounts also fired off more than 50 messages daily, making their acccounts  more active than the usual Twitter account. The most popular accounts tended to be the most active.
Much of ISIS's social media success can be attributed to a small group of hyperactive users, consisting of 500 to 2,000 accounts, which tweet in concentrated bursts of high volume," Berger and Morgan wrote.Most social networks based in the US do not allow designated terrorist organizations to maintain accounts on their sites. Twitter said it has suspended "thousands of accounts" since October 2014, according to Brookings report.the fact of matter is social network deletes accounts believed to be tied to ISIS, alternative accounts have reportedly popped up. Twitter didn't immediately respond to request for comment.
Reports are circulating around the Internet earlier this week regarding ISIS supporters that they were issuing death threats against Twitter employees and the company's founder Jack Dorsey, according to Buzzfeed. These supporters were reportedly unhappy on thousands of deleted accounts.
"Your virtual war on us will cause a real war on you," post by alleged ISIS supporters. "We told you from the beginning it's not your war, but you didn't get it and kept closing our accounts on Twitter, but we always come back."

Sunday 8 March 2015

VIRTUAL REALITY HEADSETS TO ARRIVE.....

Biggest names in world if technology are ready to launch their virtual reality headsets.

Virtual reality is becoming craze nowadays.This time it isn't the heavy, constrictive, poorly animated VR you might know from the early '90s. These modern entries into the Virtual Reality space are lighter and faster, and are adequate to pump out the sort of fantastical 3D worlds.We had always dreamed of experiencing.

HTC VIVE



htc-vive-06.jpg
The Vive is a product of HTC hardware and Valve technology, an unlikely partnership that has produced one of the most exciting virtual-reality demonstrations yet. During demo at the 2015 game developer conference, CNET analyst said he made sandwiches, dodged a blue whale, juggled wine bottles, painted glowing rainbow-ribbons and botched a robot repair job before being admonished (and terminated) by a familiar face. And the entire experience was driven by a pair of wands and lasers -- and who doesn't like lasers?

OCULUS RIFT



oculus-crescent-bay-ces-20151.jpg
Oculus' is working on virtual reality from years, and is considered the most well-known example of what's possible in the space by majority. There's still no retail version of this hi-fi headset, but the newly realeased version of the developer kit takes an already engrossing experience more forward. An external camera in it offers positional tracking that'll allow you to wonder around a room -- or as far as the cable tethering you to your PC will let you.

SONY MORPHEUS



sony-morpheus-vr-4433.jpg
Sony's virtual reality headset comes in the form of a slick headset with a 5.7-inch OLED screen. PlayStation Move controllers and the PlayStation Camera control the action, though you can also use the PS4's DualShock 4 controller in some cases. Of course, it is a initial stage: there's no news related to price or availability, but it might be possible we will see this headset sometime in 2016.

SAMSUNG GEAR VR

samsung-gear-vr-product-photos-18.jpg
If you have samsung galaxy note 4 then you can try this invention because it is onli limited to note 4 cutomers this gadget costs 199$, but eliminates the need to plug into a PC or game console. Your head controls the action, care of a bevy of sensors -- you can also pair your Note 4 with a Bluetooth gamepad for something close to a traditional gaming experience.

RAZER OSVR HACKER DEV KIT

razer-osvr.jpg
Razer is ready to democratize virtual reality a tad with the OSVR Hacker Dev Kit. This $199 headset is designed to be futzed with: you can use it with a phone or PC, add controllers and even 3D-print your own parts. For the latest version of the device Razer has added further things including an OLED display and made plans for modular faceplates available, so if you want you can build your own upgrades. It is specifically designed to increase virtual reality gaming experience

GOOGLE CARDBOARD

google-cardboard-9921.jpg
The mega company Google Cardboard brings mobile virtual reality to the masses. It's  still not the most impressive piece of hardware, as it's is entirely made of cardboard. Sure, it looks a little awkward if compare to other virtual reality gears. But use it and then you will came to know what mega company's product has to offer.

MICROSOFT HOLO LENS

hololens.jpg
Microsoft's HoloLens is something different entirely: it's an augmented-reality device, and essentially superimposes text, images and objects onto your field of vision. It is the same technology that NASA will use on MARS.providing a natural user interface allowing user to interact through voice,gaze and hand gestures.It can be said the best among all virtual reality headsets found in earth.
u can earn money online by just by watching ads on clixsense 

Saturday 7 March 2015

BRITAIN'S NCA ARRESTED 56 HACKERS IN "STRIKE WEEK"


The UK authorities states that they had arrested 56 HACKERS across England, Wales and Scotland with accusations of carrying out anti-cybercrime operations. National Crime Agency(NCA) arrested 56 hackers as a part of their “strike week” to put a full stop to cyber crime.
hackers-cyber-criminal-arrest-strike-weekThese arrests were made in a result of 25 operations and arrested cyber criminals are alleged to be involved in fraud, data theft,virus writing and many other cyber crimes.
According to title name this operation was spread over a span of seven days and was coordinated by the National Cyber Crime Unit (NCCU) of NCA. Special officers from the Metropolitan Police and regional organized crime teams also played a key role in success of this operation.
According to BBC reports that a suspected hacker was arrested from Leeds and he is suspected to be a member of the now famous Lizard Squad Gang which defamed Xbox and Playstation networks on Christmas. Another hacker is believed to be a part of D33Ds group which was involved in the 2012 attack on Yahoo and theft of 400,000 email and passwords.
In a statement release, NCA lists the following reasons for arrests.
– Network intrusion and data theft from multinational companies and government agencies,
– Distributed Denial of Service (DDoS) attacks
– Cyber-enabled fraud
– Malicious software and virus development


u can earn money online by just by watching ads on clixsense 

Friday 6 March 2015

MICROSOFT MACHINES VULNERABLE TO "FREAK"

Computers which are running any microsoft windows have been found vulnerable to "FREAK," a almost decade-old encryption flaw that make users vulnerable to having their data communications .Those communications can be intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov it can be even secure site like google.

Previously it was said that flaw was limited to Apple's safari and Google's ANDROID browsers. Later on Microsoft warned that the encryption protocols used in Windows -- Secure Sockets Layer and its successor Transport Layer Security -- were also vulnerable to the flaw which created a buzz among microsoft users.

"Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system," Microsoft said.They further added "The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industry wide issue that is not specific to Windows operating systems."

According to microsoft it will address the flaw by releasing a patch for it on Tuesday update or with an out-of-cycle patch. In the meantime, Microsoft has suggested users to disable the RSA export ciphers.

The FREAK (Factoring RSA Export Keys) flaw buzzed on internet few weeks ago when a group of researchers discovered they could force websites to use intentionally weakened encryption, which they were able to break within a few hours. Once a site's encryption was cracked,if once cracked than it allow hackers to steal data such as passwords, and hijack elements on the page.

Researchers said that they had not found any evidence regarding hackers had exploited the vulnerability, which they blamed on a former US policy that banned US companies from exporting the strongest encryption standards which were available. The restrictions were lifted in the late 1990s, but the weaker standards became the part of software used widely around the world, including Windows and the web browsers.
"The export-grade RSA ciphers are the remains of a 1980s-vintage effort to weaken cryptography so that intelligence agencies would be able to monitor," Matthew Green, a Johns Hopkins cryptographer who helped investigate the encryption flaw, wrote in a blog post explaining the flaw's origins and effects. "This was done badly. So badly, that while the policies were ultimately scrapped, they're still hurting us today."
stay tuned for further upadates 

Thursday 5 March 2015

NASA MADE INGREDIENTS OF LIFE IN SPACE.

NASA scientists who are working at the AMES ASTROCHEMISTY LABORATORY in California and the Goddard Space Flight Center in Maryland have found a clue to the mystery. They came to know that some of the chemical components of our DNA can be produced in the harsh crucible of space.
They created a chunk of ice in their lab made from molecules known as pyrimidine. These molecules,consist carbon and nitrogen, they form the core of three chemicals found in our DNA and RNA, the genetic composition of all living things.
Pyrimidine is also found on meteorites, which encourage the researchers to further explore how it will react when frozen in water and in space.
They put their chunk of ice in a machine that recreates the vacuum of space, along with temperatures approx -430°F and harsh radiation created by high-energy ultraviolet (UV) photons from a hydrogen lamp a perfect space condition.
They found in their experiment that not only could the pyrimidine molecules survive these brutal conditions, but the radiation actually morphed some of them into three chemical components which are found in our DNA and RNA: uracil, cytosine and thymine.
christopher matarese, a NASA researcher working on these experiments, said that We are trying to address the mechanisms in space that are forming these molecules, he further added that Considering what we produced in the laboratory, the chemistry of ice exposed to ultraviolet radiation may be an important linking step between what goes on in space and what fell to Earth early in its development.

space-simulation-machine-ames.jpg

Scott standford, a space science researcher at Ames,said in his statement "Our experiments suggest that once the Earth formed, many of the building blocks of life were likely present from the beginning. Since we are simulating universal astrophysical conditions, the same is likely wherever planets are formed."
While this research might help to further know about our space. Scientists don't exactly know from where this meteoric pyrimidine comes from, although they theorize that it could arise when giant red stars die. we should wait and watch while the search for the treasure continues.