Biohacking: Why is my kitten glowing?

Powered by SC Magazine
 

Edith Cowan University security researcher and former gene manipulator Andrew Woodward explains the science behind biohacking.

View larger image View larger image View larger image

See all pictures here »

 

Mayo Clinic

In September last year, scientists used a virus to transport a gene found in jellyfish into the DNA of cats, and produced the world's first glowing kittens.

The aim was to advance the fight against diseases like HIV and AIDS by creating cats that were immune to the feline AIDS virus.

Such work has traditionally been the work of salted scientists working within established institutions. But in recent times, more and more backyard hobbyists have been splicing and dicing the fabric of life as part of the burgeoning biohacking movement. 

Kiwicon 6 coverage

It's something Doctor Andrew Woodward, senior lecturer in security at Edith Cowan University recommends as a hobby for those in the security industry.

He worked as a professional biologist for a number of years between a career in information security. 

In a talk at Wellington's Kiwicon 6 event, Woodward spoke to the security faithful about barriers to entry, what you need to mess with genetics, and how not to blow up the world in the process.

Note the last few minutes of the talk were cut off due to recording issues. 

Those interested in biohacking can find more information DIYBio.org

Copyright © SC Magazine, Australia


 
 
 
Top Stories
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1043

Vote