First Recording Of A Dying Human Brain Points To Memory Flashbacks

Physicians at the University of Louisville in Kentucky have recorded the first brain scan of a person as he died, giving a glimpse of what happens at the end of life.
An 87-year-old man suffering from head trauma and epilepsy died of a heart attack while his brain was being monitored by an electroencephalogram. The 30 seconds before and after his heart stopped showed an uptick in brainwave activity associated with dreams, memory and meditation or concentration, the team of experts involved said.
They say in a paper published in Frontiers in Aging Neuroscience that the scan may confirm that the patient had a “life recall” as he expired.
Co-author Dr. Ajmal Zemmar, a neurosurgeon at the University of Louisville, and colleagues found rhythmic brainwave patterns that may explain the organizational role of the brain around the time of death.
“We measured 900 seconds of brain activity around the time of death and set a specific focus to investigate what happened in the 30 seconds before and after the heart stopped beating,” said Zemmar, who also teaches neurological surgery.
“Just before and after the heart stopped working, we saw changes in a specific band of neural oscillations, so-called gamma oscillation, but also in others such as delta, theta, alpha and beta oscillations.”
Brain oscillations are more commonly known as brainwaves. This rhythmic brain activity is normally present in living human brains. The different types of brainwaves are associated with a variety of cognitive functions, including concentrating, dreaming, meditation, memory retrieval, information processing and conscious perception.
Reliving a lifetime of memories within seconds before death has been called “life recall” and has been the subject of conjecture “for centuries,” the study’s authors said. They say the scan may confirm that the patient had a “life recall” as he expired.
The brain scan suggests that the brain remains active and coordinated even after death and may “be programmed to orchestrate the whole ordeal,” the authors say.
The findings bring into question when life ends exactly, and raise important issues, including about the timing of organ donation, Zemmar said.
“Through generating oscillations involved in memory retrieval, the brain may be playing a last recall of important life events just before we die, similar to the ones reported in near-death experience,” he added.
This study is the first of its kind to measure brain activity during the death process of a human being, even though similar changes in gamma oscillations have been seen in lab rats, making it possible that the brain responds similarly across species.
Zemmar said he believes that his team’s results offer a reason for hope, while acknowledging that physicians find it “indescribably difficult to deliver the news of death” to grieving families.
“Something we may learn from this research is that although our loved ones have their eyes closed and are ready to leave us to rest, their brains may be replaying some of the nicest moments they experienced in their lives,” Zemmar said.
Edited by Richard Pretorius and Kristen Butler
Recommended from our partners
The post First Recording Of A Dying Human Brain Points To Memory Flashbacks appeared first on Zenger News.
Cyberattacks On Cars Increased 225 Percent In Last 3 Years

By Brian Blum
The year 2021 brought an increasing number of cyberattacks on cars, as hackers tap into advanced technologies, according to Upstream’s fourth annual Automotive Cybersecurity Report.
Upstream, a cybersecurity and data management platform for connected vehicles, based in Herzliya and Michigan, analyzed more than 900 publicly reported cyberattacks on cars in the last decade.
The highlights:
- The frequency of cyberattacks on cars increased 225 percent from 2018 to 2021.
- Nearly 85 percent of attacks in 2021 were carried out remotely, outnumbering physical attacks four to one.
- 40 percent of attacks targeted back-end servers.
- 2021 saw 54.1 percent of attacks carried out by “Black Hat” (malicious) actors, up from 49.3 percent in 2020.
- The top attack categories were data/privacy breach (38 percent), car theft/break-ins (27 percent), and control systems (20 percent).
- Keyless entry and key fob attacks account for 50 percent of all vehicle thefts. Thieves only need to be close to the key fob for a Black Hat hacker to pick up and reproduce its signal.
All told, Upstream estimates that the automotive industry is projected to lose $505 billion by 2024 to cyberattacks.

“The rise in sophistication amongst vehicle hackers will continue to evolve as the industry continues to adopt advanced connectivity,” Upstream cofounder and CEO Yoav Levy tells ISRAEL21c.
That means the car has a connection to the Internet, whether to stream music, access Waze or Google Maps or remember your morning Starbucks’ preferences.
“V2X, the ability for a vehicle to not only detect but engage with the infrastructure, vehicles, and other assets around it, will create new vectors that will all be all too tempting for Black Hat actors,” Levy says.
In 2018, there were 330 million connected cars, Upstream reports. That’s due to jump to 775 million by 2023. A connected car produces some 25 GB of data an hour by 2025. For a fully autonomous vehicle, that number jumps to 500 GB an hour.
How hackers access vehicles
Hackers use eight key tricks to gain access to vehicles, Upstream reported.
- Spoofing messages or data (that’s where the message appears to be from someone you know but is really from a hacker).
- Manipulating the vehicle’s internal code and data.
- Sending harmful messages through the car’s communication and entertainment system.
- Taking advantage of vulnerabilities in sensitive information access in some vehicles.
- Denial-of-service (DoS) attacks that cause the car to malfunction.
- Coopting privileged access.
- Embedding viruses in communication media.
- Sending messages containing malicious content, which can be received by a car as well as a phone or home computer.
While a hack that disables, say, a car’s brakes while it’s in operation is potentially life-threatening, simple theft is a more immediate and pressing problem.
In September 2021, for example, thieves used sophisticated hacking hardware to steal 25 European-made luxury cars in London.
In Oakville, Canada, 124 vehicle thefts were reported in the first half of 2021 — this in a city with just 211,000 residents. Sixty-six percent of these thefts were via keyless entry tech, and some took place in broad daylight.
It’s not just cars. Two major Israeli public transportation companies were hit by ransomware attacks recently and had their data leaked to the Darknet. In addition to the stolen data, the attack brought the companies’ websites down.
How hackers target vehicles
During the COVID-19 pandemic and its accompanying chip shortage and supply chain issues, Black Hat scammers have been flooding the market with counterfeit parts and components, which can be a hazard to driver and vehicle safety.
Among the most audacious attacks reported by Upstream: In April 2021, the doors of a North American EV manufacturer’s vehicle were hacked using a drone carrying a Wi-Fi dongle.
Even electric charge spots can be hacked, allowing Black Hat actors to remotely switch the chargers on and off, remove an owner’s access, and lock or unlock the charging cable. Bad actors can steal a vehicle owner’s identity through the charge spot, stop owners from charging their vehicles, and charge their own vehicles free of charge.
“Ultimately, most smart EV charging points [we] researched were vulnerable to attacks,” Upstream reported.
The problem won’t be going away anytime soon.
“Today, there are more lines of code in the connected car than other highly sophisticated machines, including the U.S. Air Force’s F-35 Joint Strike Fighter, the Boeing 787 Dreamliner, or a NASA space shuttle,” the report’s authors warn.
“With today’s revolution in automotive connectivity and the exponential growth in the number of connected vehicles on the road, it is imperative for the automotive industry to understand, predict, and combat rising cybersecurity threats,” said Levy.
You can download a copy of the full 900-page cybersecurity report from Upstream here.
Produced in association with ISRAEL21c.
Recommended from our partners
The post Cyberattacks On Cars Increased 225 Percent In Last 3 Years appeared first on Zenger News.













