New Lumineyes treatment can turn brown eyes blue
As part of Healthcare Global's look back at 2011 we've revisited this story which originally made headlines in November...
An American doctor has developed a new 20 second laser treatment which he claims can permanently turn the colour of eyes from being brown to blue.
It is estimated Dr Gregg Homer’s Lumineyes treatment would cost in the region of $5,000 (£3,000), but it would mean people would no longer have to rely on coloured contact lenses to change the colour their eyes.
Dr Homer, the founder of the Calfornian-based clinical equipment company Stromer Medical, is also confident his revolutionary technique does no harm to patients’ vision, which has reportedly taken him 10 years to develop and perfect.
The Lumineyes laser treatment works by extracting the brown pigment of melanin from the iris’ upper layer.
Two to three weeks after undergoing the Lumineyes treatment the brown colour is then replaced with a blue colour which is already present in everybody’s eye, it’s just not visible beneath the melanin.
However, once the melanin has been removed from the iris it does not grow back meaning the laser treatment is permanent and irreversible.
While being interviewed about Lumineyes treatment by KTLA Morning News, Dr Homer said: “They say the eyes are the windows to the soul.
“A blue eye is not opaque, you can see deeply into it, while a brown eye is very opaque.
“I think there is something very meaningful about this idea of having open windows to the soul.”
According to British newspaper the Daily Mail, Stromer Medical is looking for an investment of £500,000 to allow it to carry out clinical trials of the Lumineyes treatment.
If an investor should come forward, Dr Homer has said the treatment could be available to patients in the US within 18 months, but has estimated a time period of three years before it is available in locations outside of America.
Our magazine is now available on the iPad. Click here to download it.
Peloton vulnerable to cyber attacks, McAfee research finds
Peloton, the popular exercise bikes, were found to be vulnerable to cyber attacks in the latest research from McAfee.
Peloton is a brand of electric bikes that combines high end exercise equipment with cutting-edge technology. Its products use wi fi to connect to a large tablet that interfaces with the components of the exercise device, and provides an easy way for physical activity enthusiasts to attend virtual workout classes over the internet several times a week.
Peloton has garnered attention recently around the privacy and security of its products. So McAfee decided to take a look for themselves and purchased a Peloton Bike+.
Researchers looked at the Android devices and uncovered a vulnerability that could allow an attacker with either physical access to the Bike+ or access during any point in the supply chain to gain to hack into the bike’s tablet, including the camera, microphone and personal data.
For the person using it there would be no indication the Bike+ has been tampered with, potentially putting Peloton’s 16.7 million users at risk.
The flaw was found in the Android Verified Boot (AVB) process. McAfee researchers were able to bypass the Android Verified Boot process, which normally verifies all code and data before booting. They were then able to get the device to boot bypassing this step.
This could potentially lead to the Android OS being compromised by an attacker who is physically present. Even worse, the attacker could boot up the Peloton with a modified credential to gain privileges, granting them access to the bike remotely.
As the attacker never has to unlock the device to boot it up, there would be no trace of their access on the device. This type of attack could also happen at any point from construction to warehouse to delivery, by installing a backdoor into the Android tablet without the user ever knowing.
Given the simplicity and criticality of the flaw, McAfee informed Peloton while auditing was ongoing. The vendor was sent full details, and shortly after, Peloton confirmed the issue and released a fix for it.
Further conversations between McAfee and Peloton confirmed that this vulnerability had also been present on the Peloton Tread exercise equipment.
Peloton’s Head of Global Information Security Adrian Stone, commented on the research: “This vulnerability reported by McAfee would require direct, physical access to a Peloton Bike+ or Tread. Like with any connected device in the home, if an attacker is able to gain physical access to it, additional physical controls and safeguards become increasingly important.
"To keep our members safe, we acted quickly and in coordination with McAfee. We pushed a mandatory update in early June and every device with the update installed is protected from this issue.”