Feeds

Australian volcano starts to blow

Don't worry: only penguins are in danger as it's in the middle of nowhere

SANS - Survey on application security programs

One of Australia's two active volcanoes seems to be erupting.

We say seems because the volcano in question, on Heard Island, is located in the southern reaches of the Indian Ocean, 2000km north of Antarctica and closer to Africa than to Australia. That's about as close to the middle of nowhere as it is possible to be.

Heard Island and its neighbour MacDonald Island are Australian territories and are uninhabited, but each possesses an active volcano. Scientific expeditions venture there infrequently, due to conservation issues and the fact the islands have a wretched climate, are thousands of miles from anywhere nice and can only be accessed or supplied by ship.

That means little attention is paid to the islands, with the satellite images such as the one below seldom acquired.

NASA Earth Observatory image of a likely volcanic eruption on Heard Island's Mawson peak

Heard Island, with Mawson peak at left

But NASA's Earth Observatory says the image and other analysis detected heat signatures on Heard Island's 2475m Mawson Peak that suggest recent volcanic activity.

“Although not definitive, this natural-color satellite image also suggests an ongoing eruption,” NASA writes. “The dark summit crater (much darker than Mawson’s shaded southwestern face) is at least partially snow-free, and there’s a faint hint of an even darker area—perhaps a lava flow—within. Shortwave infrared data (collected along with the visible imagery) shows hot surfaces within the crater, indicating the presence of lava in, or just beneath, the crater.”

The Australian Government's official Heard and McDonald Island website, which has a nifty .aq domain, reports eruptions on McDonald Island. In 1992.

Heard Island's remote location means any eruptions are unlikely to bother anyone, as the region has no history of colossal, world-shaking, events. Penguins and expeditions that plan to visit the islands are, however, in jeopardy. Two of the latter are scheduled for the near future. In 2013 a solo adventurer plans to sail to the islands and then kayak ashore.

A scientific expedition is eyeing off a visit in 2014. El Reg would love to come along if the expedition needs a seasickness-prone-hack aboard. ®

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.