MojoKid writes Les Baugh, a Colorado man who lost both arms in an electrical accident 40 years ago, is looking forward to being able to insert change into a soda machine and retrieving the beverage himself. But thanks to the wonders of science and technology — and Johns Hopkins University Applied Physics Laboratory (APL) — he'll regain some of those functions while making history as the first bilateral shoulder-level amputee to wear and simultaneously control two Modular Prosthetic Limbs (MPLs). "It's a relatively new surgical procedure that reassigns nerves that once controlled the arm and the hand," explained Johns Hopkins Trauma Surgeon Albert Chi, M.D. "By reassigning existing nerves, we can make it possible for people who have had upper-arm amputations to control their prosthetic devices by merely thinking about the action they want to perform."
In June of 1962, three prisoners escaped the penitentary on Alcatraz, in an elaborate plot that was dramatized in a Clint Eastwood movie. A question that has long puzzled the public is whether these men ever made it to shore; the many factors that made Alcatraz a secure prison include sharks, cold water, and contrary currents. Still, some artifacts from the attempt, and perhaps the appeal of stories about survival against high odds, have led many people to believe that the men actually landed safely and faded into society. coondoggie writes This week Dutch scientists from Delft University of Technology presented findings from a computer modeling program they were working on, unrelated to the mystery, that demonstrated the escapees could have survived the journey. "In hindsight, the best time to launch a boat from Alcatraz was [11:30 am], one and a half hours later than has generally been assumed. A rubber boat leaving Alcatraz at [11:30 am] would most likely have landed just north of the Golden Gate Bridge. The model also shows that debris in that scenario would be likely to wash up at Angel Island, exactly where one of the paddles and some personal belongings were found.
Trailrunner7 writes with this news from ThreatPost: Unknown hackers were able to compromise vital systems belonging to ICANN, the organization that manages the global top-level domain system, and had access to the system that manages the files with data on resolving specific domain names. The attack apparently took place in November and ICANN officials discovered it earlier this month. The intrusion started with a spear phishing campaign that targeted ICANN staffers and the email credentials of several staff members were compromised. The attackers then were able to gain access to the Centralized Zone Data System, the system that allows people to manage zone files. The zone files contain quite bit of valuable information, including domain names, the name server names associated with those domains and the IP addresses for the name servers. CANN officials said they are notifying any users whose zone data might have been compromised." (Here's ICANN's public note on the compromise.)
rossgneumann writes North Korea may really be behind the Sony hack, but we're still acting like idiots. Peter W. Singer, one of the nations foremost experts on cybersecurity, says Sony's reaction has been abysmal. "Here, we need to distinguish between threat and capability—the ability to steal gossipy emails from a not-so-great protected computer network is not the same thing as being able to carry out physical, 9/11-style attacks in 18,000 locations simultaneously. I can't believe I'm saying this. I can't believe I have to say this."
will_die writes Because of recent currency devaluation Steam has now added region locking for games sold in Russia and CIS. Brazil and local area and Indonesia and local area are also being locked. If you purchase a game from one of those regions you cannot gift it to somone outside of the area. So someone from Russia can gift a game to someone to Georgia [Note: This Georgia, rather than this one, that is.] but not to someone in the USA. You want to see the prices in the Russia store and compare them to the Steam Christmas Sale which should be starting in a few hours.
cartechboy writes The common assumption among Tesla fans seems to be that state auto-dealer lobbyists are working with Republican legislators to enact laws banning direct sales of Tesla's electric cars to retail buyers. Is it true? The New York Times published an article with some data points that assesses the supposition. While the article mainly focuses on the conflict between Uber and the Republican party, some quotes could be easily applied to Tesla. For instance, Republican National Committee chairman Reince Preibus said, "It should be consumers, not government bureaucrats or legislators, that deicde what companies get our business." The author of the article, Josh Barro, wrote that 22 states permit direct sales of automobiles by Tesla to retail buyers, and of those the majority--14 of them-- voted for President Obama. He suggested that Democratic California, Illinois, and New York "have freer markets in auto retailing than Texas," which is presently Republican. When looking at a five-year-old article by Nate Silver that looked at political donations by car dealers, fully 88 percent of those donations went to Republican candidates, and just 12 percent to Democrats. That possibly suggests a propensity among Republican state legislators to support the interests for car dealers over those of electric-car buyers. Is the small bit of evidence enough to make a case? Good background on the current system of dealership sinecure can be found in this short 2009 Competition Advocacy Paper from the U.S. Department of Justice, which delves into the history and effects of the dealers-only system which still prevails.
SternisheFan passes on this excerpt from an Ars Technica article: On Wednesday Councilman Dan Garodnick introduced a bill to the New York City council seeking to ban all use of drones except those operated by police officers who obtain warrants. A second, parallel bill introduced by councilman Paul Vallone would place more stringent restrictions on drone use but stop short of banning drones for hobbyists and companies altogether. Both bills have been passed to the city's committee on public safety. An all-out ban on drones within the metropolis would be a quite wide-reaching step, especially as the Federal Aviation Authority (FAA) seems poised to adopt more permissive rules, with respect to commercial interests in particular. Earlier this year, the FAA formally granted six Hollywood companies exemptions to drone ban rules. A couple of months later, the FAA granted similar exemptions for construction site monitoring and oil rig flare stack inspections. The article explains that Vallone's bill is less restrictive, and rather than propose an outright ban "lists 10 instances where operating a UAV would be illegal, including at night, out of the operator's eyesight, or above 400 ft high. Outside of those conditions, hobbyists and commercial interests would be free to fly drones."
schwit1 writes Speaking off the record, senior intelligence officials have told the New York Times, CNN, and other news agencies that North Korea was "centrally involved" in the hack of Sony Pictures Entertainment. It is not known how the US government has determined that North Korea is the culprit, though it is known that the NSA has in the past penetrated North Korean computer systems. Previous analysis of the malware that brought down Sony Pictures' network showed that there were marked similarities to the tools used in last year's cyber-attack on South Korean media companies and the 2012 "Shamoon" attack on Saudi Aramco. While there was speculation that the "DarkSeoul" attack in South Korea was somehow connected to the North Korean regime, a firm link was never published.
Zothecula writes A Glasgow-based startup is reducing the cost of access to space by offering "satellite kits" that make it easier for space enthusiasts, high schools and universities alike to build a small but functional satellite for as little as US$6,000 and then, thanks to its very small size, to launch for significantly less than the popular CubeSats.
An anonymous reader writes A pair of trousers and blazer have been developed by San Francisco-based clothing company Betabrand and anti-virus group Norton that are able to prevent identity theft by blocking wireless signals. The READY Active Jeans and the Work-It Blazer contain RFID-blocking fabric within the pockets' lining designed to prevent hacking through radio frequency identification (RFID) signals emitted from e-passports and contactless payment card chips. According to the clothing brand, this form of hacking is an increasing threat, with "more than 10 million identities digitally pick pocketed every year [and] 70% of all credit cards vulnerable to such attacks by 2015."
Rambo Tribble writes It was long thought that gamma ray bursts were the exclusive province of deep space sources. More recently it was found that storms could produce such emissions, but such occurrences were thought rare. Now, data from NASA's Fermi satellite suggest such events happen over a thousand times a day. Per Prof. Joseph Dwyer, from the University of New Hampshire, "These are big, monster bursts of gamma rays, and one would think these must be monster storms producing them. But that's not the case. Even boring-looking, garden-variety, little storms can produce these."
First time accepted submitter River Tam writes Cybercriminals behind the TorrenLocker malware may have earned as much as $585,000 over several months from 39,000 PC infections worldwide, of which over 9,000 were from Australia. If you're a Windows user in Australia who's had their files encrypted by hackers after visiting a bogus Australia Post website, chances are you were infected by TorrentLocker and may have contributed to the tens of thousands of dollars likely to have come from Australia due to this digital shakedown racket.
mrspoonsi writes The proposal was made by the Google developers working on the search firm's Chrome browser. The proposal to mark HTTP connections as non-secure was made in a message posted to the Chrome development website by Google engineers working on the firm's browser. If implemented, the developers wrote, the change would mean that a warning would pop-up when people visited a site that used only HTTP to notify them that such a connection "provides no data security". Currently only about 33% of websites use HTTPS, according to statistics gathered by the Trustworthy Internet Movement which monitors the way sites use more secure browsing technologies. In addition, since September Google has prioritised HTTPS sites in its search rankings.
First time accepted submitter giulioprisco writes Magic Leap, a secretive Florida augmented reality startup that raised $542 million in October, hired renowned science fiction writer Neal Stephenson as its "Chief Futurist." Stephenson offers hints at the company's technology and philosophy: "Magic Leap is bringing physics, biology, code, and design together to build a system that is going to blow doors open for people who create things." According to the Magic Leap website, their Dynamic Digitized Lightfield Signal technology permits generating images indistinguishable from real objects.
An anonymous reader writes The Navy is testing a new underwater drone called GhostSwimmer, which is designed to a look like a shark and conduct surveillance work. It is being adapted by the chief of naval operations' Rapid Innovation Cell (CRIC) project, Silent NEMO, in Norfolk, Va.. GhostSwimmer is 5 feet long and weighs almost 100 pounds. It can operate in water depths from 10 inches to 300 feet, and is designed to operate autonomously for long periods of time, according to the Navy.
mpicpp writes Google Inc. and Verizon Communications Inc. struck a long-term patent cross-license agreement to reduce the risk of future patent lawsuits, the latest in a string of deals that signal a slowdown after years of aggressive patent wars. The deal effectively bars the companies from suing each other over any of the thousands of patents the companies currently own or acquire in the next five years. It also protects the companies if either sells a patent to another company, and that company attempts a lawsuit. "This cross license allows both companies to focus on delivering great products and services to consumers around the world," said Kirk Dailey, Google's head of patent transactions.
tobiasly writes The country's top five theater chains — Regal Entertainment, AMC Entertainment, Cinemark, Carmike Cinemas and Cineplex Entertainment — have decided not to play Sony's The Interview. This comes after the group which carried off a massive breach of its networks threatened to carry out "9/11-style attacks" on theaters that showed the film. Update: Sony has announced that it has cancelled the planned December 25 theatrical release.
ErnieKey writes A major application of 3d printing that could revolutionize space travel would be using 3d printers to create structures on non-terrestrial bodies like the moon, other planets, and even asteroids. Researchers from NASA's Kennedy Space Center have been working to develop solutions to materials issues, and recently presented initial findings on the potential for using in-situ materials like basalt for 3D printing. Their innovative method is based on only using in-situ supplies, and not materials that need to be brought into space.
MassDosage writes "At the the risk of exposing my age I remember building my first website using a rudimentary Unix text editor (Joe) and carefully handcrafting the Hypertext Markup Language (HTML) while directly logged on to the web server it was being served from. Back then Cascading Style Sheets (CSS) weren't even a glint in the eyes of their creators. A lot has changed and there's now a world of fancy WYSIWYG web page editors to choose from as well as Content Management Systems that allow you to create websites without looking at the underlying code at all. While this is all very useful and allows less technical people to create websites I still feel that having at least some knowledge of how everything works under the hood is empowering — especially in situations where you want to go beyond the limits placed on you by a certain tool. This is where Build Your Own Website: A comic guide to HTML, CSS and Wordpress comes into the picture. Its aim is to enable people new to web development to learn the subject by teaching the fundamentals of HTML and CSS first and only then describing how to use a Content Management System (CMS) — in this case Wordpress. While Wordpress might not be everyone's kettle of fish it's a good choice as an example of a modern CMS that is easily accessible and very popular. The concepts presented are simple enough that it should be easy enough for a reader to apply them to a different CMS should they want to. Read below for The rest of MassDosage's review.
anguyen8 writes Deep neural networks (DNNs) trained with Deep Learning have recently produced mind-blowing results in a variety of pattern-recognition tasks, most notably speech recognition, language translation, and recognizing objects in images, where they now perform at near-human levels. But do they see the same way we do? Nope. Researchers recently found that it is easy to produce images that are completely unrecognizable to humans, but that DNNs classify with near-certainty as everyday objects. For example, DNNs look at TV static and declare with 99.99% confidence it is a school bus. An evolutionary algorithm produced the synthetic images by generating pictures and selecting for those that a DNN believed to be an object (i.e. "survival of the school-bus-iest"). The resulting computer-generated images look like modern, abstract art. The pictures also help reveal what DNNs learn to care about when recognizing objects (e.g. a school bus is alternating yellow and black lines, but does not need to have a windshield or wheels), shedding light into the inner workings of these DNN black boxes.
Trailrunner7 writes that researchers at Palo Alto Networks have found a backdoor in Android devices sold by Coolpad. "A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users' consent. The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor's control system. Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user's permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad."