"We were very surprised at how precisely concordant the imaged damage was with the crescent shape of the eclipse itself," noted Dr. Avnish Deobhakta, an assistant professor of ophthalmology at the New York Eye and Ear Infirmary of Mount Sinai Icahn School of Medicine, in an email to NPR. He says this was the most severely injured patient they saw after the eclipse. All in all, 22 people came to their urgent care clinic with concerns about possible eclipse-related damage, and most of them complained of blurred vision. Of those, only three showed some degree of abnormality in the retina. Two of them had only mild changes, however, and their symptoms have gone away. The young woman described in this case report, at last check, still has not recovered normal vision.
NIST published the second draft of the proposed update to the Framework for Improving Critical Infrastructure Cybersecurity . This second draft update aims to clarify, refine, and enhance the Cybersecurity Framework, amplifying its value and making it easier to use. This latest draft reflects comments received to date, including those from a public review process launched in January 2017 and a workshop in May 2017.
NIST Cybersecurity Framework Draft Version 1.1 Public comments on the draft Framework and Roadmap are due to NIST via firstname.lastname@example.org by 11:59 pm EST on Friday, January 19, 2018. If you have an opinion about this, NOW is the time to express it.
As these devices proliferate around us — driven by broad music libraries, powerful AI assistants, and a rapidly growing pantheon of additional capabilities — should we have privacy concerns?
Or more succinctly, should we worry about these “always on” microphones being subverted into 24/7 bugging devices?
The short and quick answer is yes. We do need to be concerned.
The full and more complete answer is decidedly more complicated and nuanced.
But missing from the news site’s report was another eyebrow-raising detail: Some of its evidence, while accurate, appears to have been furnished by one of Google’s fiercest foes: Oracle.
For the past year, the software and cloud computing giant has mounted a cloak-and-dagger, take-no-prisoners lobbying campaign against Google, perhaps hoping to cause the company intense political and financial pain at a time when the two tech giants are also warring in federal court over allegations of stolen computer code.
Since 2010, Oracle has accused Google of copying Java and using key portions of it in the making of Android. Google, for its part, has fought those claims vigorously. More recently, though, their standoff has intensified. And as a sign of the worsening rift between them, this summer Oracle tried to sell reporters on a story about the privacy pitfalls of Android, two sources confirmed to Recode.
To be sure, the substance of Quartz’s story — Google’s errant location tracking — checks out. Google itself acknowledged the mishap and said it ceased the practice. Nor does Oracle stand alone in raising red flags about Google at a time when many in the nation’s capital are questioning the power and reach of large web platforms.
Still, Oracle’s campaign is undeniable.
"This report describes a campaign of targeted malware attacks apparently carried out by Ethiopia from 2016 until the present. In the attacks we document, targets receive via email a link to a malicious website impersonating an online video portal. When a target clicks on the link, they are invited to download and install an Adobe Flash update (containing spyware) before viewing the video. In some cases, targets are instead prompted to install a fictitious app called “Adobe PdfWriter” in order to view a PDF file. Our analysis traces the spyware to a heretofore unobserved player in the commercial spyware space: Israel’s Cyberbit, a wholly-owned subsidiary of Elbit Systems. The spyware appears to be a product called PC Surveillance System (PSS), recently renamed PC 360."
The authors recommend measures to help control this problem:
[The patent] outlined a potential cryptocurrency exchange system that would convert one digital currency into another. Further, this system would be automated, establishing the exchange rate between the two currencies based on external data feeds.
The patent describes a potential three-part system, where the first part would be a customer’s account and the other two would be accounts owned by the business running the system. The user would store their chosen cryptocurrency through the customer account.
The second account, referred to as a "float account," would act as a holding area for the cryptocurrency the customer is selling, while the third account, also a float account, would contain the equivalent amount of the cryptocurrency the customer is converting their funds to.
That third account would then deposit the converted funds back into the original customer account for withdrawal.
The plant is expected to have the capability to provide enough energy to power 2,350 average homes and enough fuel to operate 1,500 hydrogen-powered vehicles daily. The company is estimating the plant to be able to produce 2.35 MW of electricity and 1.2 tons of hydrogen each day. The facility will also be equipped with one of the largest hydrogen fueling stations in the world. Toyota's North America group vice president for strategic planning, Doug Murtha, says that the company "understand[s] the tremendous potential to reduce emissions and improve society."
A popular virtual keyboard app on iOS and Android, a.i.type, left a huge Mongo database just kinda lying around and exposed to the Internet. Not only that, but the leak revealed the amazing extent to which the app collected users’ personal, sensitive data.
Will stories like this ever stop?