News & Updates

The Tesla Model S, apparently becoming a boat in a flooded tunnel in Kazakhstan.

Elon Musk has confirmed that the Tesla Model S floats well enough to turn into a boat “for short periods of time,” with “thrust via wheel rotation.”

Musk’s comments were in reaction to a video shared over the weekend (embedded above), which appears to show a man driving a Tesla Model S through a flooded tunnel in Almaty, Kazakhstan. The Model S seems to be unfazed by the metre-deep water: it simply starts floating, then powers past some flooded internal combustion engine (ICE) cars, the water gracefully lapping against the car’s bonnet.

While it might seem a little incongruous for an electric car become a boat, it makes some sense if you think about it. Most conventional ICE cars have an exhaust pipe that’s low to the ground and quickly becomes flooded if you drive through deep water. Battery-powered vehicles, on the other hand, don’t have an exhaust pipe. (I wonder if fuel-cell vehicles, which do have an exhaust, can be used as a boat.)

Read 4 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

Ars Technica’s six best games of E3 2016. (video link)

Another E3 is in the books, and it’s nearly impossible to distill the dozens and dozens of games on display into a few titles to keep an eye out for—but that won’t stop us from trying. These 10 games in particular stood out from the crowded E3 show floor, and each has us excited to try out the full versions after a short taste this past week.

Abzu

Developer: Giant Squid
Publisher: 505 Games
Platforms: PS4, Windows
Expected Release Date: August 4, 2016

Read 46 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

David Dworken is the name of the student that hacked into the Pentagon US military’s website between classes at Maret High School and that the Government thanked.

Recently we have reported the first results of the “Hack the Pentagon” program that allowed the discovery of numerous flaws in the computers of the US Government. News of the day is that the high school student David Dworken from Washington DC has hacked into Pentagon computer systems. Dworken revealed to have spent 10-15 hours a day attempting to hack the US Defense Department websites, and he succeeded!

Hack the Pentagon program

Dworken has discovered six vulnerabilities in the US military’s website between classes at the Maret High School.

In response, the Pentagon thanked the young expert and offered him internships. Dworken was one of two people (the second one is Craig Arendt, a security consultant at Stratum Security) praised by the Secretary of Defense Ash Carter for finding the security issued in the Pentagon systems and now he has been approached by Government recruiters to discuss internships.

Carter praised the work of ethical hackers explaining the importance of their role in the protection national infrastructure.

“We know that state-sponsored actors and black-hat hackers want to challenge and exploit our networks … what we didn’t fully appreciate before this pilot was how many white hat hackers there are who want to make a difference,” he explained

The US Government is encouraging white hat hackers in testing government networks under “controlled” programs such has Hack the Pentagon.

In some cases, the hackers have been rewarded up to $US15,000 for disclosures of the worst vulnerabilities, but Dworken did not receive any money because the bugs he has found were already known to the US authorities. He says he will now study computer science at university after turning down internships.

Dworken confirmed his intention of studying computer science at university after turning down internships.

medianet_width=’300′; medianet_height= ‘250’; medianet_crid=’762221962′;

Pierluigi Paganini

Security Affairs – (US Government, hacking)

The post Student hacks Pentagon websites and gets thanked appeared first on Security Affairs.

Source: Security affairs

A critical flaw in the video conferencing software of the Quebec Liberal Party (PLQ) − a Canadian federalist provincial political party − allowed a user to spy on and hear the strategy discussions of the party at its premises and even access the live video camera feeds.

But luckily, the unknown white hat hacker who discovered the flaw alerted the PLQ staff of the security issue, showing them


Source: http://feeds.feedburner.com/TheHackersNews

An unnamed hacker hacked the video conferencing software used by the Quebec Liberal Party and shared the news with the media.

Politicians are a privileged target of hackers, in many cases they totally ignore the risk of a cyber attack and their staff is not aware of ongoing espionage activities.

We read about hackers that influenced Mexican elections and recently the US Director of National Intelligence James Clapper revealed that attackers are targeting the campaigns of US presidential contenders.

It is clamorous the case of Hillary Clinton, recently Marcel Lehel Lazar also known as Guccifer has admitted the hack of her private email server occurred in 2013.

Today we will speak about the Canadian Quebec Liberal Party (PLQ), that fixed a security issue affecting the video conferencing software it used. It seems that an unknown hacker exploited the flaw to spy on the members of the Party obtaining access to information shared during private meetings.

The good news in this specific case is that the hacker was not ill-intentioned and ethically disclosed the problem to the Quebec Liberal Party staff allowing it to fix the issue.

The unnamed hacker revealed to the Canadian media that the video conferencing software used by the Quebec Liberal Party contained a security flaw and was not properly configured, the staff used the factory default password.

“A security flaw in the computer systems of the permanence of the Quebec Liberal Party (PLQ) allowed a user to observe and hear the strategy discussions of the party at its premises in Montreal and Quebec City.” reported the Le Journal de Montreal. “According to what we learned, the security breach used to hack the PLQ was the same type as the one that allowed two 14 year olds to hack an ATM of Bank of Montreal last week. That is to say, by entering a single password and commonly used by default.”

To be precise, the Quebec Liberal Party officials did not provide information about the way the hacker breached the system, it is not clear if he exploited the flaw or accessed it through the default password. Also in this second scenario, there are responsibilities of the IT staff of the party that also hasn’t monitored the access to the system.

The hacker logged into the video conferencing application multiple times accessing the Quebec Liberal Party (PLQ) meetings. He told the journalists about some of the topics discussed in the private meetings.

The hacker was able to start the video feed from video conferencing software using its cameras every time he wanted.

Quebec Liberal Party spied by hackers

The PQL spokesman confirmed the security breach, but also added that no sensitive information was leaked neither secret issues were ever discussed in the meetings.

“We take very seriously this information,” commented the director of communications, Maxime Roy. “We already have a team of experts working to understand what happened and plug the computer breach on the most videoconferencing system as quickly as possible,” “For now, the important thing was to secure and understand what happened […] We are working with a supplier.” he added.

The experts investigated the issue for a few days then they fixed the vulnerability and changed the video conferencing software default password.

medianet_width=’300′; medianet_height= ‘250’; medianet_crid=’762221962′;

Pierluigi Paganini

Security Affairs –  (Quebec Liberal Party ,hacking)

The post Hacker breached the Canadian Quebec Liberal Party’s video conferencing software appeared first on Security Affairs.

Source: Security affairs

A number of users are experiencing problems during logging into GoToMyPC because Citrix reset account passwords after hackers reportedly attacked it.

It’s official, the GoToMyPC service operated by Citrix is the last victim of the hackers.

GoToMyPC is remote desktop software that allows users to access and control their computers remotely by using a simple web browser.

A number of users are experiencing problems during logging into GoToMyPC because Citrix experts have reset account passwords after unknown hackers reportedly attacked the service.

GoToMyPC security breach

“Dear Valued Customer,
Unfortunately, the GoToMYPC service has been targeted by a very sophisticated password attack. To protect you, the security team recommended that we reset all customer passwords immediately.” states the security advisory published by GoToMyPC.

“Effective immediately, you will be required to reset your GoToMYPC password before you can login again.
To reset your password please use your regular GoToMYPC login link.

Recommendations for a strong password:

  • Don’t use a word from the dictionary
  • Select strong passwords that can’t easily be guessed with 8 or more characters
  • Make it Complex – Randomly add capital letters, punctuation or symbols
  • Substitute numbers for letters that look similar (for example, substitute “0” for “o” or “3” for “E”.”

The advisory doesn’t include details on the attack, it only describes it a “very sophisticated password attack.”

Now the problem is to understand if hackers breached the GoToMyPC severrs or if the attackers used passwords available online leveraging the bad habit of users in sharing same credentials among various services.

The company is still investigating the case, meantime, let me suggest also to change the password for all those services for which you shared the same credentials.

The incident reminds us the problem recently suffered by TeamViewer, recently many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies any incident.

GoToMyPC is suggesting customers to enable two-step verification in order to improve the security of their accounts.

medianet_width=’300′; medianet_height= ‘250’; medianet_crid=’762221962′;

Pierluigi Paganini

Security Affairs –  (GoToMyPC, Security Breach)

The post GoToMyPC reset all customer passwords appeared first on Security Affairs.

Source: Security affairs

To make sure you’ll be able to jog your memory quickly, you might want to go for an actual jog a little after learning something.

Healthy volunteers that exercised four hours after learning patterns had better recall 48 hours later than those that didn’t exercise at all or exercised directly after learning. The delayed exercise may spur the release of molecules that boost the brain’s normal ability to consolidate and bank memories for long-term storage, researchers report in the journal Current Biology. If the finding holds up in further studies, it may suggest that working out a little after cramming could help bulk up your noggin.

For the study, researchers had 72 healthy volunteers spend 40 minutes learning the location of 90 objects on a screen—like a cartoon beach ball on the center right. The researchers immediately tested how well each participant did learning the objects’ locations, then split up the participants into three groups. One group went directly into a 35-minute interval training on a stationary bike (with an intensity of up to 80 percent of their maximum heart rate). The second group went into a quiet room and watched nature documentaries until it was time for their four-hour delayed workout. And a third group acted as the control group, which just watched nature documentaries and hung out—but didn’t work out—in the gym.

Read 7 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/

.related-stories { display: none !important; }

The 24 Hours of Le Mans holds a special place in our hearts. More than any other race, it’s a crucible in which new technology is forged, technology that’s directly relevant to the cars you or I drive on the road. And for 23 hours and 57 minutes, this year’s race belonged to Toyota Gazoo Racing, which put on a fine show with its pair of TS050 hybrid race cars. But racing can be a cruel, cruel sport—something I know all too well—and this year was crueler than most.

The race got underway on Saturday during torrential rain, with the first 50 minutes or so conducted under a safety car as the ACO (the race organizers) waited for the track to dry sufficiently for things to get going properly. At the front of the field the battle for the overall win was one fought between Porsche and Toyota with their hybrid LMP1 prototypes. Both of Audi Sport Team Joest’s R18 hybrids faltered early on, as did the #1 Porsche 919 Hybrid, but the remaining three cars (the #5 and #6 Toyota TS050s and the #2 Porsche) stayed in close contention with multiple lead changes between them throughout the course of the race.

The #5 Toyota of Sebastien Buemi, Anthony Davidson, and Kazuki Nakajima looked set for victory after a strong performance in the final quarter of the race. The Toyotas were able to run for 14 laps between fuel stops—one more than either the Audis or Porsches, and the #5 stretched a lead over the #2 Porsche 919 Hybrid (Neel Jani, Romain Dumas, and Marc Lieb) and its sister TS050 (Mike Conway, Stéphane Sarrazin, and Kamui Kobayashi) until it all went tragically wrong halfway around the penultimate lap. A third of the way down the Mulsanne Straight, with Nakajima at the wheel, the #5 Toyota started losing power. In short order, its 50-second lead over the Porsche evaporated, and the car came to a halt just past the finish line—with three minutes still on the clock.

Read 10 remaining paragraphs | Comments

Source: http://feeds.arstechnica.com/arstechnica/index/