University of Calgary is another victim of ransomware

12 May

University of Calgary is another victim of ransomware

Until recently, ransomware was mainly used for attacks on companies and private users, but attackers rarely paid ransom for unlocking files. Hackers have specialized in attacks on other targets, which have no way out, will gladly meet the demands of criminals.

Ransomware is still the biggest threat in the network, but for ordinary users, it is not as big a threat as for budget units. Cybercriminals are well aware that ordinary users will not pay a penny for unlocking files, as they can use the backup at all times.

Otherwise hospitals, police stations, or schools that often neglect the need for archiving because of the large amount of data, and their security is usually very weak and easy to overcome. As reported by the media, another ransomware victim fell to the Canadian University of Calgary.

Cybercriminals infected university computers and ransomed the data with ransom. For 10 days the IT team tried to cope with the problem, but they were unable to do so, so the school’s management decided to pay the criminals a ransom of $ 16,000. The file decryption process will take some time, as it must be handled very carefully, and there is no guarantee that all data will be recovered.…

12 May

Project Ara with modified android l

Work on a modular smartphone project called Project Ara follows the plan and the device, which can be assembled from blocks, should hit store shelves next year. We have now learned that it will receive a specially modified version of Android L that works with interchangeable modules.

Project Ara is the realization of the idea we have been waiting for years. This is a modular smartphone that can be freely exchanged, thus matching the device to your specific needs. As modules are supposed to be hot-swapable, so it’s exchangeable without shutting down the device, the operating system needs to be modified accordingly, and as Palu Eremenko of Google says, that’s going to happen.

Android L on which the Project Ara works, with the help of Linaro will be changed accordingly so that there is no problem replacing the components. Naturally, this option will have some limitations, so it is impossible to replace the processor or screen.…

7 May

The rose rosseta set out to meet the comet

Ten years ago, the European Space Agency launched a probe named Rosetta, which aims to meet Comet 67P / Churyumov-Gerasimenko. The vehicle has just been awakened from hibernation and will soon begin the final stage of its mission.

Rosetta was sent to space in 2004 and directed to meet with astronomer 67P / Churyumov-Gerasimenko, who is visiting our solar system for astronomers. In order to save energy, after the route was set, the probe was put into hibernation, over 800 million kilometers away, and is currently located near Jupiter.

Scientists have just woken her from hibernation so she can complete her final mission. Now it will be approaching the comet so that in August it could send a lander called Philae to it, which will collect samples of rocks and ice.

If everything goes well, we will soon learn the composition of 67P / Churyumov-Gerasimenko, which will allow us to better investigate this comet, and perhaps also determine where it arrives.…

5 May

LG smart refrigerators with Smart Diagnosis and door functions

Smart Diagnosis – intelligent diagnostics using the phone

LG refrigerators are distinguished by their unique Smart Diagnosis function. Upon any fault, the user contacts the special hotline number and applies any phone to the Smart Diagnosis icon on the device. Just open the refrigerator door and press the button, and the signal generated by the refrigerator will be read by a consultant on the hotline who will provide the necessary advice and tips on how to eliminate the problem. This technology limits expensive, inconvenient service requests and home visits. We can diagnose the blunders by ourselves, by downloading the appropriate application to your smartphone.

Door in the door, ie easy access to products

Door-in-Door (LGBT) from LG is a family-friendly system that allows users to quickly and conveniently access the most used products without having to open the entire refrigerator door. This feature is so important that it dramatically reduces the loss of cold air – as much as 41 percent. Compared to the opening of the whole door, so cooling works better and the food stays longer fresh. Door-in-door can also be useful for typical occasional events, where it will be perfect as a mini-bar.

Energy consumption below the standard

Thanks to LG’s innovative engine technology, bottom-freezers and Total No Frost deliver 10% less energy than the required A +++ power class for the first time. The increased energy efficiency of the linear compressor results from reduced internal friction and more precise cooling control. Thanks to this, the energy efficiency of the device is increased by as much as 36 percent

Always fresh

Using the Pure N Fresh function, a thin carbon filter reduces the presence of unpleasant odors that often accompany some products. Pure N Fresh also circulates clean air from the environment with the help of a built-in fan and keeps the optimum conditions inside the refrigerator. This system passes purified air through special ducts so that the food stays fresh longer than when stored in a conventional refrigerator.

Easy Storage System

The intelligent food storage system allows for easier separation of products according to their storage requirements and helps to customize the interior of the refrigerator to suit individual needs. The fridge in a special Moving Ice Tray drawer further enhanced its ability to adapt to the user. Removable Moving Ice Tray can be quickly moved or removed from the refrigerator whenever you need more space in the freezer.

Fresh 0 Zone Technology

Fresh 0 Zone from LG is a special, cooler, closed chamber that minimizes temperature fluctuations, allowing you to extend the freshness of your products. They are cooled to a temperature of about 0, -1 degrees which is ideal for meat and fish even after thawing. In addition, the Multi Air Flow function distributes evenly and multitasking cold air evenly in the refrigerator so that cooling at any place of the refrigerator is equally effective.…

4 May

MediaTek announces the Helio x series processors

MediaTek Taiwan has become one of the largest manufacturers of mobile processors, specializing mainly in low-budget devices. Now it wants to conquer the market of high-end devices and has just announced its latest line of 64-bit 8-core Helio X series processors.

The Helio X family is designed for flagship smartphone models with eight cores, an LTE connectivity module, and supports the 4K standard and H.265 codecs, providing 120 Hz image refresh and 1080p video recording at 480 frames per second.

The first layout of the new family will be the MT6795W Helio X10. The 28 nm production system will be equipped with eight ARM Cortex-A53 cores and clocked at 2.2 GHz. The processor will be available in April, but this model will not be strong enough to compete with the most powerful Snapdragon.

MediaTek has plans for stronger versions, and plans to introduce a more modern 20nm variant on the ARM Cortex-A72 cores.…

14 Apr

Vizio will pay a fine for spying users

Vizio and the Federal Trade Commission have come to terms in a process involving a huge breach of user privacy by their televisions. The manufacturer will pay a i/strong2.2 million fine.

When buying a new TV set packed with cameras, microphones and various types of sensors, we would not want to be spied on by him. In the meantime, the Vizio receivers, which illegally collected information for their users, behaved like that. These products automatically track what the owners see on them and without any explicit warning. The information collected was then sold for heavy money to advertisers and other companies.

When the case came to light, the Federal Trade Commission filed the Vizio trial, accusing the company of infringing its customers’ privacy. Then it turned out that spying took place very long, since data collection was a standard feature of receivers produced since 2014. What’s more, the company has released software updates for older models that have also introduced it.

With the technology of comparing pixels on the screen a second after a second, and then comparing this information with the content database, Vizio knew perfectly well what the user on his television was watching. Whether using cable TV, satellite, online sources such as Netflix and Amazon Prime Video, or DVD or Blu-ray movies. As a result, every day 100 billion data points were recorded from millions of television viewers.

The collected data included many private information such as gender, age, income, marital status, size of home, education and whether the home is own or rented. Vizio also made it possible to trace the user through other devices.…

25 Mar

Human body with passwords

University of Washington researchers are working on an innovative way to pass passwords. The idea uses the human body as a carrier of information. This is a much safer way than the typical wireless connection.

More and more home devices are communicating wirelessly, making them much more convenient. It is enough that we are approaching the door of our house protected by an electronic lock, and those communicating with the smartphone will unlock themselves. This is a very convenient solution when we have hands busy shopping.

However, experts have repeatedly proved that communication over Wi-Fi and Bluetooth is not safe and capable hackers can easily take over. University of Washington researchers are working on another, much safer signal transmission method, using the electrical conductivity of our body. They managed to send wireless signals from the touchpad or screen held in one hand to another device with which the user is physically in touch.

In other words, the electronic door lock will no longer communicate with the smartphone by radio when it comes to it. It will only open when we grab hold of the handle and in the other hand we will keep the smartphone. This may not be the most convenient solution, but certainly much safer than the currently used systems.…

24 Mar

Intelligent rifle with autoclave function can be hacked

A pair of hackers demonstrated how to take control of a modern rifle equipped with a computer-based targeting system.

Intelligent guns that can be programmed to be perfectly targeted are not defective. It turns out that you can break into them and point out another target, causing the sniper to unconsciously go where he intended.

Internet security researchers Runa Sandvik and Michael Auger hacked TrackingPoint’s rifle with a Linux-powered computer and connected to Wi-Fi, leading to the fact that it did not hit the programmed target. Using a laptop, hackers also managed to lock the trigger remotely.

During a presentation organized by Wired magazine, hackers demonstrated how to disarm a $ 13,000 rifle – the weapon currently tested by the US Army. The couple has proven that it is enough to be within Wi-Fi coverage to access the interface, manipulate settings, or change application properties.

After hijacking the rifle, specialists took control of the trajectory of the projectile, changing ballistic parameters, including the weight of the ammunition. As a result, heavier bullets were to the left of the target, lighter to the right.

The sniper may not even know that his weapon has been hacked – the only indication that the rifle has been taken over is a slight “jump” in the viewfinder.

“You can always lie to an operator so you always miss,” says Sandvik. In this situation, he has a rifle equipped with a computer worth six, seven thousand dollars, which must just point alone.

Researchers point out that fortunately with the rifle it is not possible to shoot remotely – then the operator must press the trigger.

A hacker couple unveiled their findings at the Black Hat Las Vegas conference in late July.

TrackingPoint, a Texas-based company, promoted its ultra-modern rifle called Precision Guided Firearm in 2013, in an animated film in which it asserted that the autoclave function “virtually eliminates the possibility of error.”

Founder TrackingPoint, John McHale, has provided the magazine “Wired” that he was aware of a year-long experiment by hackers. He added that he would like to help with it as soon as possible to develop a patch for the software.

Hackers exploiting the weakness of devices connected to the computer network today are the biggest threat to the future of the so-called. Internet of Things – This term is understood to mean any device connected to the Internet, including household appliances such as microwave ovens, security cameras, televisions, or multimedia centers. IDC estimates that by 2020 more than 200 billion devices will be connected to the Internet.…

20 Mar

Ambitious SpaceX plans

Space SpaceX consortium does not intend to limit itself to the conquest of Mars. The company managed by Elon Musk, after reaching the Red Planet, wants to use its technology to visit other planets.

SpaceX is one of the private consortiums that also want to reach the Red Planet, providing astronauts there. The corporation managed by Elmo Musk, however, does not want to limit itself to the exploration of one planet.

Musk announced on Twitter that his company plans to visit other planets and intends to do so with the help of its Mars Colonial Transporter engine. Although the name suggests that it was created solely for the sake of a trip to Mars, it does not have to be limited to that. According to the billionaire, the vehicle can also reach other places, only to change the name beforehand.

The Mars Colonial Transporter was designed to work with the company’s Raptor rocket to deliver people to Mars. The vehicle is still in development, but the first unmanned mission is planned in 2022. Crew tests will take place in 2024.

Shortly thereafter, MTC will embark on the Red Planet.…

25 Feb

Tesla has developed a new mobile app for car owners

US Tesla has developed a completely new mobile application designed to handle its vehicles. The tool offers even more features to control the vehicle and information about its operation.

Modern cars are increasingly working with smartphones, offering remote unlocking options, airing in the summer, or checking the amount of fuel remaining in the tank. Tesla also has such applications, and it is called Tesla and is designed to work with Model S and Model X.

Owners of these vehicles, through the application, get access to driving style information, ie average and maximum speed, brake frequency, Thanks to this data you can significantly improve driving efficiency, ie use less energy, because the application can also analyze our route and show where we used the full power of the engine.…