Keyword: tech
-
Typically when referring to electrical current, an image of electrons moving through a metallic wire is conjured. Using the spin Seebeck effect (SSE), it is possible to create a current of pure spin (a quantum property of electrons related to its magnetic moment) in magnetic insulators. However, this work demonstrates that the SSE is not limited to magnetic insulators but also occurs in a class of materials known as paramagnets. Since magnetic moments within paramagnets do not interact with each other like in conventional ferromagnets, and thus do not hold their magnetization when an external magnetic field is removed, this...
-
The prolonged hacking into the White House Office of Personnel Management, which put the personal information of at least some 21.5 million past and current federal employees in jeopardy, is only the beginning of the security threat to the Obama Administration and its successors, a number of top-level experts in cybersecurity have told Fox News. The attack has been frequently sourced as coming from China. The experts warned that the entire U.S. national security clearance system could be compromised, that future senior government leaders and advisors could be targeted even before taking office, and hundreds, perhaps thousands, of government officials...
-
The fist bump was their thing in Afghanistan, where both Marines lost legs in the same attack, and the fist bump is still their thing in the hunt for child predators under a special law enforcement program to train and hire medically retired veterans. Cpl. Justin Gaertner and Sgt. Gabriel Martinez in their dress blues bumped fists at an event earlier this year in Florida, just as they bumped fists while recovering from their wounds. Gaertner, 26, of Tampa, Fla., has been partnered for the last two years with retired Army Special Forces Staff Sgt. Nathan Cruz, 42, executing the...
-
Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself. Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s...
-
SEATTLE — Microsoft plans to announce a major new round of layoffs as early as Wednesday, as the company seeks to further cut costs in a shifting technology landscape. The layoffs are in addition to the about 18,000 employees that Microsoft said it planned to let go a year ago, according to people briefed on the plans, who asked for anonymity because the details were confidential. The new job cuts are expected to affect people in Microsoft’s hardware group, among other parts of the company, including the struggling smartphone business that it acquired from Nokia last year in a $7.2...
-
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than...
-
How a Jailbird Con Artist Uncovered a Secret FBI Surveillance Tool 43,960 7 Kate KnibbsFiled to: Stingrays 6/19/15 2:30pm A convict lawyer, sitting in jail, obsessed with a wacky theory that the government tracked him by sending secret rays into his house... ends up discovering a secret government cell phone tracking program. Sounds like bizarre noir, right? But it’s true.It happened to Daniel Rigmaiden, who found out that the government had used Stingrays—covert surveillance devices that act like a fake cell phone towers—to catch him running a fake tax return scheme. He’s the guy who brought Stingrays to light. Rigmaiden...
-
The super-sophisticated malware that infiltrated Kaspersky Labs is more crafty than first imagined. We're told that the Duqu 2.0 software nasty was signed using legit digital certificates issued to Foxconn – a world-leading Chinese electronics manufacturer, whose customers include Microsoft, Dell, Google, BlackBerry, Amazon, Apple, and Sony. The code-signing was uncovered by researchers at Kaspersky Lab, who are studying their Duqu 2.0 infection. Windows trusts Foxconn-signed code because the Chinese goliath's certificate was issued by VeriSign, which is a trusted certificate root. Thus, the operating system will happily load and run the Foxconn-signed Duqu 2.0's 64-bit kernel-level driver without setting...
-
Disney ABC Television Group reversed a decision to lay off about 35 tech workers this week, following recent reports that Disney laid off hundreds of tech workers in January after forcing them to train their replacements. Two weeks ago, Disney ABC told a team of between 30 and 35 application developers they were being laid off, some at the end of July, and that their jobs were going to an IT contractor with large offshore operations, reported Computer World. But on Thursday, Disney ABC told the workers plans had changed and they would not be laid off. Some of the...
-
The stunning leak of nude and intimate photos of scores of celebrities may reach far wider than was previously known, involving the breach of almost 600 online storage accounts, according to unsealed federal court documents. The "Celebgate" hack resulted in the posting on Aug. 31 of almost 500 purported photos of Hollywood stars, models and other celebrities — including Jennifer Lawrence, Kate Upton, Kirsten Dunst, Kaley Cuoco and U.S. soccer star Hope Solo — to the Wild West-like Internet forum 4chan, from which they quickly spread. Apple Inc. confirmed the next day that the photos were obtained through a "targeted...
-
".......Annie [composite techie-must read full article to grasp how "she's" defined]has voted for the Democrats in the last few elections, both because everyone she knows does and because they stand against the less tolerant elements of the Republican Party, which seem frighteningly antediluvian to her. The war on terror struck her as about the dumbest thing she’s seen any government do, a massive overreaction with no planning or strategy to it.(She feels roughly the same about the war on drugs.)Yet she saw that Democrats were just as slow as Republicans to sour on the United States’ involvement in the Middle...
-
An ultracompact beamsplitter – the smallest one in the world – has been designed and fabricated by researchers in the US. Using a newly developed algorithm, the team built the smallest integrated polarization beamsplitter to date, which could allow computers and mobile devices of the future to function millions of times faster than current machines.
-
Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them. The vulnerability is located in a service called NetUSB, which lets devices connected over USB to a computer be shared with other machines on a local network or the Internet via IP (Internet Protocol). The shared devices can be printers, webcams, thumb drives, external hard disks and more. NetUSB is implemented in Linux-based embedded systems, such as routers, as a kernel driver. The driver is developed by Taiwan-based KCodes Technology. Once enabled, it opens a server that listens on TCP...
-
University of Utah engineers have taken a step forward in creating the next generation of computers and mobile devices capable of speeds millions of times faster than current machines. The Utah engineers have developed an ultracompact beamsplitter—the smallest on record—for dividing light waves into two separate channels of information. The device brings researchers closer to producing silicon photonic chips that compute and shuttle data with light instead of electrons. Electrical and computer engineering associate professor Rajesh Menon and colleagues describe their invention today in the journal Nature Photonics. Silicon photonics could significantly increase the power and speed of machines such...
-
Such glitches emerge with surprising frequency. It’s suspected that the reason why Nasa lost contact with the Deep Impact space probe in 2013 was an integer limit being reached. And just last week it was reported that Boeing 787 aircraft may suffer from a similar issue. The control unit managing the delivery of power to the plane’s engines will automatically enter a failsafe mode – and shut down the engines – if it has been left on for over 248 days. Hypothetically, the engines could suddenly halt even in mid-flight. The Federal Aviation Administration’s directive on the matter states that...
-
Racing across the U.S. in your taco truck, you must fight off animals mutated by fallout from a nuclear war, and you must also turn them into delicious filling for the tacos you sell inside fortified towns. Your mission: Make it to the Canadian city of Winnipeg. You are “Gunman Taco Truck.” “It’s pretty much only a game that a kid would come up with,” says Brenda Romero, a videogame designer for more than 30 years and the mother of Donovan Romero-Brathwaite, the 10-year-old inventor of the game. And yet GTT already has been licensed by a videogame publisher for...
-
The US military is in danger of losing its technological advantage unless it invests in research and finds ways to build innovative weapons much faster, top officials said Thursday. The Pentagon unveiled an initiative to streamline its bureaucracy and tap into technological breakthroughs in the private sector amid growing anxiety that American forces' longtime hi-tech edge is slipping away. The measures reflected "an overriding concern that our technological superiority is at risk," Frank Kendall, the Pentagon's chief weapons buyer, wrote in a report. "Potential adversaries are challenging the US lead in conventional military capability in ways not seen since the...
-
Late last month a mysterious patch suddenly appeared as an Optional entry in the Windows Automatic Update chute. At the time I wrote: Conjecture at this point: It's somehow related to the ability to upgrade directly from Windows 7 or 8 to Windows 10. But of course, the official documentation doesn't say anything of the sort. The crows have come home to roost and, thanks to a German researcher named Gerard Himmelein at heise.de, we now have a more thorough understanding of exactly what Microsoft's dishing out (a Google English translation of the post is available). Yesterday Jan Willem Aldershoff...
-
Electric carmaker Tesla announced Friday it delivered a "record" number of vehicles in the first quarter, as it began more timely reporting of sales figures. The California firm started by tech entrepreneur Elon Musk said it sold 10,030 cars in the first three months of 2015. "This was a new company record for the most cars delivered in a quarter and represents a 55 percent increase over the first quarter last year," the company said in a statement. Going forward, Tesla said it would publish the number of new car deliveries within three days of quarter end. "We have decided...
-
Imagine you need to have an almost exact copy of an object. Now imagine that you can just pull your smartphone out of your pocket, take a snapshot with its integrated 3-D imager, send it to your 3-D printer, and within minutes you have reproduced a replica accurate to within microns of the original object. This feat may soon be possible because of a tiny new, tiny high-resolution 3-D imager developed at Caltech. Any time you want to make an exact copy of an object with a 3-D printer, the first step is to produce a high-resolution scan of the...
|
|
|