Harvard’s soft exosuit makes walking 23 percent easier

Harvard Wyss Institute researchers have been working on a soft exosuit with DARPA’s financial help for years. While they were able to present a proof of concept in 2016, it’s only now that they’ve found out just how much the suit can actually help its wearer. According to a new study published in Science Robotics , Harvard’s exosuit reduces the energy a user needs to exert while walking by 23 percent. It does that by providing assistive force to the ankle at the perfect moment when you take another step. Team leader Conor Walsh said that’s the highest percentage of reduction in energy use observed with an exosuit: “In a test group of seven healthy wearers, we clearly saw that the more assistance provided to the ankle joints, the more energy the wearers could save with a maximum reduction of almost 23% compared to walking with the exosuit powered-off. To our knowledge, this is the highest relative reduction in energy expenditure observed to date with a tethered exoskeleton or exosuit.” Of course, assistive force wouldn’t be as helpful without an effective design. As Wired explains, the muscles and tendons from the hip to the knee need to work together in stabilizing the leg to achieve an efficient stride. So the researchers couldn’t stop with something that only covers the ankles — they had to use garters to connect the ankle straps to a hip girdle. The result is the exosuit’s current form, which you can see below. That said, the researchers admit that they need to conduct follow-up tests. For one, they had the subjects offload the exosuit’s cable-based actuation, electronics and battery units before conducting the experiment. Those make up an additional 17-plus pounds that would have changed the wearers’ situation. Further, they found that the subjects’ gaits changed depending on how much assistive force they provided, which was between 10 to 38 percent of the ankle force needed to take a step. They still need to explore the possibility that the reduction in energy is a result of the subjects’ change in gait rather than the assistive force itself. In the future, Harvard’s exosuit could help the elderly and patients suffering from Parkinson’s, cerebral palsy and other conditions to walk well on their own. As you can guess from that DARPA funding, though, it also has a potential military application: the agency hopes it can help soldiers carry heavy supplies far longer than they’d normally be able to. [Image credit: Wyss Institute at Harvard University] Via: Wired , New Scientist Source: Harvard’s Wyss Institute

Visit site:
Harvard’s soft exosuit makes walking 23 percent easier

That critical “ImageTragick” bug Ars warned you about? It cost Facebook $40k

Last May, Ars reported that a critical vulnerability in a widely used image-processing application left a huge number of websites open to attacks that allowed hackers to execute malicious code on the underlying servers. More than five months later, Facebook paid a $40,000 bounty after discovering it was among those at risk. On Tuesday, researcher Andrey Leonov, said he was able to exploit the vulnerability in the ImageMagick application by using a tunneling technique based on the domain name system that bypassed Facebook firewalls. The firewalls had successfully protected against his earlier exploit attempts. Large numbers of websites use ImageMagick to quickly resize images uploaded by users. “I am glad to be the one of those who broke the Facebook,” Leonov wrote in a blog post that gave a blow-by-blow account of how he exploited the ImageMagick vulnerability. Two days after the researcher privately shared the exploit with Facebook security personnel, they patched their systems. Ten days after that, they paid Leonov $40,000, one of the biggest bounties Facebook has ever paid. Read 4 remaining paragraphs | Comments

Originally posted here:
That critical “ImageTragick” bug Ars warned you about? It cost Facebook $40k

Nintendo’s Fire Emblem Heroes will launch on Android before iOS

iOS users will have to wait longer for Nintendo’s next major smartphone game release. Nintendo’s push towards smartphone gaming will continue on February 2 with the launch of Fire Emblem Heroes , a touch-only take on the company’s longtime tactical RPG series—and possibly the company’s most micro-transaction driven game yet. Like Super Mario Run before it, Fire Emblem Heroes will have a period of platform exclusivity—but in a surprise twist, that exclusivity is reversed. Android users will get first crack at Heroes on that release date, while iOS users have been told their version is coming “soon.” (For an estimate of how long the left-behind platform might have to wait, remember:  Super Mario Run has yet to launch on Android over a month after its iOS release.) During this announcement, Nintendo did not mention  Animal Crossing , the other series set to receive a smartphone port in the near future. Read 5 remaining paragraphs | Comments

More:
Nintendo’s Fire Emblem Heroes will launch on Android before iOS

Malwarebytes Discovers ‘First Mac Malware of 2017’

wiredmikey writes: Security researchers have a uncovered a Mac OS based espionage malware they have named “Quimitchin.” The malware is what they consider to be “the first Mac malware of 2017, ” which appears to be a classic espionage tool. While it has some old code and appears to have existed undetected for some time, it works. It was discovered when an IT admin noticed unusual traffic coming from a particular Mac, and has been seen infecting Macs at biomedical facilities. From SecurityWeek.com: “Quimitchin comprises just two files: a .plist file that simply keeps the .client running at all times, and the .client file containing the payload. The latter is a ‘minified and obfuscated’ perl script that is more novel in design. It combines three components, Thomas Reed, director of Mac offerings at Malwarebytes and author of the blog post told SecurityWeek: ‘a Mac binary, another perl script and a Java class tacked on at the end in the __DATA__ section of the main perl script. The script extracts these, writes them to /tmp/ and executes them.’ Its primary purpose seems to be screen captures and webcam access, making it a classic espionage tool. Somewhat surprisingly the code uses antique system calls. ‘These are some truly ancient functions, as far as the tech world is concerned, dating back to pre-OS X days, ‘ he wrote in the blog post. ‘In addition, the binary also includes the open source libjpeg code, which was last updated in 1998.’ The script also contains Linux shell commands. Running the malware on a Linux machine, Malwarebytes ‘found that — with the exception of the Mach-O binary — everything ran just fine.’ It is possible that there is a specific Linux variant of the malware in existence — but the researchers have not been able to find one. It did find two Windows executable files, courtesy of VirusTotal, that communicated with the same CC server. One of them even used the same libjpeg library, which hasn’t been updated since 1998, as that used by Quimitchin.” Read more of this story at Slashdot.

Original post:
Malwarebytes Discovers ‘First Mac Malware of 2017’

Take a Free Digital Photography Class From Harvard

Photography isn’t as easy as many people assume, but you can learn the basics on your own . And if you need some structured lessons, this 12-module course from Harvard will teach you everything from exposure settings to reading histograms. Read more…

More here:
Take a Free Digital Photography Class From Harvard

Map shows Middle East based on who actually holds territory

From Geopolitical Futures via Joshua Landis . Seems rough on details. If Islamic State gets wee satellites down in Yemen, you’d think the Sinai Insurgents would at least get some diagonal shading! (more…)

Continue reading here:
Map shows Middle East based on who actually holds territory

It’s shockingly easy to hijack a Samsung SmartCam camera

Enlarge Smart cameras marketed under the Samsung brand name are vulnerable to attacks that allow hackers to gain full control, a status that allows the viewing of what are supposed to be private video feeds, researchers said. The remote code-execution vulnerability has been confirmed in the Samsung SmartCam SNH-1011, but the researchers said they suspect other models in the same product line are also susceptible. The flaw allows attackers to inject commands into a Web interface built into the devices. The bug resides in PHP code responsible for updating a video monitoring system known as iWatch. It stems from the failure to properly filter malicious input included in the name of uploaded files. As a result, attackers who know the IP address of a vulnerable camera can exploit the vulnerability to inject commands that are executed with unfettered root privileges. “The iWatch Install.php vulnerability can be exploited by crafting a special filename which is then stored within a tar command passed to a php system() call,” the researchers wrote in a blog post published to the Exploitee.rs website. “Because the webserver runs as root, the filename is user supplied, and the input is used without sanitization, we are able to inject our own commands within the achieve root remote command execution.” Read 5 remaining paragraphs | Comments

Read more here:
It’s shockingly easy to hijack a Samsung SmartCam camera

Windows is getting its own built-in book store in the Creators Update

Enlarge (credit: MSPoweruser ) The Windows Store—which already includes apps, games, movies, and TV shows—is going to include books in the Creators Update. This is according to pictures obtained by MSPoweruser . Based on images from an internal Windows 10 Mobile build, books will have their own dedicated section within the Store. The whole process will work much the same way as it does for any other purchase. It appears that Microsoft is not building a dedicated reading application for these purchases. Instead, the Edge browser in the Creators Update has been updated to include support for EPUB books, affording some customization of their appearance in the browser’s reading mode. This isn’t Microsoft’s first foray into the electronic book world. Long, long ago it had an app called Reader, which supported a proprietary HTML-based format. Reader was developed for Pocket PC and Windows Mobile, and notably, it was in Reader that Microsoft first used ClearType sub-pixel anti-aliasing. A Reader app was also available for desktop Windows, though not Windows Phone. The company even had its own online catalog of e-books using its proprietary format, which linked to third-party sites actually selling the books. Read 2 remaining paragraphs | Comments

View article:
Windows is getting its own built-in book store in the Creators Update

Obama pardons Stuxnet leak source James Cartwright

Chelsea Manning isn’t the only source of online leaks to get a new lease on life. President Obama has pardoned General James Cartwright, who pleaded guilty to lying to the FBI when it investigated leaks that revealed details of Stuxnet , the US-backed malware that sabotaged Iran’s nuclear program . He had denied slipping out classified details to two New York Times reporters (including book author David Sanger) in a 2012 interview with the Bureau, only to be caught out later on. He had been facing up to 5 years in prison and was due to be sentenced the same day as the pardon. At the moment, it’s not certain why Cartwright is receiving the pardon. He was the Vice Chairman of the Joint Chiefs of Staff from his nomination in 2007 through to his retirement from Marine Corps service in 2011, but he wasn’t Obama’s golden boy. Cartwright was denied the top Chairman spot in 2011 in part because of questions surrounding his staff management practices, including an alleged (though never punished) “unduly familiar relationship” with a female Captain. One theory is that the outgoing White House administration wants to put a lid on discussion of Stuxnet. The Washington Post claimed that the investigation into Cartwright ran aground when officials realized they might have to confirm details of the malware in order to secure a conviction. That would have been particularly problematic at the time, when the US was negotiating the eventual Iranian nuclear shutdown agreement — did it really want to admit to a cyberattack at such a critical moment? We wouldn’t rule out any motivations at this point, but the guilty plea and pardon might spare the government from disclosing secrets. Via: Charlie Savage (Twitter) Source: White House

More:
Obama pardons Stuxnet leak source James Cartwright

Check Out the Evolution of the US Dollar Bill

The US one dollar bill is still old school. In fact, it has the oldest design of all US currency being produced today. So that means it doesn’t have the flashy tech, or the colorful hues, or the wild looks that have leaked into the redesigns of the more valuable banknotes. But that doesn’t mean it hasn’t changed. Just… Read more…

Read the original:
Check Out the Evolution of the US Dollar Bill