A ‘Roomba’ for weeds

The inventor of the Roomba robot vacuum, Joe Jones, has come up with something new: a solar-powered weeding robot called the Tertill. It will patrol your home garden daily looking for weeds to cut down. How does it know what’s a weed and what’s a plant? Tertill has a very simple method: weeds are short, plants are tall. A plant tall enough to touch the front of Tertill’s shell activates a sensor that makes the robot turn away. A plant short enough to pass under Tertill’s shell, though, activates a different sensor that turns on the weed cutter. Get your own weed-killing robot for $249 through the Tertill’s Kickstarter . ( Business Insider )

See the original article here:
A ‘Roomba’ for weeds

A Chinese vitamin MLM cult is replacing healthcare for poor Ugandans

Uganda is so poor that few can afford medical care, giving it one of the lowest life-expectancies on the planet — this toxic combination made the country ripe for infiltration by Tiens, a Chinese Multi-Level-Marketing “nutritional supplements” cult whose members set up fake medical clinics that diagnose fake ailments and proscribe fake medicines, then rope patients into becoming cult recruiters who convince their friends to sign up for the cult. (more…)

Read this article:
A Chinese vitamin MLM cult is replacing healthcare for poor Ugandans

How the CIA infects air-gapped networks

Enlarge / A configuration screen found in the Drifting Deadline exploit. (credit: WikiLeaks ) Documents published Thursday purport to show how the Central Intelligence Agency has used USB drives to infiltrate computers so sensitive they are severed from the Internet to prevent them from being infected. More than 150 pages of materials published by WikiLeaks describe a platform code-named Brutal Kangaroo that includes a sprawling collection of components to target computers and networks that aren’t connected to the Internet. Drifting Deadline was a tool that was installed on computers of interest. It, in turn, would infect any USB drive that was connected. When the drive was later plugged into air-gapped machines, the drive would infect them with one or more pieces of malware suited to the mission at hand. A Microsoft representative said none of the exploits described work on supported versions of Windows. The infected USB drives were at least sometimes able to infect computers even when users didn’t open any files. The so-called EZCheese exploit, which was neutralized by a patch Microsoft appears to have released in 2015, worked anytime a malicious file icon was displayed by the Windows explorer. A later exploit known as Lachesis used the Windows autorun feature to infect computers running Windows 7. Lachesis didn’t require Explorer to display any icons, but the drive of the drive letter the thrumbdrive was mounted on had to be included in a malicious link. The RiverJack exploit, meanwhile, used the Windows library-ms function to infect computers running Windows 7, 8, and 8.1. Riverjack worked only when a library junction was viewed in Explorer. Read 4 remaining paragraphs | Comments

See original article:
How the CIA infects air-gapped networks

Unexpected Viking toilet discovery leads to controversy

Museum Southeast Denmark Archaeologists excavating at an ancient Viking settlement in southeast Denmark thought they were dealing with a typical country town from the Middle Ages. Then a single toilet changed everything. Museum of Southeastern Denmark archaeology researcher Anna Beck was digging up what she thought was a semi-subterranean workshop, only to find that she was knee-deep in… yeah, you guessed it. She’d found a layer of medieval poop. Read 7 remaining paragraphs | Comments

See the original article here:
Unexpected Viking toilet discovery leads to controversy