Snail turned into living battery, should have taken the blue pill

You know how those mad scientists at DARPA are obsessed with generating power from insects? A team from Clarkson University, New York and Ben-Gurion University, Israel has gone one better by turning a Snail into a cybernetic power generator. A pair of Buckypaper electrodes were charged by the electro-chemical reactions in the slow-moving invertebrates “hemolymph,” its equivalent to blood. Its hoped the Snails will provide a sustainable way to power listening devices for the Department of Homeland Security, so if you suddenly find your crawlspace full of gastropods, be careful what you say.

[Image credit: American Chemical Society]

Snail turned into living battery, should have taken the blue pill originally appeared on Engadget on Wed, 14 Mar 2012 11:14:00 EDT. Please see our terms for use of feeds.

Permalink Digg | sourceJACS | Email this | Comments

Originally posted here:
Snail turned into living battery, should have taken the blue pill

Looking For iPad, Police Find 750 Pounds of Meth


An anonymous reader writes “Hot on the trail of a stolen iPad using the ‘Find my iPad’ feature in iOS, Police in San Jose tracked the stolen device back to an apartment complex where they then stumbled onto 750 pounds of meth. All told, the meth is worth about $35 million on the street. The seizure was one of the largest drug busts in recent memory.”


Share on Google+

Read more of this story at Slashdot.

Link:
Looking For iPad, Police Find 750 Pounds of Meth

New Internet Explorer 10 memory protection features not just for Internet Explorer



After last week’s pwn2own and pwnium contests, browser security is, once more, a hot topic. The existence of flaws in browsers is nowadays taken for granted: what security researchers are most interested in is the mitigation techniques browsers use to try to render those flaws harmless. Microsoft published a recent blog post discussing some of the new mitigation techniques that will be used in Internet Explorer 10.

The post first addresses existing anti-exploitation measures already used by Internet Explorer. These are a mix of compile-time techniques—Microsoft’s compiler injects code to detect some buffer overflows, for example—and runtime techniques—such as the “Data Execution Prevention” that makes it harder to exploit buffer overflows.

Read the rest of this article...

Read the comments on this post


More:
New Internet Explorer 10 memory protection features not just for Internet Explorer

Encyclopædia Britannica’s 2010 edition to be its last



The 244-year-old Encyclopedia Britannica will be going out of print this year, abdicating to the likes of Google and Wikipedia. Most adults will remember looking up information in the IRL knowledge-base’s volumes, but the iconic encyclopedia only represents 1 percent of the company’s total sales today. Britannica traditionally published a new set of tomes every 2 years, but the company decided that the 2010 version (which costs $1,400) will be the final edition. Britannica will sell its remaining 4,000 copies of the encyclopedia, and then end its run.

The company will still sell its online version at a subscription price of $70 per year (there’s also an app version that will put you out $2 per month) but even that only accounts for 15 percent of Britannica’s revenue. The other 85 percent comes from the company’s sales of educational products like its online learning tools. Britannica says it may start offering more free information to muster subscribers.

The books were originally printed in Scotland in 1768. Since then, 7 million bound sets have been sold. The company’s president, Jorge Cauz, said the company will throw a party for itself on Wednesday to celebrate the changes with a “cake in the shape of a print set,” according to CNN Money.

Personally, as a kid, I loved Encyclopedia Britannica. My dad’s 1960’s edition had my favorite entry, the one for “Frog” showing the different layers of a dissected frog on transparent layers. Feel free to share your favorite entry (if you have one, naturally) below.

Read the comments on this post

See the original post:
Encyclopædia Britannica’s 2010 edition to be its last

Firefox 11 (Finally) Adds Add-On Sync, Solves Add-On Compatibility Issues [Firefox]

Windows/Mac/Linux: The latest version of Firefox is available for download, and with it comes the ability to synchronize your extensions across desktops and operating systems with add-on sync (after an eternity of waiting). Firefox 11 is in line with Mozilla’s new Chrome-like rapid-release schedule, and aside from a few new developer tools, add-on sync is the only major new feature available in the new version. More »


Read the original post:
Firefox 11 (Finally) Adds Add-On Sync, Solves Add-On Compatibility Issues [Firefox]

The Scary Consequences of A Lost Smartphone

If you’re one of those people who tend to lose their phone shortly after putting it down, then you’ll want to read this. According to a new study, if you lose your smartphone, you have a 50/50 chance of getting it back. But chances are much higher — nearly 100 percent — that whoever retrieves it will try to access your private information and apps.

According to a study by Symantec, 96 percent of people who picked up the lost phones tried to access personal or business data on the device. In 45 percent of cases, people tried to access the corporate email client on the device.

“This finding demonstrates the high risks posed by an unmanaged, lost smartphone to sensitive corporate information,” according to the report. “It demonstrates the need for proper security policies and device/data management.”

Symantec called the study the “Honey Stick Project.” In this case the honey on a stick consisted of 50 smartphones that were intentionally left in New York, Los Angeles, Washington, D.C., San Francisco and Ottowa, Canada. The phones were deposited in spots that were easy to see, and where it would be plausible for someone to forget them, including food courts and public restrooms.

None of the phones had security features, like passwords, to block access. Each was loaded with dummy apps and files that contained no real information, but which had names like “Social Networking” and “Corporate Email” that made it easy for the person who found it to understand what each app did. Each phone also was loaded with programs to track what finders did with the devices, and to send that information to the researchers.

Among people who found the phones, 72 percent tried to access photos, 57 percent tried to open a file called “Saved Passwords,” and 43 percent tried to open an app called “Online Banking.” Most of the apps on the phones were protected by passwords, but the username and password fields were already filled out, so that users could simply press a button to access them. Well over half of the people who discovered the phones, 66 percent, clicked those buttons to try and start the programs. The fact that the finders had to click a button to access the apps indicates that their attempts were likely intentional.

“This might be considered to be an unethical access attempt,” according to the study. Also disturbing, only half the people who found the phones ever tried to contact the rightful owner, even though the owner’s phone number and email address were prominently listed in the phones’ contact lists. “This finding highlights the fact that in many cases, regaining possession of lost device may be a losing battle,” according to the study.

If this sends shivers down your spine, here are some tips for how to protect yourself:

–Always protect your phone with a password or a “draw to unlock” pattern.

–Use security software designed specifically for smartphones to lock up programs on your phone. Some of these programs can be used to help locate the phone, or to wipe its memory from remote locations.

–Don’t lose your cell phone. This falls under the category of “Well, duh.” Nobody loses a smartphone on purpose, obviously. But try to make sure you keep it in you pocket or purse when not in use.

–Companies that issue phones to their employees should make sure to train workers on security, and should secure every phone with passwords.

This article originally appeared on Credit.com.


Excerpt from:
The Scary Consequences of A Lost Smartphone

Critical Windows bug could make worm meat of millions of high-value machines



Microsoft has plugged a critical hole in all supported versions of Windows that allows attackers to hit high-value computers with self-replicating attacks that install malicious code with no user interaction required.

The vulnerability in the Remote Desktop Protocol is of particular concern to system administrators in government and corporate settings because they often use the feature to remotely trouble-shoot e-mail servers, point-of-sale terminals and other machines when they experience problems. RDP is also the default way to manage Windows machines that connect to Amazon’s EC2 and other cloud services. That means potentially millions of endpoints are at risk of being hit by a powerful computer worm that spreads exponentially, similarly to the way exploits known as Nimda and Code Red did in 2001.

Read the rest of this article...

Read the comments on this post

View original post here:
Critical Windows bug could make worm meat of millions of high-value machines

Dell Announces Intent To Acquire SonicWALL

New submitter iroc_eater writes with news of an announcement from Dell that it plans to acquire SonicWall, a security services provider.
“SonicWall’s technology detects and protects networks from intrusions and malware attacks, and helps protect data. Dell is buying services and software businesses as the PC market faces competition from smartphones and tablets. Last month, the company hired CA Inc. Chief Executive Officer John Swainson to oversee the software push, and today he said security is an important part of that strategy. ‘My goal is to make software a meaningful part of Dell’s overall portfolio, so that means that this is not the last thing you’re going to see from us,’ Swainson said.”


Share on Google+

Read more of this story at Slashdot.

Read more here:
Dell Announces Intent To Acquire SonicWALL

TVShack Creator's US Extradition Approved

chrb writes “British student Richard O’Dwyer, creator of the TVShack website, has had his extradition to the United States approved by Conservative Home Secretary Theresa May. Mr. O’Dwyer now has 14 days to appeal the decision. The extradition was requested by the U.S. Immigration and Customs Enforcement agency, which has accused O’Dwyer of aiding copyright infringement by publishing links to pirated content hosted on external sites.”


Share on Google+

Read more of this story at Slashdot.

View the original here:
TVShack Creator's US Extradition Approved

Pink Street Lights Deter Loitering Youths … by Making Their Acne Look Bad!

Tired
of gangs of loitering youths detering customers at a local shopping district,
the city of Cardiff, Wales, decided to call in the big guns – the big, pink,
glowing ones:

Anti-social behaviour on a Cardiff estate could be tackled by the
installation of pink lighting to show up teenagers’ acne.

The idea would be to deter yobs at a parade of shops in the city’s
Fairwater district where five arrests have been made and 18 Asbos issued
in six weeks. […]

The glow from lighting is said to unflattering to teenage complexions.

Apparently, this is what to do when weaponizing
Mozart
isn’t enough: Link
– via News
of the Weird

Read this article:
Pink Street Lights Deter Loitering Youths … by Making Their Acne Look Bad!