Changing the Earth’s climate by covering the deserts with solar panels

Solar panels in Chile’s Atacama desert. (credit: OPIC.gov ) Currently, the Earth’s inhabitants are consuming about 17.5TeraWatts of power each year. It’s estimated that an aggressive rollout of solar panels could generate at least 400TW, and possibly much, much more. But that would involve paving over a lot of the Earth’s surface with solar panels, in many cases covering relatively reflective sand with dark black hardware. Could this have its own effects on the climate? The answer turns out to be remarkably complex. That’s in part because the panels don’t simply absorb the energy of the light—a fraction of it gets converted to electricity and shipped elsewhere. A team of US and Chinese scientists decided to account for all of this and found out that massive solar installations would cause changes in the climate, but the changes would be minor compared to what we’d see from continued greenhouse gas emissions. The authors created a number of scenarios to tease out the influence of the panels, and they used climate models to examine the changes they drove. The first method involved covering most of the Earth’s deserts and urban areas with solar panels (this would, of course, lead to a ridiculous overproduction of electricity). In a second, the power harvested by these panels was then sent to urban areas and dissipated as heat. Finally, for a somewhat more realistic view, they simply covered most of the deserts of Egypt with panels. Read 5 remaining paragraphs | Comments

Read the original post:
Changing the Earth’s climate by covering the deserts with solar panels

Low-cost IMSI catcher for 4G/LTE networks tracks phone’s precise locations

Enlarge (credit: Shaik, et al. ) Researchers have devised a low-cost way to discover the precise location of smartphones using the latest LTE standard for mobile networks , a feat that shatters widely held perceptions that it’s immune to the types of attacks that targeted earlier specifications. The attacks target the LTE specification , which is expected to have a user base of about 1.37 billion people by the end of the year. They require about $1,400 worth of hardware that run freely available open-source software. The equipment can cause all LTE-compliant phones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates, although such attacks may be detected by savvy phone users. A separate method that’s almost impossible to detect teases out locations to within an area of roughly one square mile in an urban setting. The researchers have devised a separate class of attacks that causes phones to lose connections to LTE networks, a scenario that could be exploited to silently downgrade devices to the less secure 2G and 3G mobile specifications. The 2G, or GSM, protocol has long been known to be susceptible to man-in-the-middle attacks using a form of fake base station known as an IMSI catcher  (like the Stingray). 2G networks are also vulnerable to attacks that reveal a phone’s location within about 0.6 square mile . 3G phones suffer from a similar tracking flaw . The new attacks, described in a research paper published Monday, are believed to be the first to target LTE networks, which have been widely viewed as more secure than their predecessors. Read 12 remaining paragraphs | Comments

See original article:
Low-cost IMSI catcher for 4G/LTE networks tracks phone’s precise locations

First ever online-only NFL game draws over 15 million viewers

(credit: Jaguars.com ) Over the weekend, the NFL and Yahoo streamed the first ever online-only NFL game , a Bills/Jaguars matchup in London. The game was mostly seen as an experiment for the NFL to test the viability of online distribution for a football game. Yahoo seems happy with the turnout, trumpeting 15.2 million unique viewers and 33.6 million total views for the game. The site also claims 33 percent of the streams came from international users. As Deadspin notes, the numbers were seriously pumped up by Yahoo thanks to auto-playing streams on the Yahoo and Tumblr homepages. Anyone who visited either high-traffic homepage counted as a viewer for the game. Still, Yahoo notes that “460 million total minutes” of the game were streamed, which means that each of the 15.2 million viewers hung around for an average of 30 minutes. When the Yahoo/NFL deal was announced, a CNN Money report said that Yahoo paid “at least $10 million” for the rights to the game. The game was available for free online, supported only by advertising. Yahoo promised advertisers 3.5 million viewers in the United States, so things seem to have gone better than expected. Read 4 remaining paragraphs | Comments

See the original article here:
First ever online-only NFL game draws over 15 million viewers

Couple sues Pandora and SiriusXM over copyright in pre-1972 songs

(credit: Getty Images) An Illinois couple who owned several recording companies specializing in doo-wop, jazz, and rhythm and blues have filed suit against the major satellite and Internet radio companies over their playing of pre-1972 songs. It’s the third lawsuit that highlights how the patchwork of state copyright laws over older music is putting a drag on Internet radio—sound recordings made before 1972 aren’t protected by federal copyright but are protected by many states. On Monday, Arthur and Barbara Sheridan filed two lawsuits in New Jersey federal court: one against Pandora and Sirius XM  (PDF) and another against iHeartMedia  (PDF), the parent company of online music service iHeartRadio. Their lawsuits seek class action status, looking to represent owners of pre-1972 songs. The companies have derived “significant benefits,” including “millions of dollars in annual revenue,” by playing those songs without permission, the suit alleges. “The Pre-1972 Recordings, when created, were the novel product of mental labor embodied in material form,” the complaint against Sirius and Pandora states. “Plaintiffs and the Misappropriation Class thus have property rights in them as recognized by New Jersey common law.” Read 4 remaining paragraphs | Comments

More here:
Couple sues Pandora and SiriusXM over copyright in pre-1972 songs

iOS 9.1 release lays groundwork for upcoming Apple TV and iPad Pro

The upcoming iPad Pro will require iOS 9.1 (credit: Andrew Cunningham) Apple has just released iOS 9.1, the first major update to iOS 9 and the third update overall since the OS came out in September. It’s available as an over-the-air download or through iTunes for everything that supports iOS 9: the iPhone 4S or newer, the iPad 2 or newer, all flavors of the iPad Mini, and the fifth- and sixth-generation iPod Touches. The change you’ll notice the most if you do a bunch of texting is that Apple has implemented a bunch of new emoji, mostly from the Unicode 7.0 and 8.0 specs but with a few from earlier specifications mixed in. Tacos, burritos, and extended middle fingers are just a few of the additions you’ll find to the emoji keyboard, which needs a decent search function now more than ever. iOS 9.1 also lays the groundwork for some other iOS devices that are launching soon. One is the new Apple TV, which ships with the iOS-based “tvOS.” The other is the iPad Pro, which brings with it support for the Apple Pencil and its Smart Keyboard cover. The Apple TV ships next week , while the iPad Pro is due sometime in November. Read 2 remaining paragraphs | Comments

Read the article:
iOS 9.1 release lays groundwork for upcoming Apple TV and iPad Pro

New zero-day exploit hits fully patched Adobe Flash [Updated]

Update on October 14 at 1:15pm PDT: Adobe officials have confirmed this vulnerability affects Flash version 19.0.0.207 , which was released on Tuesday. The vulnerability has been cataloged as CVE-2015-7645. The company expects to release a fix next week. Attackers are exploiting a previously unknown vulnerability in fully patched versions of Adobe’s Flash Player so they can surreptitiously install malware on end users’ computers, security researchers warned Tuesday. So far, the attacks are known to target only government agencies as part of a long-running espionage campaign carried out by a group known as Pawn Storm, researchers from antivirus provider Trend Micro said in a blog post published Tuesday . It’s not unusual for such zero-day exploits to be more widely distributed once the initial element of surprise wanes. The critical security flaw is known to reside in Flash versions 19.0.0.185 and 19.0.0.207 and may also affect earlier versions. At this early stage, no other technical details are available. The researchers wrote: Read 3 remaining paragraphs | Comments

See more here:
New zero-day exploit hits fully patched Adobe Flash [Updated]

Toyota 2050 plans to cut CO2 from its new cars by 90 percent

Earlier today, Toyota unveiled a bold new plan for the company’s sustainability efforts. By the year 2050, it plans to have cut CO 2 emissions from its new cars by 90 percent (compared to 2010). Toyota also wants to completely eliminate CO 2 pollution from new car manufacturing, as well as over the entire lifecycle of a car including its recycling. These are bold goals. The company says it will build off the success of its Prius hybrids to cut vehicle emissions. Advanced hybrid powertrains will be a big research focus, and the company even gave a shout-out to silicon carbide supercapacitors. In addition, big things are planned for hydrogen. The Japanese government has been incentivizing its car industry to work with fuel cells, and road cars are starting to appear. The Toyota Mirai is already in production and coming to America, even if the fueling stations it will depend upon are few and far between. Completely eradicating CO 2 from the production and recycling of new cars is an equally big challenge. The company wants all its production factories to have zero emissions, in part through renewable energy and fuel cells. And it has goals to promote recycling and conservation around the world. More specifics are included in Toyota’s new environmental action plan —its sixth so far—which runs from 2016-2020. That means it will be a few years before we can judge if Toyota’s commitment to the environment is succeeding. Read on Ars Technica | Comments

Visit site:
Toyota 2050 plans to cut CO2 from its new cars by 90 percent

University of Cambridge study finds 87% of Android devices are insecure

The study’s estimate of the proportion of known “insecure,” “maybe secure” and “secure” devices over time. (credit: androidvulnerabilities.org ) It’s easy to see that the Android ecosystem currently has a rather lax policy toward security, but a recent study from the University of Cambridge put some hard numbers to Android’s security failings. The conclusion finds that “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.” Data for the study was collected through the group’s ” Device Analyzer ” app, which has been available for free on the Play Store since May 2011. After the participants opted into the survey, the University says it collected daily Android version and build number information from over 20,400 devices. The study then compared this version information against 13 critical vulnerabilities (including the Stagefright vulnerabilities ) dating back to 2010. Each individual device was then labeled “secure” or “insecure” based on whether or not its OS version was patched against these vulnerabilities, or placed in a special “maybe secure” category if it could have gotten a specialized, backported fix. As for why so many Android devices are insecure, the study found that most of the blame sits with OEMs. The group states that “the bottleneck for the delivery of updates in the Android ecosystem rests with the manufacturers, who fail to provide updates to fix critical vulnerabilities.” Along with the study, the University of Cambridge is launching ” AndroidVulnerabilities.org ,” a site that houses this data and grades OEMs based on their security record. The group came up with a 1-10 security rating for OEMs that it calls the “FUM” score. This algorithm takes into account the number of days a proportion of running devices has no known vulnerabilities ( F ree), the proportion of devices that run the latest version of Android ( U pdate), and the mean number of vulnerabilities not fixed on any device the company sells ( M ean). The study found that Google’s Nexus devices were the most secure out there, with a FUM score of 5.2 out of 10. Surprisingly, LG was next with 4.0, followed by Motorola, Samsung, Sony, and HTC, respectively. Read 3 remaining paragraphs | Comments

Read the article:
University of Cambridge study finds 87% of Android devices are insecure

How Soviets used IBM Selectric keyloggers to spy on US diplomats

(credit: Etan J. Tal ) A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world’s first keylogger—a 1970s bug that Soviet spies implanted in US diplomats’ IBM Selectric typewriters to monitor classified letters and memos. The electromechanical implants were nothing short of an engineering marvel. The highly miniaturized series of circuits were stuffed into a metal bar that ran the length of the typewriter, making them invisible to the naked eye. The implant, which could only be seen using X-ray equipment, recorded the precise location of the little ball Selectric typewriters used to imprint a character on paper. With the exception of spaces, tabs, hyphens, and backspaces, the tiny devices had the ability to record every key press and transmit it back to Soviet spies in real time. A “lucrative source of information” The Soviet implants were discovered through the painstaking analysis of more than 10 tons’ worth of equipment seized from US embassies and consulates and shipped back to the US. The implants were ultimately found inside 16 typewriters used from 1976 to 1984 at the US embassy in Moscow and the US consulate in Leningrad. The bugs went undetected for the entire eight-year span and only came to light following a tip from a US ally whose own embassy was the target of a similar eavesdropping operation. Read 7 remaining paragraphs | Comments

Read the original post:
How Soviets used IBM Selectric keyloggers to spy on US diplomats

Webflow’s “first visual CMS” is like WordPress mixed with Photoshop

A demo video showing off Webflow CMS. Web design tools like Webflow have done a lot to thin the line between designers and developers. Now, however, the birthed-by-Y-Combinator startup wants to take it further with what it describes as the world’s first visual content management system (CMS). There’s not much to it right now. In a nutshell, Webflow CMS is a barebones WordPress installation jammed into a Photoshop-like interface. The idea here is to provide a way to create “completely custom websites powered by dynamic content” without any knowledge of HTML, CSS, PHP, or databases. And to an extent, it works. The Webflow CMS allows users to create or use pre-existing “Collections”—templates for dynamic content types. From there, you can then determine the kind of fields associated with the Collection, such as whether they’re mandatory to be completed, if they’re to be linked to another Collection, and what kind of minimum word counts are to be expected. These criteria are universal for any instance of the Collection. All Blog Posts, for example, will draw from the parent Blog Posts Collection. Read 4 remaining paragraphs | Comments

Continue reading here:
Webflow’s “first visual CMS” is like WordPress mixed with Photoshop