Russians Pull Chelyabinsk Meteorite From Lake, Promptly Break It

Divers working in Lake Chebarkul in central Russia have pulled up a 1, 255 lb. (570 kg) chunk of rock they suspect is the meteorite that wreaked havoc above Chelyabinsk earlier this year. But as they were putting it on the scale, it collapsed into three different pieces. Read more…        

See the article here:
Russians Pull Chelyabinsk Meteorite From Lake, Promptly Break It

How to Set Up the Ultimate Personal Google Maps

Google Maps is constantly getting updated with new features, but the use of those features isn’t always obvious. If you find yourself using Google Maps just to get from address to address, you’re missing out on a ton of the ways Google makes it easier to get around. Here’s how to really use those personalization options to your advantage. Read more…        

View post:
How to Set Up the Ultimate Personal Google Maps

A Major Breakthrough in Bringing the Sense of Touch to Prosthetic Limbs

Prosthetic limbs have gotten more lifelike — and also more useful — recently. But how do you let people feel what they’re touching? Recently, scientists have developed a number of supersensitive artificial skins, but the goal of restoring sensation has remained elusive. That is, until now. Read more…        

Read More:
A Major Breakthrough in Bringing the Sense of Touch to Prosthetic Limbs

This Insane Six-Axis 3D Printer Even Works On Curved Surfaces

Still upset about breaking the handle on your favorite mug? A 3D printer can make it as good as new, and thanks to researchers at the University of Southern California, the process is even easier now since they’ve developed a printer that can build directly on curved surfaces. Read more…        

Read this article:
This Insane Six-Axis 3D Printer Even Works On Curved Surfaces

D-Link Router Backdoor Vulnerability Allows Full Access To Settings

StealthHunter writes “It turned out that just by setting a browsers user-agent to ‘xmlset_roodkcableoj28840ybtide’ anyone can remotely bypass all authentication on D-Link routers. It seems that thttpd was modified by Alphanetworks who inserted the backdoor. Unfortunately, vulnerable routers can be easily identified by services like shodanHQ. At least these models may have vulnerable firmware: DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, TM-G5240.” Read more of this story at Slashdot.

Visit site:
D-Link Router Backdoor Vulnerability Allows Full Access To Settings

Production has wrapped on the final episodes of Star Wars: The Clone Wars.

Production has wrapped on the final episodes of Star Wars: The Clone Wars . Showrunner Dave Filoni has announced on Facebook that the episodes will be released in early 2014. Read more…        

Read More:
Production has wrapped on the final episodes of Star Wars: The Clone Wars.

Bob Orci is reportedly talking to CBS about a new Star Trek TV series

Take this with a reasonably sized grain of salt, but Sky News Entertainment reporter Joe Michalczuk says that Star Trek movie co-writer and producer Roberto Orci has discussed bringing the franchise back to TV with CBS. Read more…        

Read more here:
Bob Orci is reportedly talking to CBS about a new Star Trek TV series

Scientists Found the Remains of a Water-Covered Earth-Like Planet

A team of astrophysicists have made an exciting however complex discovery a mere 170 light years away. In their own words , it’s “the first evidence of a water-rich rocky planetary body” outside of our own solar system to have evidence of water. It’s the “rocky” bit that makes it Earth-like. Read more…        

See the original article here:
Scientists Found the Remains of a Water-Covered Earth-Like Planet

How The NSA Deploys Malware

We’ve long suspected that the NSA, the world’s premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it’s important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there. Read more…        

See the article here:
How The NSA Deploys Malware