U.S. Indicts 7 Iranians Accused of Hacking U.S. Financial Institutions

An anonymous reader quotes a report from NPR: The U.S. Department of Justice has indicted seven Iranians with intelligence links over a series of crippling cyberattacks against 46 U.S. financial institutions between 2011 and 2013. The indictment, which was unsealed Thursday, also accuses one of the Iranians of remotely accessing the control system of a small dam in Rye, N.Y, during the same period. Attorney General Loretta Lynch said the indictment is meant to send a message: “That we will not allow any individual, group, or nation to sabotage American financial institutions or undermine the integrity of fair competition in the operation of the free market.” According to the indictment, the seven men worked for two Iran-based computer security companies that have done work for the Iranian government, including the powerful Islamic Revolutionary Guard Corps. The men allegedly carried out large-scale distributed denial of service (DDoS) attacks, which overwhelm a server with communications in order to disable it. Read more of this story at Slashdot.

More:
U.S. Indicts 7 Iranians Accused of Hacking U.S. Financial Institutions

Angola’s Wikipedia Pirates Are Exposing Loopholes in Zero Rating

Reader Jason Koebler quotes a Motherboard article: Wikimedia and Facebook have given Angolans free access to their respective websites, but not to the rest of the internet. So, naturally, Angolans have taken to hiding pirated movies and music in Wikipedia articles and are also sharing links to these files on Facebook, creating a totally free and clandestine file sharing network in a country where mobile internet data is extremely expensive. It’s undeniably a creative use of two services that were designed to give people in the developing world some access to the internet. But now that Angolans are causing headaches for Wikipedia editors and the Wikimedia Foundation, no one is sure what to do about it. Read more of this story at Slashdot.

Read More:
Angola’s Wikipedia Pirates Are Exposing Loopholes in Zero Rating

NVIDIA Announces New Quadro M6000 With 24GB Memory Buffer For Heavy Workloads

Reader MojoKid writes: Some might say there’s no such thing as a one-size-fits-all solution when it comes to computing, and that’s especially true for workstation graphics professionals who need varying levels of performance and memory space. For that reason, NVIDIA is now offering a version of its Quadro M6000 graphics card with 24GB of GDDR5 memory, twice as much memory as much as the original model. According to NVIDIA, customers rendering datasets larger than 12GB can experience up to 5X faster performance compared to the previous Quadro M6000. Like the 12GB version, the new 24GB Quadro M6000 is based on NVIDIA’s Maxwell architecture. It has 3, 072 CUDA cores, a 384-bit memory bus, four DisplayPort 1.2 connectors, a single DVI-I connectors, and a maximum power consumption rating of 250W. In addition to the doubling the memory buffer, NVIDIA added a few other features, including more GPU clock options, greater software temperature control to keep the GPU temp below the point where throttling occurs, and a new under-power boot message if the card is ever under powered. Read more of this story at Slashdot.

Read More:
NVIDIA Announces New Quadro M6000 With 24GB Memory Buffer For Heavy Workloads

Radio Attack Lets Hackers Steal 24 Different Car Models

An anonymous reader writes from a Wired article: A group of German vehicle security researchers has released new findings about the extent of a wireless key hack, and their work ought to convince hundreds of thousands of drivers to keep their car keys next to their Pudding Pops. The Munich-based automobile club ADAC recently made public a study it had performed on dozens of cars to test a radio ‘amplification attack’ that silently extends the range of unwitting drivers’ wireless key fobs to open cars and even start their ignitions (in German). The ADAC researchers say that 24 different vehicles from 19 different manufacturers were all vulnerable, allowing them to not only reliably unlock the target vehicles but also immediately drive them away. “This clear vulnerability in [wireless] keys facilitates the work of thieves immensely, ” reads the post. “The radio connection between keys and car can easily be extended over several hundred meters, regardless of whether the original key is, for example, at home or in the pocket of the owner.” Here’s the full list of vulnerable vehicles from their findings, which focused on European models: the Audi A3, A4 and A6, BMW’s 730d, Citroen’s DS4 CrossBack, Ford’s Galaxy and Eco-Sport, Honda’s HR-V, Hyundai’s Santa Fe CRDi, KIA’s Optima, Lexus’s RX 450h, Mazda’s CX-5, MINI’s Clubman, Mitsubishi’s Outlander, Nissan’s Qashqai and Leaf, Opel’s Ampera, Range Rover’s Evoque, Renault’s Traffic, Ssangyong’s Tivoli XDi, Subaru’s Levorg, Toyota’s RAV4, and Volkswagen’s Golf GTD and Touran 5T. Read more of this story at Slashdot.

See the original article here:
Radio Attack Lets Hackers Steal 24 Different Car Models

Cinema-Quality Unity Engine ‘Adam’ Demo Claims To Run Real-Time On GeForce GTX 980

MojoKid writes: This week at GDC 2016 the team at Unity revealed their stable release of the Unity 5.3.4 game engine along with a beta of Unity 5.4. There are a number of upgrades included with Unity 5.4 including in-editor artist workflow improvements, VR rendering pipeline optimizations, improved multithreaded rendering, customizable particles which can use Light Probe Proxy Volumes (LPPV) to add more realistic lighting models and the ability to drop in textures from tools like Quixel DDo Painter. But for a jaw-dropping look at what’s possible with the Unity 5.4 engine, check out the short film “Adam” that Unity has developed to demo it. The film showcases all of Unity Engine 5.4’s effects and gives a great look at what to expect from Unity-based games coming in 2016. Unity will showcase the full film at Unite Europe 2016 in Amsterdam. But what’s most impressive about Adam perhaps is that Unity says that this is all being run in real-time at 1440p resolution on just an upper-midrange GeForce GTX 980 card. Read more of this story at Slashdot.

Taken from:
Cinema-Quality Unity Engine ‘Adam’ Demo Claims To Run Real-Time On GeForce GTX 980

Get Ready For The New iPad

 Rumor has it that Apple is about to introduce a successor to the iPad Air 2 at next week’s press conference. According to 9to5mac’s Mark Gurman, the device could move away from the $499 entry-level price. Next week’s 9.7-inch iPad could start at $599 with 32GB of storage. Read More

More here:
Get Ready For The New iPad

5 Major Hospital Hacks: Horror Stories From the Cybersecurity Frontlines

the_newsbeagle writes: We don’t often get insider accounts of hacks against major institutions like hospitals because they immediately go into damage control mode. But at a SXSW talk, a couple of experts told tales out of school. The experts, [John Halamka, CIO of the Boston hospital Beth Israel Deaconness, and Kevin Fu, a University of Michigan engineering professor, recounted incidents in which hackers downloaded patient X-rays to China, took down entire networks, fooled Harvard doctors, and more. Read more of this story at Slashdot.

Read More:
5 Major Hospital Hacks: Horror Stories From the Cybersecurity Frontlines

DOJ Threatens To Seize iOS Source Code

An anonymous reader writes from an article posted on iDownloadBlog: The DoJ is demanding that Apple create a special version of iOS with removed security features that would permit the FBI to run brute-force passcode attempts on the San Bernardino shooter’s iPhone 5c. Meanwhile, President Barack Obama has made public where he stands on the Apple vs. FBI case, which has quickly become a heated national debate. In the court papers, DoJ calls Apple’s rhetoric in the San Bernardino standoff as “false” and “corrosive” because the Cupertino firm dared suggest that the FBI’s court order could lead to a “police state.” Footnote Nine of DoJ’s filing reads: For the reasons discussed above, the FBI cannot itself modify the software on the San Bernardino shooter’s iPhone without access to the source code and Apple’s private electronic signature. The government did not seek to compel Apple to turn those over because it believed such a request would be less palatable to Apple. If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple programmers. As Fortune’s Philip-Elmer DeWitt rightfully pointed out, that’s a classic police threat. “We can do this [the] easy way or the hard way. Give us the little thing we’re asking for — a way to bypass your security software — or we’ll take [the] whole thing: your crown jewels and the royal seal too, ” DeWitt wrote. “With Apple’s source code, the FBI could, in theory, create its own version of iOS with the security features stripped out. Stamped with Apple’s electronic signature, the Bureau’s versions of iOS could pass for the real thing, ” he added. Read more of this story at Slashdot.

Read the article:
DOJ Threatens To Seize iOS Source Code

Autonomous Cars? How About Autonomous Bikes?

R3d M3rcury writes: So we’ve all heard about the brave new world of autonomous cars which will be at our beck-and-call. But how about an autonomous bike? The i-Bike (not to be confused with the iBike computer) is the winner of KPIT Sparkle 2016, the All India Science and Engineering Student Contest. It started off as a bicycle suitable for use by people with disabilities. If you could use a smartphone, you could ride a bike. But the developers realized that this could be part of a bike-sharing system. You could rent a bike at the train station, ride to work, and then have the bike automatically return to the train station for the next person. Of course, the obvious question is: Will the bike stop at stop signs? Read more of this story at Slashdot.

More:
Autonomous Cars? How About Autonomous Bikes?