Tesla Will Install More Energy Storage With SolarCity In 2016 Than The US Installed In 2015

An anonymous reader writes: Tesla is scheduled to install more energy storage capacity in 2016 with SolarCity alone than all of the US installed in 2015. It was revealed in a recent filing with the U.S. Securities and Exchange Commission (SEC) that Tesla foresees an almost 10x increase in sales to SolarCity for behind the meter storage. [From the SEC filing: “We recognized approximately $4.9 million in revenue from SolarCity during fiscal year 2015 for sales of energy storage governed by this master supply agreement, and anticipate recognizing approximately $44.0 million in such revenues during fiscal year 2016.”] This revenue projection means Tesla expects to install approximately 116 MWh of behind the meter storage. The U.S. for example installed about 76 MWh of behind the meter storage. SolarCity and Tesla Energy doubled their battery installation volume last year. What’s particularly noteworthy is that the 116 MWh expectation does not include SolarCity’s biggest project — Kauai Island’s coming 52 MWh system. Hawaii is aiming for 100% renewable energy by 2045 and has contracted with SolarCity to balance the two 12MW Solar Power plants with the Kauai Island Utility Cooperative (KIUC). By 2020, there will be 70 GWh of Tesla battery storage on the road, and Straubel expects there to be 10 GWh of controllable load in those cars. Read more of this story at Slashdot.

View article:
Tesla Will Install More Energy Storage With SolarCity In 2016 Than The US Installed In 2015

Over 1M BeautifulPeople Dating Site User Details Leak Online

An anonymous reader writes: Personal information of over one million users stored by popular dating site BeautifulPeople has leaked, and is now accessible online. We already knew that BeautifulPixel.com was hacked (it happened in November 2015), but this is the first confirmation from a security researcher that the details are legitimate. (BeautifulPeople had downplayed it at the time, saying that it was a staging server, and not a production server, that was hacked.) Security researcher Troy Hunt, citing a source, noted that the data has been sold online. The leaked personal information include email addresses, phone numbers, as well as hair color, weight, job and other details.Troy also noted that of the 1.1 million users details, 170 of them have government email addresses. Some of you may remember BeautifulPixel as the creator the “Shrek” virus. Read more of this story at Slashdot.

Read More:
Over 1M BeautifulPeople Dating Site User Details Leak Online

Canadian Police Have Had BlackBerry’s Global Decryption Key Since 2010

Justin Ling and Jordan Pearson, reporting for Vice News: A high-level surveillance probe of Montreal’s criminal underworld shows that Canada’s federal policing agency has had a global encryption key for BlackBerry devices since 2010. The revelations are contained in a stack of court documents that were made public after members of a Montreal crime syndicate pleaded guilty to their role in a 2011 gangland murder. The documents shed light on the extent to which the smartphone manufacturer, as well as telecommunications giant Rogers, cooperated with investigators. According to technical reports by the Royal Canadian Mounted Police that were filed in court, law enforcement intercepted and decrypted roughly one million PIN-to-PIN BlackBerry messages in connection with the probe. The report doesn’t disclose exactly where the key — effectively a piece of code that could break the encryption on virtually any BlackBerry message sent from one device to another — came from. But, as one police officer put it, it was a key that could unlock millions of doors. Government lawyers spent almost two years fighting in a Montreal courtroom to keep this information out of the public record. Motherboard has published another article in which it details how Canadian police intercept and read encrypted BlackBerry messages. “BlackBerry to Canadian court: Please don’t reveal the fact that we backdoored our encryption, ” privacy and security activist Christopher Soghoian wittily summarizes the report. “Canadian gov: If you use Blackberry consumer encryption, you’re a “dead chicken”. Read more of this story at Slashdot.

More:
Canadian Police Have Had BlackBerry’s Global Decryption Key Since 2010

Facebook Messenger Hits 900M Monthly Active Users; To Get Snapchat-Like Features

Facebook, on Thursday, announced that Messenger now has 900 million monthly active users. On the sidelines, the company also announced a couple of Snapchat-like features it is bringing to its messaging client. Alex Health, reporting for Tech Insider: Facebook executive David Marcus said that Messenger will soon let you create profile usernames and web links. The links will look like “m.me/yourusername” and let anyone quickly add you in Messenger without looking up your Facebook account. The usernames and profile links will also be available to businesses, which are starting to use Messenger as a way to deliver customer support and let you buy things through chatting. Every Messenger account will also have a scannable QR code within the app, which is exactly how Snapchat lets people share their profiles with others. Snapchat also recently added the ability to share profiles on the web with public URLs. It is worth noting that earlier this year, Facebook-owned WhatsApp app reached 1 billion monthly active users. Read more of this story at Slashdot.

Read More:
Facebook Messenger Hits 900M Monthly Active Users; To Get Snapchat-Like Features

TSA Paid $1.4 Million For Randomizer App That Chooses Left Or Right

An anonymous reader writes: For those of you who have traveled through U.S. airports in recent years, you may have noticed the Transport Security Administration (TSA) use a Randomizer app to randomly search travelers in the Pre-Check lane. The app randomly chooses whether travelers go left or right in the Pre-Check lane so they can’t predict which lane each person is assigned to and can’t figure out how to avoid the random checks. Developer Kevin Burke submitted a Freedom of Information Act request asking for details about the app. The documents he received reveals the TSA purchased the Randomizer iPad app for $336, 413.59. That’s $336, 413.59 for an app, which is incredibly simple to make as most programming languages of choice have a randomizing function available to use. What may be even more intriguing is that the contract for the TSA Randomizer app was won by IBM. The total amount paid for the project is actually $1.4 million, but the cost is not broken down in Burke’s documents. It’s possible IBM supplied all the iPads and training in addition to the app itself. Read more of this story at Slashdot.

Read More:
TSA Paid $1.4 Million For Randomizer App That Chooses Left Or Right

The Concept Art for Las Vegas’ ‘Mars World’ Looks Nuts

It’s long been said that space tourism will be big business. Whole spaceports have sprung up ( and basically died ) in belief of that economic promise. The problem is that shooting people past our bubble of atmosphere, safely and reliably, is still tricky. Not to mention you need to be rich as hell or dead to even consider it. Read more…

View article:
The Concept Art for Las Vegas’ ‘Mars World’ Looks Nuts

The Government Didn’t Need Apple’s Help Unlocking the San Bernardino iPhone After All

The saga over whether the government should legally be allowed to force Apple to write software to help it unlock seized iPhones may be over soon—or at least the first round. The government has confirmed that it was able to get the data off the iPhone of the San Bernardino shooter Syed Farook without Apple’s help. Read more…

Read More:
The Government Didn’t Need Apple’s Help Unlocking the San Bernardino iPhone After All

Kentucky Hospital Calls State of Emergency In Hack Attack

An anonymous reader quotes a report from CNBC: A Kentucky hospital is operating in an internal state of emergency following an attack by cybercriminals on its computer network, Krebs on Security reported. Methodist Hospital, based in Henderson, Kentucky, is the victim of a ransomware attack in which hackers infiltrated its computer network, encrypted files and are now holding the data hostage, Krebs reported Tuesday. The criminals reportedly used new strain of malware known as Locky to encrypt important files. The malware spread from the initial infected machine to the entire internal network and several other systems, the hospital’s information systems director, Jamie Reid, told Krebs. The hospital is reportedly considering paying hackers the ransom money of four bitcoins, about $1, 600 at the current exchange rate, for the key to unlock the files. Read more of this story at Slashdot.

See more here:
Kentucky Hospital Calls State of Emergency In Hack Attack

U.S. Indicts 7 Iranians Accused of Hacking U.S. Financial Institutions

An anonymous reader quotes a report from NPR: The U.S. Department of Justice has indicted seven Iranians with intelligence links over a series of crippling cyberattacks against 46 U.S. financial institutions between 2011 and 2013. The indictment, which was unsealed Thursday, also accuses one of the Iranians of remotely accessing the control system of a small dam in Rye, N.Y, during the same period. Attorney General Loretta Lynch said the indictment is meant to send a message: “That we will not allow any individual, group, or nation to sabotage American financial institutions or undermine the integrity of fair competition in the operation of the free market.” According to the indictment, the seven men worked for two Iran-based computer security companies that have done work for the Iranian government, including the powerful Islamic Revolutionary Guard Corps. The men allegedly carried out large-scale distributed denial of service (DDoS) attacks, which overwhelm a server with communications in order to disable it. Read more of this story at Slashdot.

More:
U.S. Indicts 7 Iranians Accused of Hacking U.S. Financial Institutions

A Former State Department Employee Is Going to Prison for Twisted Sorority-Girl ‘Sextortion’ Scheme 

A former State Department employee will spend 57 months in prison for a “sextortion” cyberstalking crime that sounds like an SVU sweeps-week plot, only weirder and more awful. Read more…

Original post:
A Former State Department Employee Is Going to Prison for Twisted Sorority-Girl ‘Sextortion’ Scheme