Drone collides with US Army helicopter, puts 1.5“ dent in rotor

A DJI Phantom 4 at a launch event in 2016. (credit: Ron Amadeo) On September 21, 2017, just as dusk fell, Vyacheslav Tantashov launched his DJI Phantom 4 drone from a spot near Dyker Beach Park in Brooklyn, just southeast of the Verrazano-Narrows Bridge. Tantashov wanted to see some spectacular views, he said, and he flew the drone nearly 280 feet up in the air and well out of his line of sight. The drone hovered over the shipping channel near Hoffman Island, some 2.5 miles from the launch site. Tantashov maneuvered the craft a bit, watching the images displayed on his Samsung tablet, and then punched the “return to home” button. The drone, which had a rapidly dying battery, made a beeline back toward the launch site. But it never arrived. After waiting 30 minutes, Tantashov assumed there had been a mechanical malfunction and that the drone had fallen into the water. He returned home. On September 28, Tantashov received a call at work. It was an investigator from the National Transportation Safety Board (NTSB), calling to asking if Tantashov was the owner of a Phantom 4 drone. He was, he said, though he had lost it recently near the Verrazano Bridge. Read 15 remaining paragraphs | Comments

More:
Drone collides with US Army helicopter, puts 1.5“ dent in rotor

Canada’s new radio telescope starts mapping the universe

On September 7th, an extraordinarily powerful radio telescope in Canada has begun listening to the sounds of the universe. The Canadian Hydrogen Intensity Mapping Experiment or CHIME will help scientists learn more about the history of the cosmos, radio bursts from pulsars and gravitational waves, the ripples in spacetime whose existence were finally confirmed by scientists in 2016. CHIME looks like a collection of four 100-meter-long skateboarding halfpipes, but they weren’t made for anybody to skate on. They were built over the past seven years to hear very weak signals from the universe and to gather one terabyte of information per second all day, every day. That means it’s constantly creating and updating a massive 3D map of space. When the 50 Canadian scientists from the University of British Columbia, the University of Toronto, McGill University and the National Research Council of Canada (NRC) started conceptualizing the project, there was no system that could handle that amount of information. Thanks to advances in video game hardware, the system now exists. Since 1 TB per second is pretty insane, CHIME compresses the info it gathers by a factor of 100, 000 first before saving files on disks. Now that it’s up and working, CHIME is ready to work towards achieving its primary goal: measuring the acceleration of the universe’s expansion. An accurate measurement of the expansion will help scientists figure out what causes it, whether it’s actually the mysterious form of energy that’s believed to be permeating space called ” dark energy ” or something else. By extension, the telescope’s data could one day confirm if dark energy truly exists. University of British Columbia’s Dr. Mark Halpern explains: “With the CHIME telescope we will measure the expansion history of the universe and we expect to further our understanding of the mysterious dark energy that drives that expansion ever faster. This is a fundamental part of physics that we don’t understand and it’s a deep mystery. This is about better understanding how the universe began and what lies ahead.” Source: CHIME

Read this article:
Canada’s new radio telescope starts mapping the universe

Leaked memo says hackers may have compromised UK power plants

State-sponsored hackers have “probably compromised” the UK’s energy industry. A leaked memo from the National Cybersecurity Centre (NCSC) identifies links “from multiple UK IP addresses to infrastructure associated with advanced state-sponsored hostile threat actors.” These threats are “known to target the energy and manufacturing sectors, ” the document says. The memo, obtained by Motherboard and verified by a number of sources, goes on to say that as a result of these connections, “a number of industrial control system engineering and services organisations are likely to have been compromised.” The NCSC has neither confirmed nor denied the authenticity of the memo. However, in a statement given to the BBC it said: “We are aware of reports of malicious cyber-activity targeting the energy sector around the globe … We are liaising with our counterparts to better understand the threat and continue to manage any risks to the UK.” The leaked memo follows claims that Russian hackers have tried to infiltrate America’s nuclear power industry via phishing emails, as well as allegations that Ireland’s Electricity Supply Board has been targeted by groups with links to the Kremlin. These reports appear to be connected, suggesting there may be a large-scale effort brewing to identify vulnerabilities in global energy industry. It appears that despite the hack no actual damage has been done, but we’ve seen the consequences of cyberattacks on critical infrastructure — this development will no doubt call into question the effectiveness of national security once again. Via: The Guardian Source: Motherboard

Taken from:
Leaked memo says hackers may have compromised UK power plants

US Cyber Command may be splitting off from the NSA

It sounds as though the United States’ Cyber Command will break off from the National Security Agency and be more aligned with the military in the future. The move would “eventually” cleave Cyber Command from the intelligence-focused NSA and instead align it more with the military, according to the Associated Press . “The goal is to give Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, ” AP reports. The NSA’s core task of intelligence gathering sometimes is at odds with military cyber warfare operations, hence the proposed separation. Prior to this, the two had clashed on getting intel from Islamic State networks (the NSA’s task) and attacking (Cyber Command’s). But there are concerns that splitting off from the NSA could come at a cost. Specifically, Cyber Command’s access to the intelligence agency’s resources including some of the top mathematicians in the country and a “gigantic” super computer, according to AP ‘s sources. The moves to start the separation had begun under President Obama, and now the nitty gritty of how the “divorce” (our word) will proceed is up in the air. The result of that is uncertainty over staffing, resources and leadership. Currently both groups are led by the same person, Admiral Mike Rogers , but the shift could see new leadership for the NSA transfer to a civilian. Cyber Command may remain under military leadership under the Army’s Lieutenant General William Mayville. Mayville served as director of operations for the Joint Staff. This comes after the Cyber Command has gained a bigger seat at the table during military operations and an increased focus on using cyber warfare in places like Russia and the Middle East. Source: Associated Press

View the original here:
US Cyber Command may be splitting off from the NSA

Tesla will open ‘2 or 3’ more Gigafactories in the US

It’s no secret that Tesla wants to open Gigafactories around the world to keep up with demand for electric cars and storage batteries , but how many of those will open in the US? Now we know: Elon Musk has confirmed that “2 or 3” additional factories will open in the US over the “next few years.” He’s not offering a firm timetable, to no one’s surprise (the first factory isn’t even finished yet), but the news makes it clearer than ever that Tesla expects plenty of demand . Musk was definitely strategic with the announcement. He was speaking in front of the National Governors Association, which is full of politicians looking for economic opportunities — he’s no doubt hoping that governors will jockey for a Gigafactory (and offer incentives) in their state. At the same time, though, it may be a realistic forecast. Musk expects most new cars in the US to be EVs within 10 years, and to virtually dominate the market in 20. If Tesla doesn’t have enough factories in place, it risks losing business as electric transportation hits the mainstream. The talk also saw Musk weigh in on a few other topics. He’s not opposed to self-driving car regulations , but he believes they should expire as technology evolves. Also, he believes that car security is a high priority. He notes that Tesla cars already have “special encryption” that protects vital systems like the powertrain and brakes, and he’s entertaining the idea of a kill switch (of sorts) that no hacker could touch. Don’t count on governors heeding his regulatory advice, but it won’t be surprising if future Teslas are better-equipped to deal with online threats. Via: Electrek Source: NGA (YouTube)

Follow this link:
Tesla will open ‘2 or 3’ more Gigafactories in the US

Obama reportedly ordered implants to be deployed in key Russian networks

Enlarge (credit: Wikimedia Commons/Maria Joner) In his final days as the 44th president of the United States, Barack Obama authorized a covert hacking operation to implant attack code in sensitive Russian networks. The revelation came in an 8,000-word article The Washington Post published Friday that recounted a secret struggle to punish the Kremlin for tampering with the 2016 election. According to Friday’s article, the move came some four months after a top-secret Central Intelligence Agency report detailed Russian President Vladimir Putin’s direct involvement in a hacking campaign aimed at disrupting or discrediting the presidential race. Friday’s report also said that intelligence captured Putin’s specific objective that the operation defeat or at least damage Democratic candidate Hillary Clinton and help her Republican rival Donald Trump. The Washington Post  said its reports were based on accounts provided by more than three dozen current and former US officials in senior positions in government, most of whom spoke on the condition of anonymity. In the months that followed the August CIA report, 17 intelligence agencies confirmed with high confidence the Russian interference. After months of discussions with various advisors, Obama enacted a series of responses, including shutting down two Russian compounds, sanctioning nine Russian entities and individuals, and expelling 35 Russian diplomats from the US. All of those measures have been known for months. The  Post , citing unnamed US officials, said Obama also authorized a covert hacking program that involved the National Security Agency, the CIA, and the US Cyber Command. According to Friday’s report: Read 1 remaining paragraphs | Comments

Read the article:
Obama reportedly ordered implants to be deployed in key Russian networks

WCry is so mean Microsoft issues patch for 3 unsupported Windows versions

Enlarge (credit: Health Service Journal) A day after a ransomware worm infected 75,000 machines in 100 countries, Microsoft is taking the highly unusual step of issuing patches that immunize Windows XP, 8, and Server 2003, operating systems the company stopped supporting as many as three years ago. The company also rolled out a signature that allows its Windows Defender antivirus engine to provide “defese-in-depth” protection. The moves came after attackers on Friday used a recently leaked attack tool developed by the National Security Agency to virally spread ransomware known as WCry . Within hours, computer systems around the world were crippled, prompting hospitals to turn away patients and telecoms, banks and companies such as FedEx to turn off computers for the weekend. The chaos surprised many security watchers because Microsoft issued an update in March that patched the underlying vulnerability in Windows 7 and most other supported versions of Windows. (Windows 10 was never vulnerable.) Friday’s events made it clear that enough unpatched systems exist to cause significant outbreaks that could happen again in the coming days or months. In a blog post published late Friday night , Microsoft officials wrote: Read 9 remaining paragraphs | Comments

Visit site:
WCry is so mean Microsoft issues patch for 3 unsupported Windows versions

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

More:
‘WannaCry’ ransomware attack spreads worldwide (update)

WCry is so mean Microsoft issues patch for 3 unsupported Windows versions

Enlarge (credit: Health Service Journal) A day after a ransomware worm infected 75,000 machines in 100 countries, Microsoft is taking the highly unusual step of issuing patches that immunize Windows XP, 8, and Server 2003, operating systems the company stopped supporting as many as three years ago. The company also rolled out a signature that allows its Windows Defender antivirus engine to provide “defese-in-depth” protection. The moves came after attackers on Friday used a recently leaked attack tool developed by the National Security Agency to virally spread ransomware known as WCry . Within hours, computer systems around the world were crippled, prompting hospitals to turn away patients and telecoms, banks and companies such as FedEx to turn off computers for the weekend. The chaos surprised many security watchers because Microsoft issued an update in March that patched the underlying vulnerability in Windows 7 and most other supported versions of Windows. (Windows 10 was never vulnerable.) Friday’s events made it clear that enough unpatched systems exist to cause significant outbreaks that could happen again in the coming days or months. In a blog post published late Friday night , Microsoft officials wrote: Read 9 remaining paragraphs | Comments

Read the original:
WCry is so mean Microsoft issues patch for 3 unsupported Windows versions

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

Original post:
‘WannaCry’ ransomware attack spreads worldwide (update)