Tesla makes its first Model 3 (update: picture!)

After months of waiting and no shortage of hype , Tesla’s first Model 3 is finally rolling off the production line. Elon Musk has revealed that the initial production unit is ready (not pictured as of this writing) pending a “final checkout.” Musk will get the first car, as he has with earlier models, but he didn’t call dibs — while Ira Ehrenpreis was the first to plunk down a full deposit, he gave that spot to Musk as a birthday present. It’s safe to say that either would be part of an exclusive club given that a mere 30 Model 3s will reach buyers by the end of July. It’s not certain just how much has changed on the Model 3 since it was unveiled back in 2016. You likely won’t get the full scoop on that until a handover party scheduled for July 28th. However, Musk has already hinted that there shouldn’t be any dramatic changes versus the release candidate prototypes that appeared in March. The past few months have largely been spent tweaking and testing components to ensure the Model 3 is ready for the road. It’s a largely symbolic announcement when most Model 3 pre-order customers won’t even get their vehicles until 2018. Production is only slated to ramp up to 20, 000 cars per month by December, which hardly puts a dent in the hundreds of thousands of reservations made since last spring. With that said, you really are looking at the start of Tesla’s next chapter. Musk and crew can now say they’re producing EVs aimed at the mainstream (albeit the higher end), not just a subset of the luxury car crowd. Production unit 1 of Model 3 is now built and going through final checkout. Pics soon. — Elon Musk (@elonmusk) July 9, 2017 Update (7/9): As promised, Musk just tweeted the above picture of the first production Model 3. First Production Model 3 pic.twitter.com/TCa2NSUNI3 — Elon Musk (@elonmusk) July 9, 2017 Source: Elon Musk (Twitter) , (2)

Read More:
Tesla makes its first Model 3 (update: picture!)

Japan is getting a Final Fantasy XIV-inspired live-action TV drama

When you hear the term “live action Final Fantasy TV drama, ” you probably imagine something akin to Game of Thrones . But don’t get your hopes up too much. Final Fantasy XIV: Daddy of Light is actually an upcoming Japanese TV drama that centers on the relationship between a father and son playing the popular MMO, reports Kotaku . It’s based on a series of blog posts by a Japanese gamer who played FFXIV with his 60-year-old father, and it’s also apparently the first time Final Fantasy has inspired a live action show. The series will also incorporate in-game segments from the MMO when it launches in April, so fans will still be able to get their Chocobo fix. Via: Kotaku Source: Model Press

See the original article here:
Japan is getting a Final Fantasy XIV-inspired live-action TV drama

Sustainable Leather Grown from Mushrooms!

A San-Francisco-based company called MycoWorks has made an incredible advance in materials: They can now grow leather from the mycelium in mushrooms, using a process that’s renewable, CO2-negative and customizable. That latter part means they can predetermine what the leather looks like—cow, elephant skin, snakeskin—and most intriguingly, can grow it to any size! The company claims that the material “feels and performs like leather, ” being “strong, flexible and durable, just like conventional leathers. It is also water-resistant.” Furthermore, they state that their production process “takes a fraction of the time and resources…compared to processes for making leather from animal hides.” Green credentials aside, I think what’s most fascinating is the fact that they can grow it in large sheets. When selecting hides, all leatherworkers must live with the limitations of a cow’s body; with that obstacle removed, I think that once the right designer gets their hands on this stuff, we’ll see some truly spectacular, large-scale leather creations that could not be produced the conventional way.

Originally posted here:
Sustainable Leather Grown from Mushrooms!

20-year-old Windows bug lets printers install malware—patch now

Enlarge (credit: Vectra Networks) For more than two decades, Microsoft Windows has provided the means for clever attackers to surreptitiously install malware of their choice on computers that connect to booby-trapped printers, or other devices masquerading as printers, on a local area network. Microsoft finally addressed the bug on Tuesday during its monthly patch cycle. The vulnerability resides in the Windows Print Spooler, which manages the process of connecting to available printers and printing documents. A protocol known as Point-and-Print allows people who are connecting to a network-hosted printer for the first time to automatically download the necessary driver immediately before using it. It works by storing a shared driver on the printer or print server and eliminates the hassle of the user having to manually download and install it. Researchers with security firm Vectra Networks discovered that the Windows Print Spooler doesn’t properly authenticate print drivers when installing them from remote locations. The failure makes it possible for attackers to use several different techniques that deliver maliciously modified drivers instead of the legitimate one provided by the printer maker. The exploit effectively turns printers, printer servers, or potentially any network-connected device masquerading as a printer into an internal drive-by exploit kit that infects machines whenever they connect. Read 9 remaining paragraphs | Comments

Continue reading here:
20-year-old Windows bug lets printers install malware—patch now

FDIC was hacked by China, and CIO covered it up

Insuring deposits, but not your identity. Thanks, FDIC. (credit: Matthew G. Bisanz ) A report published by the House Committee on Science, Space and Technology today found that hackers purported to be from China had compromised computers at the Federal Deposit Insurance Corporation repeatedly between 2010 and 2013. Backdoor malware was installed on 12 workstations and 10 servers by attackers—including the workstations of the chairman, chief of staff, and general counsel of FDIC. But the incidents were never reported to the US Computer Emergency Response Team (US-CERT) or other authorities, and were only brought to light after an Inspector General investigation into another serious data breach at FDIC in October of 2015. The FDIC failed at the time of the “advanced persistent threat” attacks to report the incidents. Then-Inspector General at FDIC, Jon Rymer, lambasted FDIC officials for failing to follow their own policies on breach reporting. Further investigation into those breaches led the committee to conclude that former FDIC CIO Russ Pittman misled auditors about the extent of those breaches, and told employees not to talk about the breaches by a foreign government so as not to ruin FDIC Chairman Martin Gruenberg’s chances of confirmation. The cascade of bad news began with an FDIC Office of the Inspector General (OIG) investigation into the October “Florida incident.” On October 23, 2015, a member of the Federal Deposit Insurance Corporation’s Information Security and Privacy Staff (ISPS) discovered evidence in the FDIC’s data loss prevention system of a significant breach of sensitive data—over 1,200 documents, including Social Security numbers from bank data for over 44,000 individuals and 30,715 banks, were copied to a USB drive by a former employee of FDIC’s Risk Management Supervision field office in Gainesville, Florida. The employee had copied the files prior to leaving his position at FDIC. Despite intercepting the employee, the actual data was not recovered from him until March 25, 2016. The former employee provided a sworn statement that he had not disseminated the information, and the matter was dropped. Read 3 remaining paragraphs | Comments

Read More:
FDIC was hacked by China, and CIO covered it up

Windows Server 2016 coming in September, with new servicing for Nano Server

It’s not quite an exact launch date, but Microsoft has announced that both Windows Server 2016 and System Center 2016 will launch at its Ignite conference (the successor to TechEd) this fall. Ignite runs from September 26-30 and is being held in Atlanta, Georgia. Microsoft has also described how Windows Server 2016 will be serviced going forward. Full installations of the operating system—including the GUI and shell—will continue to be serviced on the “5+5” model that Microsoft has used for previous operating systems. That’s five years of mainstream support, during which both bug fixes and feature improvements are made, and then five years of extended support, during which only security bugs will be fixed. The slimmed down Server Core installation will also be given this 5+5 servicing. The new Nano Server option, however, will be handled in a different way. Nano Server installations will be updated more or less in tandem with the Windows 10 Current Branch for Business (CBB) release. CBB trails the main consumer branch by about six months, giving new features a bit of time to receive some real-world testing before being distributed to more conservative organizations. CBB is expected to be updated two to three times a year, and this will apply to Nano Server deployments of Windows Server 2016 just as it does to CBB deployments of Windows 10. Read 3 remaining paragraphs | Comments

View article:
Windows Server 2016 coming in September, with new servicing for Nano Server

Posing as ransomware, Windows malware just deletes victim’s files

Scammers, via Cisco Talos Ranscam’s “ransom note”: Pay us and then we’ll make everything better. 2 more images in gallery There has been a lot of ingenuity poured into creating crypto-ransomware, the money-making malware that has become the scourge of hospitals, businesses, and home users over the past year. But none of that ingenuity applies to Ranscam, a new ransom malware reported by Cisco’s Talos Security Intelligence and Research Group. Ranscam is a purely amateur attempt to cash in on the cryptoransomware trend that demands payment for “encrypted” files that were actually just plain deleted by a batch command. “Once it executes, it, it pops up a ransom message looking like any other ransomware,” Earl Carter, security research engineer at Cisco Talos, told Ars. “But then what happens is it forces a reboot, and it just deletes all the files. It doesn’t try to encrypt anything—it just deletes them all.” Talos discovered the file on the systems of a small number of customers. In every case, the malware presented exactly the same message, including the same Bitcoin wallet address. The victim is instructed: Read 6 remaining paragraphs | Comments

Taken from:
Posing as ransomware, Windows malware just deletes victim’s files

Virulent auto-rooting malware takes control of 10 million Android devices

Security experts have documented a disturbing spike in a particularly virulent family of Android malware, with more than 10 million handsets infected and more than 286,000 of them in the US. Researchers from security firm Check Point Software said the malware installs more than 50,000 fraudulent apps each day, displays 20 million malicious advertisements, and generates more than $300 million per month in revenue. The success is largely the result of the malware’s ability to silently root a large percentage of the phones it infects by exploiting vulnerabilities that remain unfixed in older versions of Android. The Check Point researchers have dubbed the malware family “HummingBad,” but researchers from mobile security company Lookout say HummingBad is in fact Shedun, a family of auto-rooting malware that came to light last November  and had already infected a large number of devices. For the past five months, Check Point researchers have quietly observed the China-based advertising company behind HummingBad in several ways, including by infiltrating the command and control servers it uses. The researchers say the malware uses the unusually tight control it gains over infected devices to create windfall profits and steadily increase its numbers. HummingBad does this by silently installing promoted apps on infected phones, defrauding legitimate mobile advertisers, and creating fraudulent statistics inside the official Google Play Store. Read 7 remaining paragraphs | Comments

Visit site:
Virulent auto-rooting malware takes control of 10 million Android devices

Fossil fuel use in US is at its lowest percentage in over a century

(credit: US EIA ) With the 4th of July weekend about to begin, the US Energy Information Administration decided to look back to our nation’s founding. So it plotted the country’s energy use starting from 1776 . Most of the result isn’t a surprise: biomass had a long run before fossil fuels took over and stayed on top. But recent years have seen the biggest change since nuclear was added to the mix. Biomass spent nearly a century on top of the US energy mix before being displaced by coal, although it never went above providing four quadrillion Btus (each Btu is a bit over 1,000 Joules). But biomass never entirely went away, and its resurgence this century puts it at its highest level ever. With nuclear holding steady and renewables surging to nearly the same level as hydropower, fossil fuels are on the verge of dropping below 80 percent of the US’ energy mix. Fossil fuels haven’t been that low a percentage for over a century. Read 2 remaining paragraphs | Comments

Original post:
Fossil fuel use in US is at its lowest percentage in over a century

Blizzard job posting outs plans for new Diablo game

Is it time to change that “III” into a “IV”? (credit: Blizzard) Just because Blizzard finally got a wholly new franchise out the door this year doesn’t mean the game maker isn’t keen on milking its older franchises for everything they’re worth. But one of those series, Diablo , has seen a bit of a content freeze since its 2014 expansion launched. While the company loves refreshing a game launch with expansion packs, Diablo III has been sitting idly. Now we might know why. A brand-new “unannounced” entry in the Diablo world was, er, announced on Friday by way of an official job posting for—get this—the next entry’s  director . It’s the game-news equivalent of New Line Cinema saying a new Lord of the Rings film is coming but, whoops, Peter Jackson’s not involved, and they could really use a new person to get this thing up and running. The post seeks someone to “lead the Diablo series into the future.” While such a public push for a series director might read like an attempt to bring more diversity into the hiring pool, we’d frankly be shocked to see anybody other than the industry’s old-guard vets fulfilling application requirements such as five years of game-directing experience and shipping “multiple AAA products as a game director or creative director.” The job posting mentions nothing about virtual reality or other experimental hardware. Read 2 remaining paragraphs | Comments

Link:
Blizzard job posting outs plans for new Diablo game