How Etak Built a Car Navigation System In 1985

harrymcc writes: Thirty years ago, a startup called Etak released the Navigator, an in-car navigation system. It provided turn-by-turn driving directions despite the fact that GPS did not exist, and stored its maps–which Etak had to create itself–on cassette tapes. And some of its data and technologies are still in use in today’s navigation apps. Over at Fast Company, Benj Edwards tells this amazing story. I remember reading about (and lusting over) this system back then, in the much-missed DAK catalog. Read more of this story at Slashdot.

Taken from:
How Etak Built a Car Navigation System In 1985

NIST Workshop Explores Automated Tattoo Identification

chicksdaddy writes: Security Ledger reports on a recent NIST workshop dedicated to improving the art of automated tattoo identification. It used to be that the only place you’d commonly see tattoos was at your local VA hospital. No more. In the last 30 years, body art has gone mainstream. One in five adults in the U.S. has one. For law enforcement and forensics experts, this is a good thing; tattoos are a great way to identify both perpetrators and their victims. Given the number and variety of tattoos, though, how to describe and catalog them? Clearly this is an area where technology can help, but it’s also one of those “fuzzy” problems that challenges the limits of artificial intelligence. The National Institute of Standards and Technology (NIST) Tattoo Recognition Technology Challenge Workshop challenged industry and academia to work towards developing an automated image-based tattoo matching technology. Participating organizations in the challenge used a FBI -supplied dataset of thousands of images of tattoos from government databases. They were challenged to develop methods for identifying a tattoo in an image, identifying visually similar or related tattoos from different subjects; identifying the same tattoo image from the same subject over time; identifying a small region of interest that is contained in a larger image; and identifying a tattoo from a visually similar image like a sketch or scanned print. Read more of this story at Slashdot.

More:
NIST Workshop Explores Automated Tattoo Identification

Linux 4.1 Kernel Released With EXT4 Encryption, Performance Improvements

An anonymous reader writes: The Linux 4.1 kernel has been announced and its release brings expanded features for the Linux kernel including EXT4 file-system encryption, open-source GeForce GTX 750 support, performance improvements for Intel Atom / Bay Trail hardware, RAID 5/6 improvements, and other additions. Read more of this story at Slashdot.

Read more here:
Linux 4.1 Kernel Released With EXT4 Encryption, Performance Improvements

‘Brain-to-Text’ Interface Types Thoughts of Epileptic Patients

Jason Koebler writes with a link to Motherboard’s article about research from the Schalk Lab of Albany, New York, where researchers “have just demonstrated for the first time that it’s possible to turn a person’s thoughts into a legible phrase using what they’re calling a “brain-to-text” interface, ” writing “It’s still still the early days of this technology—electrodes had to be placed directly on the brain and the ‘dictionary’ of phrases was limited. Still, brainwaves of thought patterns were turned into text at a rate much better than chance.” Read more of this story at Slashdot.

Read More:
‘Brain-to-Text’ Interface Types Thoughts of Epileptic Patients

‘Warm Neptune’ Exoplanets May Have Lots of Helium

An anonymous reader writes: Phil Plait reports on new research into exoplanets that came to an unexpected and non-obvious conclusion. Throughout the galaxy, astronomers have been finding exoplanets they call “warm Neptunes” — bodies about the size of Neptune, but which orbit their parent star more closely than Mercury orbits the Sun. When astronomers looked at spectra for these planets, they found something surprising: no methane signature (PDF). Methane is made of carbon and hydrogen, and it’s generally assumed that most large, gaseous planets will have a lot of hydrogen. But this class of exoplanet, being significantly smaller than, say, Jupiter, may not have the mass (and thus the gravity) to hold on to its hydrogen when it’s heated by the close proximity to the star. The result is that the atmosphere may be largely made up of helium instead. If so, the planet would look oddly colorless to our eyes, very unlike the planets in our solar system. Read more of this story at Slashdot.

Read More:
‘Warm Neptune’ Exoplanets May Have Lots of Helium

Why So Many Robots Struggled With the DARPA Challenge

stowie writes: The DARPA Robots Challenge concluded recently, and three teams were given prizes for completing all the tasks. The other robots in the competition struggled — not only were they unable to complete the required tasks, many of them were unable to even stay standing the entire time. So why did these robots have such a hard time? “DARPA deliberately degraded communications (low bandwidth, high latency, intermittent connection) during the challenge to truly see how a human-robot team could collaborate in a Fukushima-type disaster. And there was no standard set for how a human-robot interface would work. So, some worked better than others. The winning DRC-Hubo robot used custom software designed by Team KAIST that was engineered to perform in an environment with low bandwidth. It also used the Xenomai real-time operating system for Linux and a customized motion control framework. The second-place finisher, Team IHMC, used a sliding scale of autonomy that allowed a human operator to take control when the robot seemed stumped or if the robot knew it would run into problems.” If nothing else, the competition’s true legacy may lie in educating the public on the realistic capabilities of high-tech robots. Read more of this story at Slashdot.

See the original post:
Why So Many Robots Struggled With the DARPA Challenge

Ransomware Creator Apologizes For "Sleeper" Attack, Releases Decryption Keys

colinneagle writes: Last week, a new strain of ransomware called Locker was activated after having been sitting silently on infected PCs. Security firm KnowBe4 called Locker a “sleeper” campaign that, when the malware’s creator “woke it up, ” encrypted the infected devices’ files and charged roughly $24 in exchange for the decryption keys. This week, an internet user claiming to be the creator of Locker publicly apologized for the campaign and appears to have released the decryption keys for all the devices that fell victim to it, KnowBe4 reported in an alert issued today. Locker’s creator released this message in a PasteBin post, along with a link to a file hosted on Mega.co containing the decryption keys. The malware creator also said that an automatic decryption process for all devices that were affected by Locker will begin June 2nd. However, the post did not mention anything about providing a refund to victims who paid the 0.1 bitcoin (equal to $22.88 at the time this was posted and about $24 last week) required for the decryption keys since last week. KnowBe4 CEO Stu Sjouwerman says the files released do not appear to be malicious after brief analysis, and that “it does contain a large quantity of RSA keys and Bitcoin addresses.” But he warned those interested to only open these files “at your own risk until further analyses are performed.” Sjouwerman speculated that the malware creator may have been spooked by attention from law enforcement or Eastern European organized crime syndicates that are behind most ransomware campaigns. Read more of this story at Slashdot.

More:
Ransomware Creator Apologizes For "Sleeper" Attack, Releases Decryption Keys

Anonymous Accused of Running a Botnet Using Thousands of Hacked Home Routers

An anonymous reader writes: Taking advantage of lazy security, new research says Anonymous hacktivists (among other groups) hijacked thousands of routers using remote access and default login credentials. “‘For perpetrators, this is like shooting fish in a barrel, which makes each of the scans that much more effective, ‘ the report explains. ‘Using this botnet also enables perpetrators to execute distributed scans, improving their chances against commonplace blacklisting, rate-limiting and reputation-based defense mechanisms.'” Read more of this story at Slashdot.

See the article here:
Anonymous Accused of Running a Botnet Using Thousands of Hacked Home Routers

Report: Microsoft Considering Salesforce Acquisition

An anonymous reader writes: Bloomberg reports that Microsoft is considering making a bid for CRM and cloud software company Salesforce, after hearing that Salesforce was entertaining an offer from another company. No talks are underway, but Salesforce has started working with investment banks to figure out how it wants to respond to such offers. Salesforce has a market value of about $50 billion, so any sort of acquisition would be a huge business deal. Read more of this story at Slashdot.

View original post here:
Report: Microsoft Considering Salesforce Acquisition

TeslaCrypt Isn’t All That Cryptic

citpyrc writes: TeslaCrypt, the latest-and-greatest ransomware branch off of the CryptoWall family, claims to the unwitting user that his/her documents are encrypted with “a unique public key generated for this computer”. This coudn’t be farther from truth. In actuality, the developers of this malware appear to have been lazy and implemented encryption using symmetric AES256 with a decryption key generated on the user’s machine. If any of your machines are afflicted, Talos has developed a tool that can be used to generate the user’s machine’s symmetric key and decrypt all of the ransomed files. Read more of this story at Slashdot.

See original article:
TeslaCrypt Isn’t All That Cryptic