Printable A3-sized solar cells hit a new milestone in green energy

Victorian Organic Solar Cell Consortium Imagine a future where solar panels speed off the presses, like newspaper. Australian scientists have brought us one step closer to that reality. Researchers from the Victorian Organic Solar Cell Consortium (VICOSC) have developed a printer that can print 10 meters of flexible solar cells a minute. Unlike traditional silicon solar cells, printed solar cells are made using organic semi-conducting polymers, which can be dissolved in a solvent and used like an ink, allowing solar cells to be printed. Not only can the VICOSC machine print flexible A3 solar cells, the machine can print directly on to steel, opening up the possibility for solar cells to be embedded directly into building materials. Read 7 remaining paragraphs | Comments

See original article:
Printable A3-sized solar cells hit a new milestone in green energy

Mac malware signed with Apple ID infects activist’s laptop

F-Secure Stealthy Mac OS X spyware that was digitally signed with a valid Apple Developer ID has been detected on the laptop of an Angolan activist attending a human rights conference, researchers said. The backdoor, which is programmed to take screenshots and send them to remote servers under the control of the attackers, was spread using a spear phishing e-mail , according to privacy activist Jacob Appelbaum. Spear phishing is a term for highly targeted e-mails that address the receiver by name and usually appear to come from someone the receiver knows. The e-mails typically discuss topics the two people have talked about before. According to AV provider F-Secure, the malware was discovered during a workshop showing freedom of speech activists how to secure their devices against government monitoring. The malware was signed with a valid Apple Developer ID  allowing it to more easily bypass the Gatekeeper feature Apple introduced in the Mountain Lion version of OS X. If it’s not the first time Mac malware has carried such a digital assurance, it’s certainly among the first. Both F-Secure and Appelbaum said the backdoor, identified as OSX/KitM.A, is new and previously unknown. For its part, AV provider Intego said the malware is a variant of a previously seen trojan known as OSX/FileSteal. Intego continued: Read 3 remaining paragraphs | Comments

See more here:
Mac malware signed with Apple ID infects activist’s laptop

Steam players can now earn coupons for new games by playing old ones

A profile decked out with the spoils of a trading card collection. Cool, but go back to the part about coupons? Steam Steam will release a new beta feature within its service called Steam Trading Cards according to  an announcement from the company. The trading cards integrate with a handful of Valve titles at launch, and players that collect the cards will be able to use them to earn coupons as well as profile backgrounds and other items to augment their Steam experience. The launch titles that will generate trading cards to collect include Don’t Starve, Dota 2, Counter-Strike: Global Offensive, Team Fortress 2, Portal 2 and Half-Life 2 . When players get a particular set of cards they can craft them into a game badge to get “marketable items” like emoticons, profile backgrounds, and coupons for things like game discounts or DLC. The badges can then be upgraded, or “leveled up,” by collecting the same set again. The info page states that half of any card set is dropped during game play while the other half is “earned through collecting prowess.” Badges contribute to a player’s “Steam Level,” and as that number rises players get account-bound items including extra friend list slots. Read 1 remaining paragraphs | Comments

See more here:
Steam players can now earn coupons for new games by playing old ones

Critical Linux vulnerability imperils users, even after “silent” fix

Wikipedia For more than two years, the Linux operating system has contained a high-severity vulnerability that gives untrusted users with restricted accounts nearly unfettered “root” access over machines, including servers running in shared Web hosting facilities and other sensitive environments. Surprisingly, most users remain wide open even now, more than a month after maintainers of the open-source OS quietly released an update that patched the gaping hole. The severity of the bug, which resides in the Linux kernel’s “perf,” or performance counters subsystem, didn’t become clear until Tuesday, when attack code exploiting the vulnerability became publicly available (note: some content on this site is not considered appropriate in many work environments). The new script can be used to take control of servers operated by many shared Web hosting providers, where dozens or hundreds of people have unprivileged accounts on the same machine. Hackers who already have limited control over a Linux machine—for instance, by exploiting a vulnerability in a desktop browser or a Web application—can also use the bug to escalate their privileges to root. The flaw affects versions of the Linux kernel from 2.6.37 to 3.8.8 that have been compiled with the CONFIG_PERF_EVENTS kernel configuration option. “Because there’s a public exploit already available, an attacker would simply need to download and run this exploit on a target machine,” Dan Rosenberg, a senior security researcher at Azimuth Security , told Ars in an e-mail. “The exploit may not work out-of-the-box on every affected machine, in which case it would require some fairly straightforward tweaks (for someone with exploit development experience) to work properly.” Read 4 remaining paragraphs | Comments

Link:
Critical Linux vulnerability imperils users, even after “silent” fix

VMware’s dual-persona smartphones phones finally available to purchase

The first two phones to run VMware’s dual-persona software. VMware At long last, VMware’s dual-persona software for smartphones is available on actual devices. Today, VMware and Verizon Wireless announced that the Android-based LG Intuition and Motorola Razr M can now be purchased with VMware’s Horizon Mobile software, which separates the device into isolated partitions that keep a user’s work applications and data separate from personal stuff. VMware began promising virtualized smartphones in 2010 , claiming they would be available for sale in 2011. Samsung promised to support VMware’s virtualized phone vision in September 2011, and VMware started promising virtualization for iPhones and iPads in August 2012. We called it ” vaporware .” Samsung and Apple devices still aren’t running the dual-persona software, but it’s nice to see VMware phones finally materialize. VMware and Verizon said the Intuition and Razr M are immediately available for sale with Horizon Mobile software. Perpetual licenses to Horizon Mobile start at $125 per user and “can be purchased through local resellers of VMware and Verizon Wireless,” the companies said. Read 5 remaining paragraphs | Comments

See more here:
VMware’s dual-persona smartphones phones finally available to purchase

The British ‘Atlantis’ is mapped in detail

Dunwich Beach Sutterstock A professor of physical geography has put together the most detailed map yet of the sunken medieval town of Dunwich using underwater acoustic imagining. The port town, often referred to as “the British Atlantis,” was a hub of activity up until its collapse in the 1400s. This was brought about after a series of epic storms battered the coastline in the 1200s and 1300s, causing repeated flooding, submerging parts of the town, and flooding the harbor and river with silt. Today it stands as a small village, but up until its demise it was around the same size as medieval London. Despite still existing at depths of just three to 10 meters (or, 9.8 ft to 32.8 ft) below sea level, the murky conditions have made investigating what lies beneath particularly tricky. Since 2010, however, Southampton’s David Sear—along with the GeoData Institute, the National Oceanography Center, Wessex Archaeology, and local divers from North Sea Recovery and Learn Scuba—has been exploring the muddy depths using dual-frequency identification sonar (DIDSON) acoustic imaging. Read 8 remaining paragraphs | Comments

Read More:
The British ‘Atlantis’ is mapped in detail

How hackers allegedly stole “unlimited” amounts of cash from banks in just hours

Wikipedia Federal authorities have accused eight men of participating in 21st-Century Bank heists that netted a whopping $45 million by hacking into payment systems and eliminating withdrawal limits placed on prepaid debit cards. The eight men formed the New York-based cell of an international crime ring that organized and executed the hacks and then used fraudulent payment cards in dozens of countries to withdraw the loot from automated teller machines, federal prosecutors alleged in court papers unsealed Thursday. In a matter of hours on two separate occasions, the eight defendants and their confederates withdrew about $2.8 million from New York City ATMs alone. At the same times, “cashing crews” in cities in at least 26 countries withdrew more than $40 million in a similar fashion. Prosecutors have labeled this type of heist an “unlimited operation” because it systematically removes the withdrawal limits normally placed on debit card accounts. These restrictions work as a safety mechanism that caps the amount of loss that banks normally face when something goes wrong. The operation removed the limits by hacking into two companies that process online payments for prepaid MasterCard debit card accounts issued by two banks—the National Bank of Ras Al-Khaimah PSC in the United Arab Emirates and the Bank of Muscat in Oman—according to an indictment filed in federal court in the Eastern District of New York. Prosecutors didn’t identify the payment processors except to say one was in India and the other in the United States. Read 3 remaining paragraphs | Comments

Taken from:
How hackers allegedly stole “unlimited” amounts of cash from banks in just hours

Obama orders agencies to make data open, machine-readable by default

Alpha.data.gov, an experimental data portal created under the White House’s Open Data Initiative. Data.gov President Barack Obama issued an executive order today that aims to make “open and machine-readable” data formats a requirement for all new government IT systems. The order would also apply to existing systems that are being modernized or upgraded. If implemented, the mandate would bring new life to efforts started by the Obama administration with the launch of Data.gov four years ago. It would also expand an order issued in 2012 to open up government systems with public interfaces for commercial app developers. “The default state of new and modernized Government information resources shall be open and machine readable,” the president’s order reads. “Government information shall be managed as an asset throughout its life cycle to promote interoperability and openness, and, wherever possible and legally permissible, to ensure that data are released to the public in ways that make the data easy to find, accessible, and usable.” The order, however, also requires that this new “default state” protect personally identifiable information and other sensitive data on individual citizens, as well as classified information. Broadening the “open” mandate The president’s mandate was initially pushed forward by former Chief Information Officer of the United States Vivek Kundra. In May of 2009, Data.gov launched with an order that required agencies to provide at least three “high-value data sets” through the portal. Read 6 remaining paragraphs | Comments

Link:
Obama orders agencies to make data open, machine-readable by default

Cray brings top supercomputer tech to businesses for a mere $500,000

A Cray XC30-AC server rack. Cray Cray, the company that built the world’s fastest supercomputer, is bringing its next generation of supercomputer technology to regular ol’ business customers with systems starting at just $500,000. The new XC30-AC systems announced today range in price from $500,000 to roughly $3 million, providing speeds of 22 to 176 teraflops. That’s just a fraction of the speed of the aforementioned world’s fastest supercomputer, the $60 million  Titan , which clocks in at 17.59 petaflops. (A teraflop represents a thousand billion floating point operations per second, while a petaflop is a million billion operations per second.) But in fact, the processors and interconnect used in XC30-AC is a step up from those used to build Titan. The technology Cray is selling to smaller customers today could someday be used to build supercomputers even faster than Titan. Read 19 remaining paragraphs | Comments

View article:
Cray brings top supercomputer tech to businesses for a mere $500,000

German court convicts, sentences BitTorrent site operator to nearly 4 years

A German district court in the western city of Aachen has handed down one of the harshest sentences for abetting copyright infringement: three years and 10 months in prison. The 33-year-old alleged operator of the Russian-hosted torrent.to , who was named only as “Jens. R” in court documents, remains under investigation for fraudulent bankruptcy filings and embezzlement. Other than pleading not guilty, Jens R. did not offer a defense in the case and is expected to appeal. Like similar sites, such as the Pirate Bay, the defendant was accused of selling ads against links to torrent files. Read 5 remaining paragraphs | Comments

Read More:
German court convicts, sentences BitTorrent site operator to nearly 4 years