Scientists grow functional kidney organoid from stem cells

A drawing shows the complex structure of a kidney. (credit: Wikimedia commons ) There are many diseases that attack specific organs, landing patients on a transplant list. Unfortunately, our bodies have markers that identify an organ as “self,” which makes it difficult to find an organ match. Many individuals die waiting for an organ transplant because a match can’t be found. Research on stem cells—a type of cell that is able to transform into nearly any cell type—has raised hopes of treating organ failure. Researchers envision using these cells to grow fully functional organs. A functional organ is similar to a machine. Organs contain many interacting parts that must be positioned in a specific configuration to work properly. Getting all the right cell types in the appropriate locations is a real challenge. Recently, a team of scientists has met that challenge by using stem cells to grow a tissue, termed an organoid, that resembles a developing kidney. Read 8 remaining paragraphs | Comments

Continue reading here:
Scientists grow functional kidney organoid from stem cells

Cage against the EMP: New composite cases protect against the electro-apocalypse

A Faraday Cases travel case, configured to keep communications gear safe in transit from unfriendly electromagnetism. 2 more images in gallery WASHINGTON, DC—A small company from Utah has developed a composite material that combines carbon fibers with a nickel coating. The result is an extremely lightweight electric-conducting material with the properties of plastic. And now that material is being used to create cases and computer enclosures that are essentially lightweight Faraday cages—containing electromagnetic radiation from digital devices and shielding them from electronic eavesdropping or electromagnetic pulse attacks. Ars got a brief hands-on with some of the materials at the Association of the United States Army expo this week. The company, Conductive Composites , is now selling cases built with the Nickel Chemical Vapor Deposition (NiCVD) composite material through its Faraday Cases division . The cases range in size from suitcase-sized units for carrying smaller digital devices to wheeled portable enclosures that can house servers—providing what is essentially an EMP-shielded portable data center. The cases and enclosures are being marketed not just to the military but to consumers, corporations, and first responders as well. The materials used in Faraday Cases can also be used to create ultra-lightweight antennas, satellite communications reflector dishes, and hundreds of other things that currently need to be made with conductive metal. And they could be a boon to anyone trying to prevent electronic eavesdropping—be it through active wireless bugs, radio retroreflectors used by nation-state intelligence agencies, or passive surveillance through anything from Wi-FI hacking to electromagnetic signals leaking from computer cables and monitors. And in some cases, they could make it possible to create the kind of secure spaces used by government agencies to prevent eavesdropping nearly anywhere. Read 9 remaining paragraphs | Comments

View article:
Cage against the EMP: New composite cases protect against the electro-apocalypse

New zero-day exploit hits fully patched Adobe Flash [Updated]

Update on October 14 at 1:15pm PDT: Adobe officials have confirmed this vulnerability affects Flash version 19.0.0.207 , which was released on Tuesday. The vulnerability has been cataloged as CVE-2015-7645. The company expects to release a fix next week. Attackers are exploiting a previously unknown vulnerability in fully patched versions of Adobe’s Flash Player so they can surreptitiously install malware on end users’ computers, security researchers warned Tuesday. So far, the attacks are known to target only government agencies as part of a long-running espionage campaign carried out by a group known as Pawn Storm, researchers from antivirus provider Trend Micro said in a blog post published Tuesday . It’s not unusual for such zero-day exploits to be more widely distributed once the initial element of surprise wanes. The critical security flaw is known to reside in Flash versions 19.0.0.185 and 19.0.0.207 and may also affect earlier versions. At this early stage, no other technical details are available. The researchers wrote: Read 3 remaining paragraphs | Comments

See more here:
New zero-day exploit hits fully patched Adobe Flash [Updated]

Toyota 2050 plans to cut CO2 from its new cars by 90 percent

Earlier today, Toyota unveiled a bold new plan for the company’s sustainability efforts. By the year 2050, it plans to have cut CO 2 emissions from its new cars by 90 percent (compared to 2010). Toyota also wants to completely eliminate CO 2 pollution from new car manufacturing, as well as over the entire lifecycle of a car including its recycling. These are bold goals. The company says it will build off the success of its Prius hybrids to cut vehicle emissions. Advanced hybrid powertrains will be a big research focus, and the company even gave a shout-out to silicon carbide supercapacitors. In addition, big things are planned for hydrogen. The Japanese government has been incentivizing its car industry to work with fuel cells, and road cars are starting to appear. The Toyota Mirai is already in production and coming to America, even if the fueling stations it will depend upon are few and far between. Completely eradicating CO 2 from the production and recycling of new cars is an equally big challenge. The company wants all its production factories to have zero emissions, in part through renewable energy and fuel cells. And it has goals to promote recycling and conservation around the world. More specifics are included in Toyota’s new environmental action plan —its sixth so far—which runs from 2016-2020. That means it will be a few years before we can judge if Toyota’s commitment to the environment is succeeding. Read on Ars Technica | Comments

Visit site:
Toyota 2050 plans to cut CO2 from its new cars by 90 percent

University of Cambridge study finds 87% of Android devices are insecure

The study’s estimate of the proportion of known “insecure,” “maybe secure” and “secure” devices over time. (credit: androidvulnerabilities.org ) It’s easy to see that the Android ecosystem currently has a rather lax policy toward security, but a recent study from the University of Cambridge put some hard numbers to Android’s security failings. The conclusion finds that “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.” Data for the study was collected through the group’s ” Device Analyzer ” app, which has been available for free on the Play Store since May 2011. After the participants opted into the survey, the University says it collected daily Android version and build number information from over 20,400 devices. The study then compared this version information against 13 critical vulnerabilities (including the Stagefright vulnerabilities ) dating back to 2010. Each individual device was then labeled “secure” or “insecure” based on whether or not its OS version was patched against these vulnerabilities, or placed in a special “maybe secure” category if it could have gotten a specialized, backported fix. As for why so many Android devices are insecure, the study found that most of the blame sits with OEMs. The group states that “the bottleneck for the delivery of updates in the Android ecosystem rests with the manufacturers, who fail to provide updates to fix critical vulnerabilities.” Along with the study, the University of Cambridge is launching ” AndroidVulnerabilities.org ,” a site that houses this data and grades OEMs based on their security record. The group came up with a 1-10 security rating for OEMs that it calls the “FUM” score. This algorithm takes into account the number of days a proportion of running devices has no known vulnerabilities ( F ree), the proportion of devices that run the latest version of Android ( U pdate), and the mean number of vulnerabilities not fixed on any device the company sells ( M ean). The study found that Google’s Nexus devices were the most secure out there, with a FUM score of 5.2 out of 10. Surprisingly, LG was next with 4.0, followed by Motorola, Samsung, Sony, and HTC, respectively. Read 3 remaining paragraphs | Comments

Read the article:
University of Cambridge study finds 87% of Android devices are insecure

How Soviets used IBM Selectric keyloggers to spy on US diplomats

(credit: Etan J. Tal ) A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world’s first keylogger—a 1970s bug that Soviet spies implanted in US diplomats’ IBM Selectric typewriters to monitor classified letters and memos. The electromechanical implants were nothing short of an engineering marvel. The highly miniaturized series of circuits were stuffed into a metal bar that ran the length of the typewriter, making them invisible to the naked eye. The implant, which could only be seen using X-ray equipment, recorded the precise location of the little ball Selectric typewriters used to imprint a character on paper. With the exception of spaces, tabs, hyphens, and backspaces, the tiny devices had the ability to record every key press and transmit it back to Soviet spies in real time. A “lucrative source of information” The Soviet implants were discovered through the painstaking analysis of more than 10 tons’ worth of equipment seized from US embassies and consulates and shipped back to the US. The implants were ultimately found inside 16 typewriters used from 1976 to 1984 at the US embassy in Moscow and the US consulate in Leningrad. The bugs went undetected for the entire eight-year span and only came to light following a tip from a US ally whose own embassy was the target of a similar eavesdropping operation. Read 7 remaining paragraphs | Comments

Read the original post:
How Soviets used IBM Selectric keyloggers to spy on US diplomats

Webflow’s “first visual CMS” is like WordPress mixed with Photoshop

A demo video showing off Webflow CMS. Web design tools like Webflow have done a lot to thin the line between designers and developers. Now, however, the birthed-by-Y-Combinator startup wants to take it further with what it describes as the world’s first visual content management system (CMS). There’s not much to it right now. In a nutshell, Webflow CMS is a barebones WordPress installation jammed into a Photoshop-like interface. The idea here is to provide a way to create “completely custom websites powered by dynamic content” without any knowledge of HTML, CSS, PHP, or databases. And to an extent, it works. The Webflow CMS allows users to create or use pre-existing “Collections”—templates for dynamic content types. From there, you can then determine the kind of fields associated with the Collection, such as whether they’re mandatory to be completed, if they’re to be linked to another Collection, and what kind of minimum word counts are to be expected. These criteria are universal for any instance of the Collection. All Blog Posts, for example, will draw from the parent Blog Posts Collection. Read 4 remaining paragraphs | Comments

Continue reading here:
Webflow’s “first visual CMS” is like WordPress mixed with Photoshop

Sprint offers $2.1 billion to acquire the rest of Clearwire

As most observers  expected , Sprint has finally made a formal offer to acquire the rest of Clearwire. On Thursday, Sprint said it would pay $2.1 billion for the remaining 49.7 percent of Clearwire that it does not currently control. As we reported yesterday , the move is widely seen as a play for Sprint to acquire Clearwire’s valuable 2.5 GHz spectrum, which it would use to offer LTE and strengthen its position against Verizon and AT&T. The bid works out to $2.90 per share—higher than the company’s closing price on Wednesday—but analysts say the offer may not be good enough. Read 2 remaining paragraphs | Comments

Read more here:
Sprint offers $2.1 billion to acquire the rest of Clearwire

Los Angeles schools reach $6.4 million settlement with Apple, Lenovo

(credit: Brad Flickinger ) Last week, the Los Angeles Unified School District (LAUSD) reached a settlement with Apple and Lenovo over a conflict involving software from curriculum provider Pearson. Although the conflict involves Pearson and LAUSD primarily, the curriculum provider was a subcontractor under Apple and Lenovo, so the settlement is between the hardware companies and LAUSD, the Los Angeles Times reports . Apple has agreed to pay LAUSD $4.2 million for the Pearson curriculum, and Lenovo, which also charged the school district for Pearson curriculum, will give the school district $2.2 million in credit for its purchase of laptops. Last year, LAUSD halted the $1.3 billion project to give every student in the massive district an iPad loaded with Pearson’s educational material. The about-face was announced after the Los Angeles Times reported that there had been improprieties in the bidding process for the contract with the school district. In December, the FBI opened an investigation into the iPad program and seized 20 boxes of documents from the LAUSD, just as the school district’s superintendent resigned. Four months later, LAUSD said it would no longer accept shipments of Pearson’s curriculum, and it added that it wanted a “multi-million dollar refund” for copies of Pearson’s software that had already been delivered. Read 2 remaining paragraphs | Comments

View post:
Los Angeles schools reach $6.4 million settlement with Apple, Lenovo

iOS 9’s space-saving “app slicing” disabled for now, will return in future update

Enlarge / Apple’s sample universal binary here is just 60 percent of its original size when downloaded to an iPad or iPhone. (credit: Andrew Cunningham) Back in June, we wrote a bit about App Thinning , a collection of iOS 9 features that are supposed to make iOS 9 apps take up less space on iDevices. Apple has just announced to developers that one of those features, “app slicing,” is not available in current iOS 9 versions due to an iCloud bug. It will be re-enabled in a future iOS update after the bug has been resolved. App slicing ensures that your iDevice only downloads the app assets it needs to work. In older versions of iOS, all devices downloaded “universal” versions of apps that included all of the assets those apps needed to work on each and every targeted iDevice. If you downloaded an app to your iPhone 5, for example, it could include larger image assets made for the larger-screened iPhones 6 and 6 Plus, 64-bit code that its 32-bit processor couldn’t use, and Metal graphics code that its GPU didn’t support. That’s all wasted space, a problem app slicing was designed to resolve. Apple says the iCloud bug affects users who are restoring backups to new devices—if you moved from that iPhone 5 to a new iPhone 6S, for example, iCloud would restore iPhone 5-compatible versions of some apps without the assets required by the newer, larger device. Read 1 remaining paragraphs | Comments

View post:
iOS 9’s space-saving “app slicing” disabled for now, will return in future update