Scientists found a way to convert CO2 to ethanol, almost by accident

Filed under:
,,,


They thought it would take a series of reactions to convert CO2 into fuel, but the first step did the job.

Continue reading Scientists found a way to convert CO2 to ethanol, almost by accident

Scientists found a way to convert CO2 to ethanol, almost by accident originally appeared on Autoblog on Wed, 19 Oct 2016 09:20:00 EDT. Please see our terms for use of feeds.

Permalink | 
Email this | 
Comments

from Autoblog http://ift.tt/2dndoh3
via IFTTT

New Rules Would Require Airlines To Refund Baggage Fees For Delayed Luggage


The Obama administration is proposing new rules to address passenger complaints about airline service.

Saul Loeb/AFP/Getty Images


hide caption

toggle caption

Saul Loeb/AFP/Getty Images

The Obama administration is proposing new rules to address passenger complaints about airline service.

Saul Loeb/AFP/Getty Images

Many travelers have resigned themselves to paying $25 or more to check a bag when flying. But that fee becomes especially onerous when the bag doesn’t show up on the carousel at baggage claim.

The White House is proposing a new rule that would require airlines to refund the checked baggage fee if luggage is “substantially delayed,” though it does not define “substantially.”

NPR aviation reporter David Schaper reports airlines are already required to compensate passengers for lost of damaged luggage. Schaper quotes Transportation Secretary Anthony Foxx arguing this next step just makes sense: “If you pay the baggage fee and your bags are not returned to you in a timely manner, you’ve essentially paid for a service you’re not getting.”

The Obama administration is announcing a number of proposed rules today, designed to address common passenger complaints about airline service.

Another target are travel websites which offer comparison ticket shopping. Such websites commonly rank airlines higher or lower based on undisclosed payments or other business incentives.

A new rule proposed by the Transportation Department would require such websites to be neutral “or disclose their bias upfront so consumers can truly comparison shop when booking flights,” Schaper reports.

Another focus of the new rulemaking is airlines’ on-time record. “Major airlines are now only required to disclose on-time performance data for the flights they operate,” reports Schaper. “not those of those small regional partners that the big legacy carriers partner with.”

The new rules will require those regional carriers to also report their on-time performance data.

A spokesperson for the industry group Airlines for America told Schaper that airlines have the same goal of providing quality service, but improvement is already taking place in the marketplace without more government regulation.

“We’ve said for a long time that we think the airline industry is probably the most regulated de-regulated industry you can find and this is another example of it,” said spokesperson Jean Medina.

from NPR Topics: News http://ift.tt/2dq6KC9
via IFTTT

Razer Buys Audio Company THX, But Will Allow It to Operate Independently

Iconic audio company THX has been acquired by Razer. The gaming hardware company announced the news today, though made it clear that it’s allowing THX to keep all of its staff and to run independently with its own operations and business decisions. This includes making deals with other product makers, service providers, and financial partners.

THX was founded by George Lucas in 1983 and was intended to bring a certain level of audio quality to movie theaters. You might be most familiar with the iconic sound that plays before some movies. Razer CEO Min-Liang Tan said that his company "has a vision for innovation at every level of entertainment, a vision which THX has championed since its inception more than 30 years ago."

"This acquisition will allow us to reinforce Razer’s leadership in gaming and extend the brand into broader areas of entertainment, while at the same time empowering THX to develop into a global powerhouse, independently," Tan said.

"The value of THX rests in its bedrock competencies with certification, optimization of audio, and intellectual property development," he continued. "We expect [CEO Ty Ahmad-Taylor, senior VP of audio research Laurie Fincham], and the executive team and employees of THX, who we have also retained, to continue leading the world in innovations and technology in the audiovisual space."

No Caption Provided

Ahmad-Taylor said THX will "continue to service [its] partners in the industry to deliver great products to consumers," while also working with its new parent company on strengthening its "core lines of business."

In other acquisition news, Logitech acquired PC gaming peripheral company Saitek last month. The sale was made for $13 million in cash.

from GameSpot’s PC Reviews http://ift.tt/2efVv0r
via IFTTT

Snapsheet raises $20 million for app to help drivers file claims after a crash

Filed under:
,,,,


Snapsheet aims to help insurance providers process claims more quickly, get their customers paid as soon as possible and back in safe, repaired vehicles.

Continue reading Snapsheet raises $20 million for app to help drivers file claims after a crash

Snapsheet raises $20 million for app to help drivers file claims after a crash originally appeared on Autoblog on Mon, 17 Oct 2016 17:15:00 EDT. Please see our terms for use of feeds.

Permalink | 
Email this | 
Comments

from Autoblog http://ift.tt/2ee8m4p
via IFTTT

Akamai Finds Longtime Security Flaw in 2 Million Devices

It’s well known that the Internet of Things is woefully insecure, but the most shameful and frustrating part is that some of the vulnerabilities that are currently being exploited could have been eradicated years ago. Now evidence of how these bugs are being used in attacks is calling attention to security holes that are long overdue to be plugged.

New research released this week from the content delivery network Akamai takes a closer look at how hackers are abusing weaknesses in a cryptographic protocol to commandeer millions of ordinary connected devices—routers, cable modems, satellite TV equipment, and DVRs—and then coordinate them to mount attacks. After analyzing IP address data from its Cloud Security Intelligence platform, Akamai estimates that more than 2 million devices have been compromised by this type of hack, which it calls SSHowDowN. The company also says that at least 11 of its customers—in industries like financial services, retail, hospitality, and gaming—have been targets of this attack.

The exploited protocol, called Secure Shell (SSH), is commonly used to facilitate remote system access and can be implemented robustly. But many IoT manufacturers either don’t incorporate it or are oblivious to the best practices for SSH when setting up default configurations on their devices. As makers scramble to bring their products to market, these oversights sow widespread insecurity in the foundation of the Internet of Things.

“This is something we’ve known about for a dozen years,” says Martin McKeay, a security advocate at Akamai. “This is a vulnerability that we’ve seen before. It should not be happening. But we’re going to be seeing this more and more as everything gets an IP address and has an administrative interface. These products have to be thought through and protected before they get into the home.”

Akamai says it is working with device vendors to improve their SSH implementation and cites the network video recorder maker NUUO, the satellite antenna maker Intellian, the WiMax router maker Green Packet, the hotspot maker Ruckus, and the network-attached storage device maker Synology as companies that sell one or more products in which it detected SSH flaws. Ruckus published a security advisory in 2013 about the potential to use SSH for “unauthenticated TCP tunneling.” Sudhakar Padala, Ruckus’ senior principal security architect, stated in an email to WIRED that the Akamai warning seems to match the vulnerability Ruckus had “immediately corrected” in 2013. He added, “Akamai did not alert us to this new report. We take all security vulnerabilities extremely seriously.” In its report, Akamai cites Ruckus’s 2013 advisory but adds, “This was one of the affected device types discovered during our research.” Intellian declined to comment. The other companies could not yet be reached for comment.

The Akamai researchers found that hackers have been able to establish unauthorized SSH connections, called “tunnels,” with IoT devices to then route malicious traffic as part of command and control infrastructure. Akamai observed this strategy being used for attacks like credential stuffing, in which attackers set up an automated system for trying to get into customer accounts on a site using credential pairs leaked in previous data breaches.

In one example, Akamai observed hackers using an account called “admin” to authorize an SSH tunnel to a network video recorder. They then used this access to generate and send malicious traffic from the video recorder. Some quick research revealed that the factory-default password for this administrator account was listed publicly as “admin.” From there the hackers were able to access other server communication tools, like the Transmission Control Protocol, and with relatively little effort access and direct the device. Additionally, from a hacker’s perspective, the approach has the added benefit of masking the true source of an attack, since the malicious traffic emanates from the network, and therefore IP address, of the hijacked IoT device.

Akamai has recommendations for manufacturers, like building in prompts for customers to change default administrator credentials, disabling SSH on devices unless it’s specifically needed, and creating ways for devices to easily receive configuration updates. For customers, the company advises changing factory default usernames and passwords when possible, disabling SSH traffic on home networks, and creating firewall restrictions on inbound and outbound SSH access if applicable. But one major concern is that, unlike having your Facebook account hacked, the average person will likely never realize that their IoT devices have been compromised in this way even if it happens to them. “It’s not something most people are actually going to notice,” McKeay says. “But it does mean that your network is going to be part of a chain of control.”

Concern about Internet of Things insecurities has grown as more attackers use the type of approach Akamai describes. Most recently, an army of centrally controlled IoT devices launched a massive distributed denial-of-service (DDoS) attack against the website of security reporter Brian Krebs. The attack created its botnet using malware called Mirai, which has since been publicly released, increasing the danger of future Mirai attacks.

In the case of the SSH hacks, Akamai emphasizes that nothing about the SSH vulnerabilities is really new and it’s true that these types of problems have been long foreseen. For example, a 2003 evaluation of SSH by the security firm SANS Institute noted, “The unfortunate reality is that SSH is not a ‘silver bullet’ capable of removing all dangers. Known exploits of SSH exist that can be used as attack vectors against a network.” But these and similar warnings were directed at more traditional computer networks during the early 2000s. The idea that IoT devices need to be protected with the same rigor is still developing, but for victims of IoT botnets it’s coming too slowly. “Embedded devices still tend to run old software stacks that have not been vetted and that either don’t implement security at all, don’t implement it properly, or might implement security but leave default passwords on there,” says Balint Seeber, the director of vulnerability research at the Internet of Things security company Bastille. “Both customers and companies are slowly waking up, and that’s great, but it’s just such a broad domain.”

Even if it’s a rude awakening, IoT devices now number in the tens of billions, and it’s time to protect them.

Go Back to Top. Skip To: Start of Article.

from Wired Top Stories http://ift.tt/2ellCHy
via IFTTT

Terahertz radiation could speed up computer memory by 1000 times

One area limiting speed in personal computing speed is memory — specifically, how quickly individual memory cells can be switched, which is currently done using an external magnetic field. European and Russian scientists have proposed a new method using much more rapid terahertz radiation, aka "T-rays," the same things used in airport body scanners. According to their research, published in the journal Nature, swapping out magnetic fields for T-rays could crank up the rate of the cell-resetting process by a factor of 1000, which could be used to create ultrafast memory.

The radiation is actually a series of short electromagnetic pulses pinging the cells at terahertz frequencies (which have wavelengths of about 0.1 millimeter, lying between microwaves and infrared light, according to the scientists’ press release). Most of the recent T-ray experiments have dealt with quick, precise inspections of organic and mechanical material. Aside from quickly scanning you for contraband and awkward bulges at airports, other proposals have involved using terahertz radiation to look into broken microchip innards, peer into fragile texts and even comb airport luggage for bombs.

But similar to those hypothetical applications, you won’t see T-rays in your PCs any time soon. The scientists have successfully demonstrated the concept on a weak ferromagnet, thulium orthoferrite (TmFeO₃), and even found that the terahertz radiation’s effect was ten times greater than a traditional external magnetic field, meaning the new method is both far faster and more efficient. But the scientists have yet to publish tests on actual computer memory cells, so it’s unknown when, or if, T-rays will buzz around inside your machine.

Source: Nature

from Engadget http://ift.tt/2eaYxUt
via IFTTT

Science creates a cast that lets you scratch those itches

If you made a list of things that sucked about breaking your arm, the fiberglass cast to heal you would be close to the top. You can’t shower with it, you can’t get at your skin and you wind up an itchy, sweaty mess for months on end. Three college students out of Illinois believe that they can alleviate some of those bugbears with Cast21, a pretzel-esque sleeve that would replace traditional fiberglass castings. The Cast21 sleeve is a mathematically-designed structure that’s as rigid as a traditional cast, but without most of those issues. For instance, its hollow design means that you can get to most of your skin, letting you scratch those itches when you need to. Plus, you can get it wet, it’s lightweight and can be removed with a pair of pointed shears. Oh, and it’ll cost roughly the same as the existing procedure, so it won’t put too much of a dent in your hospital bills.

The sleeve itself is made of silicon and comprised of a series of hollow tubes that are all connected together. Once a doctor places it on your forearm, two liquids are injected into the tubes and as they mix, the structure hardens. The silicon construction means that a wide variety of colors and designs can be incorporated into the cast, including block colors, camouflage pattern and even a "cookies and cream" motif.

The team behind Cast21 are currently looking for investors to help them get through the initial manufacturing and prototype stages. Should that cash arrive soon, it’s hoped that initial trials on human patients could begin as early as mid-2017, although that’s a very ambitious goal. COO Justin Brooks also has one eye on conquering the animal market, given how frequently you see dogs with broken forelegs. He also says that his company has one up on its 3D-printed rivals since there’s significantly less complexity with stretchy silicon.

Source: Cast21

from Engadget http://ift.tt/2e0qmkA
via IFTTT