If you were forced to hear something every time you opened your car door, you could do worse than Toto's "Africa" — a pleasant tune that would surely leave you in a good mood for your ride. Self-described Volvo enthusiast Chris Ng wanted to customize the door chimes on his old Volvo 240. Now, every time he opens his car door and his keys are still in the ignition, an 8-bit version of Toto's "Africa" plays instead of those annoying bells. On his Kickstarter page, Ng notes that it took him two days to put the pieces together. He hopes to create a prototype which can be easily installed on other vehicles, so you too can hear some sweet jams instead of an aggravating chime when you open your car door. [h/t:Reddit] Man builds functioning kitchen in his teeny electric car Watch passengers react to a truly driverless Waymo ride Kids in LA and NY were asked who was smarter and their responses were absolutely A+ 'Fantastic Beasts 2: The Crimes of Grindelwald' trailer takes … [Read more...] about Dude hacks his car to play the song ‘Africa’ when he opens his door
Electric man 2 hacked
There is an organ made out of furbies. That is 1) a thing that exists and 2) a thing that this is absolutely terrifying. There are 44 of these little guys in all, and with the flip of a switch, they all come whirring to life with mangled, grotesque voices and eerie, uncoordinated movements. A bit into it, YouTuber Samm Battle of Look Mum No Computer, shows off the ability to control all of them simultaneously. At first forcing their little beak-y faces to hold a specific note, which is as demonic-sounding and blood-curdling as it sounds. With an early 00s English punk affect, Battle explains that he’s been working on this technological terror for seven years. And that definitely shows. As the video gets going, Battle makes a number of cracks about the toys *actually* being self-aware before busting out the one true composer furby and getting to work playing some basic tunes. The lil’ furbs speak between the notes they’re called to sing, so, the whole thing is a bit … [Read more...] about Man Creates Playable Organ From Furby Bodies, Summons Satan, Dooms Humanity
Updated: Spies have reportedly been probing the U.S. electrical grid for months and planting software that could be activated at a future date, according to a Wall Street Journal. The report highlights the latest vulnerabilities facing U.S. power infrastructure. The Journal notes that the spies are from China, Russia and other countries. While the news isn't that surprising---given how vulnerable U.S. infrastructure is---it is notable because electrical grids were initially thought to be somewhat hacker proof until recently. Why? Grids run on an old mish-mash of software, which is often proprietary. However, recent events indicate that so called SCADA systems---(Supervisory Control And Data Acquisition), which collect data from sensors and machines and send them to a centrally managed repository---are also at risk. To wit, last June Core Security detailed how SCADA systems were vulnerable. And even silly electronic road sign pranks show how SCADA systems are vulnerable. How bad … [Read more...] about The U.S. electrical grid: How big of a cyber target is it?
The information security industry must be founded on trust, yet many vendors have form for publish dodgy statistics. As just one example, market leader Symantec, at least until a year or so ago, were publishing reports that smudged the boundaries between different kinds of crime, sometimes totalling people who'd experienced certain crimes "in the last year" and sometimes "ever", while keeping their working-out to themselves. I've given the other vendors plenty of stick as well. But hats off to McAfee this week. The latest McAfee-funded research — a preliminary report from the Washington-based Center for Strategic and International Studies released Monday and titled The Economic Impact of Cybercrime and Cyber Espionage — starts to admit honestly the limitations of these high-level guesstimates. McAfee had previously claimed that cybercrime costs the global economy US$1 trillion a year. The US administration has recently been using that claim to justify more spending for … [Read more...] about Will McAfee’s hacking hyperbole hatchet job kill the trillion-dollar myth?
A tweet from Hello Games co-founder and No Man’s Sky director Sean Murray stating that the game was “a mistake” was written while the account was hacked, according to a statement from Hello Games. After reports initially suggested the comment was genuine, the developer clarified that the tweet was from “a disgruntled employee” who hacked Murray’s accounts.The incident has caused more confusion than the average social media account hack, primarily because the hacker not only published the tweet, but impersonated Murray and commented on the tweet to a reporter. Shortly after the tweet was deleted, Polygon reached out to Hello Games, and an email allegedly coming from Murray himself responded, stating he was responsible for the post.“The tweet is from me, but somebody from the team took it down,” Murray’s email said. “We have not been coping well.”The Twitter account briefly went private, but Murray … [Read more...] about Report: ‘No Man’s Sky’ creator’s Twitter account hacked, tweeted the game was a “mistake”
Even the best of us has bad days, but when Cisco has them for whatever reason, they get reported widely. Here are Cisco Subnet's picks of the top-7 bad luck happenings in Ciscoland in the past year, ranging from the departure from Cisco of a high-flying exec to a wireless LAN data flooding to some major problems with Cisco VoIP equipment. No. 7: The departure of Mike VolpiMike Volpi, formerly head of Cisco's Routing and Service Provider Technology Group, surprised industry watchers when he resigned early in February. Widely tipped as the first heir apparent to CEO John Chambers, Volpi orchestrated many of the acquisitions that helped Cisco grow from a $2 billion company to the $30 billion behemoth it is today. Volpi also was responsible for developing switching products for data centers and distribution applications during his 13-year-career at Cisco. Several key products were under Volpi's management, including the Catalyst 6500 and 4000 series switches, VPN and security services, … [Read more...] about 7 Cisco bad luck happenings in ’07
This is a guest post from Larry Dignan, Editor in Chief of ZDNet, TechRepublic's sister site . You can follow Larry on his ZDNet blog Between the Lines (or subscribe to the RSS feed ). Spies have reportedly been probing the U.S. electrical grid for months and planting software that could be activated at a future date, according to The Wall Street Journal. The report highlights the latest vulnerabilities facing U.S. power infrastructure.The Journal notes that the spies are from China, Russia and other countries. While the news isn't that surprising—-given how vulnerable U.S. infrastructure is—-it is notable because electrical grids were initially thought to be somewhat hacker proof until recently. Why? Grids run on an old mish-mash of software, which is often proprietary.However, recent events indicate that so called SCADA systems—-(Supervisory Control And Data Acquisition), which collect data from sensors and machines and send them to a centrally managed … [Read more...] about Could cyber attackers bring down the U.S. electrical grid?
A startling new report on climate change was released in early 2014. It didn't mention exact dates or specific forecasts for the future, but it did foreshadow consequences of climate change that are getting increasingly difficult for the world to ignore.Some of the highlights included a prediction of violent conflicts and civil wars, extreme poverty and the loss of several points of gross domestic product in some developing nations, mass extinctions, and an intense, regular pattern of natural disasters. The report was done by the Intergovernmental Panel on Climate Change, a United Nations group that summarizes the effects of climate change every so often. The year 2013 is tied with 2003 as the fourth warmest year on record for planet earth, and the top 10 have all been since 1998. From automobiles to factories, technology has played its part in climate change. But, tech can also change the course we're on, if it's harnessed in effective ways. Here are 10 creative ways humans are using … [Read more...] about 10 ways technology is fighting climate change
Bear with me for a bit. I’m going to get around to Watch Dogs 2, but it’s going to be by way of a semi-lengthy tangent into Assassin’s Creed—particularly, what Assassin’s Creed II meant to that now-juggernaut of a series.It’s easy to forget, with almost a decade of sequels under our belt, that there was a time when Assassin’s Creed could’ve conceivably died off. Early on, too. After garnering quite a bit of hype, the original Assassin’s Creed released in 2007 to middling reviews. “Disappointing,” said many, or “Repetitive.” It had some great ideas, but was a boring mess of a game.That might have been the end, but no. Assassin’s Creed II released in 2009, ushering in the “Ubisoft Formula” that propelled the publisher to new heights and then became the butt of industry jokes: 1) Climb towers 2) Unlock a million icons on the map 3) Grind out some missions 4) Repeat. Sure, it’s trite now, … [Read more...] about Watch Dogs 2 review: A fresh, interesting rebirth that ditches the stale Ubisoft formula
What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SANS Institute, who spoke Wednesday during the RSA conference in San Francisco.Some of these threats target consumers directly, but even the ones that target corporations could eventually “filter down” to consumers, though the effects might not be felt for some time.Here are the seven most dangerous attack vectors, according to SANS, and what, if anything, you can do about them:1. Ransomware: Ransomware surfaced more than 20 years ago, but it has since evolved into a seriously scary form of malware: crypto-ransomware, which encrypts your files and demands payment to unlock them. It’s an ideal way for bad guys to attack: Ransomware spreads like a virus, locks up your … [Read more...] about The 7 security threats to technology that scare experts the most