Posts

Showing posts from November 5, 2018

Astronomy Picture of the Day: NGC 1499: The California Nebula

Image
NGC 1499: The California Nebula There's even a California in space. Drifting through the Orion Arm of the spiral Milky Way Galaxy, this cosmic cloud by chance echoes the outline of California on the west coast of the United States . Our own Sun also lies within the Milky Way's Orion Arm , only about 1,500 light-years from the California Nebula . Also known as NGC 1499 , the classic emission nebula is around 100 light-year s long. On the featured image, the most prominent glow of the California Nebula is the red lig ht characteristic of hydrogen atoms recombining with long lost electrons, stripped away ( ionized ) by energetic starlight. The star most likely providing the energetic starlight that ionizes much of the nebular gas is the bright, hot, bluish Xi Persei just to the right of the nebula. A regular target for astrophotographers, the California Nebula can be spotte

Women are less likely to receive CPR—but why?

Image
Health Virtual reality might help solve the problem. Picture it: you’re in the street and the person standing beside you collapses. What do you do? If you step in, you’re more likely to end up performing CPR on a man than… via Popular Science "https://ift.tt/2D5DYqH"

Smart speakers make tricky gifts, no matter how cheap they get

Image
Gadgets Google Home Minis and Echo Dots are really cheap this holiday, but they're complicated gifts. A smart speaker is fun to unwrap, but things get complicated once its set up. via Popular Science "https://ift.tt/2qt56sh"

MEGAPIXELS: This strange creature isn’t a spider or a dog, but it sure looks like both

Image
Animals My dear, you have… THE GRIM. There is an arachnid in the rainforests of Ecuador that looks like a big black dog’s head sitting on eight super-long yellow legs. via Popular Science "https://ift.tt/2quwUwx"

Scientists want to put 'speed bumps' in hurricane alley to slow down storms

Image
Nexus Media News Wind farms could absorb some of the energy from hurricanes before they hit land. Wind turbines churn out clean, renewable energy. But one day they could do even more by reducing the rain brought by powerful hurricanes. via Popular Science "https://ift.tt/2zw9fzX"

Two NASA spacecraft died in one week—and there's a connection

Image
Space Kepler and Dawn guzzled through their precious gas for similar reasons. The asteroid-hopping Dawn spacecraft lived a very different life from the exoplanet-hunting Kepler telescope, but they shared similar struggles. via Popular Science "https://ift.tt/2Qn0Ndd"

Last week in tech: New Apple devices, Amazon’s free shipping play, and Blizzcon’s big gaming news

Image
Technology It's about time we got that new MacBook Air A new episode of the podcast and new Apple stuff to gawk at? What a week. via Popular Science "https://ift.tt/2RwMhzY"

Daily Deal - Infinifactory, 75% Off

Image
Today's Deal: Save 75% on Infinifactory !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Wednesday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2D4Ffyg"

DDoS Disruption: Election Attacks

Image
In an increasingly politically and economically volatile landscape, cybercrime has become the new geopolitical tool. Attacks on political websites and critical national infrastructure services are ever more frequent not only because the tools to do these are simpler, cheaper and more widely available, but also due to desire and capabilities of attackers to impact real-world events such as election processes, while staying undiscovered. Not surprisingly, a third of respondents to NETSCOUT's latest  Worldwide Infrastructure Security Report  saw political or ideological disputes as motivation for DDoS attacks. As such, we are reminded that cyberattacks against elections are a major  concern  for the US—recall the recent DDoS attack that crashed a Tennessee county's website on election night in May. The Department of Homeland Security has  warned against voting machine hacks  

DDoS Disruption: Election Attacks

Image
In an increasingly politically and economically volatile landscape, cybercrime has become the new geopolitical tool. Attacks on political websites and critical national infrastructure services are ever more frequent not only because the tools to do these are simpler, cheaper and more widely available, but also due to desire and capabilities of attackers to impact real-world events such as election processes, while staying undiscovered. Not surprisingly, a third of respondents to NETSCOUT’s latest  Worldwide Infrastructure Security Report  saw political or ideological disputes as motivation for DDoS attacks. As such, we are reminded that cyberattacks against elections are a major  concern  for the US—recall the recent DDoS attack that crashed a Tennessee county's website on election night in May. The Department of Homeland Security has  warned against voting machine hacks  and targeted attacks against campaigns. The agency said that in 2016, hackers  targeted election systems in

Now Available on Steam - Cheap Golf, 20% off!

Image
Cheap Golf is Now Available on Steam and is 20% off!* A retromoderrn and surreal minigolf comedy hosted by the infamous AI bot SUSAN. ...//-- Fling up and go FULL BOOP --\\... *Offer ends November 12 at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2Rwhx22"

Llamas could save us all from the flu

Image
Health Their blood might hold the key to stopping every flu, every year. Llamas may be large and fluffy, but their antibodies sure aren’t. And that could be a huge advantage when it comes to fighting human influenza virus. via Popular Science "https://ift.tt/2RAJ0iX"

How to prevent carbon monoxide poisoning, winter's odorless killer

Image
DIY When the furnace turns on, the risk increases. Carbon monoxide poisonings happen most commonly in winter, when we seal up our homes and burn extra fuel for warmth. Here’s how to keep the deadly gas out of your… via Popular Science "https://ift.tt/2yQYecO"

Buy, Rent, or Uber Your Security Operations Center

Image
We all know that data breaches cost a lot—an average of $3.6M per organization. For cyber criminals, everyone’s a target—and perfect prevention isn’t practical. We must assume that, at some point, every organization’s IT infrastructure will be breached. That’s why we need to continuously monitor, investigate and respond to cyber threats 24/365 if we are to avoid costly breaches and the potential impact to reputation, revenue and customer confidence. What better way to provide continuous monitoring and analysis than through a security operations center (SOC)? With the people, processes and platform to continuously look across the entire organization’s networks, servers, endpoints, applications and databases, a SOC applies expert knowledge to detect and dig into potential threats. One of the key benefits of a SOC is preventing the devastating impact of a breach by reducing the dwell time (the time between when an attacker compromises a network—minutes—and when the organization discov

What You Need to Know about the Recent Apache Struts Vulnerability

Image
Researchers recently revealed a vulnerability in Apache Struts, a popular type of enterprise software. Active exploit attempts weren’t far behind. The Equifax hack that occurred roughly a year ago was due to an earlier Apache Struts vulnerability ( CVE-2017-9805 ). The team at Equifax was aware of the vulnerability but took some time to patch it — and in this gap the company was hacked, and the data of millions was stolen. To avoid falling victim to a similar attack, it’s important for businesses and their IT service providers to understand the recently revealed CVE-2018-11776 Apache Struts vulnerability and how to guard against it. This is a command injection vulnerability in the Apache Struts framework. When you run the vulnerable version and have a specific vulnerable configuration, an attacker can perform remote code execution and breach the web application. The specific vulnerability is exploitable when: An action is configured to use no namespace or a wildcard namespace

A new report shows the ozone hole is healing, but it's not all good news

Image
Environment Despite mostly positive changes, a scientific assessment of the Montreal Protocol shows how we still need to do better. A three decades old international treaty to phase out chemicals that deplete the ozone layer protecting our planet from harmful solar radiation is paying off. Thanks to… via Popular Science "https://ift.tt/2QlcW2z"

Buy, Rent, or Uber Your Security Operations Center

Image
We all know that data breaches cost a lot—an average of $3.6M per organization. For cyber criminals, everyone's a target—and perfect prevention isn't practical. We must assume that, at some point, every organization's IT infrastructure will be breached. That's why we need to continuously monitor, investigate and respond to cyber threats 24/365 if we are to avoid costly breaches and the potential impact to reputation, revenue and customer confidence. What better way to provide continuous monitoring and analysis than through a security operations center (SOC)? With the people, processes and platform to continuously look across the entire organization's networks, servers, endpoints, applications and databases, a SOC applies expert knowledge to detect and dig into potential threats. One of the key benefits of a SOC is preventing the devastating impact of a bre

What You Need to Know about the Recent Apache Struts Vulnerability

Image
Researchers recently revealed a vulnerability in Apache Struts, a popular type of enterprise software. Active exploit attempts weren't far behind. The Equifax hack that occurred roughly a year ago was due to an earlier Apache Struts vulnerability ( CVE-2017-9805 ). The team at Equifax was aware of the vulnerability but took some time to patch it — and in this gap the company was hacked, and the data of millions was stolen. To avoid falling victim to a similar attack, it's important for businesses and their IT service providers to understand the recently revealed CVE-2018-11776 Apache Struts vulnerability and how to guard against it. This is a command injection vulnerability in the Apache Struts framework. When you run the vulnerable version and have a specific vulnerable configuration, an attacker can perform remote code execution and breach the web application.