Day: September 6, 2018

2019 Audi Q8 starts at $67,400, right about where Q7 leaves off – Roadshow

Coupe-ified versions of SUVs tend to cost more, and the Q8 is no exception. …read more Source:: CNet


Tesla modifies product policy to accommodate “good-faith” security research

Tesla promises to reset car firmware and software damaged during security research. Also promises not to go after “good-faith” researchers in court. …read more Source:: ZDNet


Robot Boat Sails Into History By Finishing Atlantic Crossing

An anonymous reader writes: For the first time an autonomous sailing robot has completed the Microtransat Challenge by crossing the Atlantic from Newfoundland, Canada to Ireland. The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, SB Met was built by the Norwegian…


How to Add UART to Your FPGA Projects

Being able to communicate between a host computer and a project is often a key requirement, and for FPGA projects that is easily done by adding a submodule like a UART. A Universal Asynchronous Receiver-Transmitter is the hardware that facilitates communications with a serial port, so you can send commands from a computer and get…


HTBASE struts into diner, thumps Juke box: Eyyy, let’s migrate some containerised apps

Play container records on any private or public cloud turntable HTBASE has pulled the covers off Juke, its hybrid and multi-cloud container deployment and migration kit.… …read more Source:: TheRegister


Consumer product safety agency just ruined Read a Book Day – CNET

As you cozy up to your favorite novel for Read a Book Day, remember that danger may lurk between the covers. …read more Source:: CNet


How to Protect Against Human Vulnerabilities in Your Security Program

When it comes to cybersecurity, no doubt humans are the weakest link. No matter how many layers are added to your security stack, nor how much phishing education and awareness training you do, threat actors continue to develop more sophisticated ways to exploit the human vulnerabilities with socially engineered attacks. In fact, as security defenses…


3 Best Practices to Secure Critical Infrastructure

In the last few years, executives overseeing energy, utility and other industrial organizations have begun to worry about the threat of cyberattacks on our nation’s most critical infrastructures. Ten years ago, their main concerns were focused on safety or environmental risks. Back then, operators believed the virtual barricades, or air gaps, between networks and technologies…


Active Spy Campaign Exploits Unpatched Windows Zero-Day

The PowerPool gang launched its attack just two days after the zero-day in the Windows Task Scheduler was disclosed. …read more Source:: Threatpost


One Square Inch Expanded in the Time Dimension

No, we’re not talking about spooky feats of General Relativity. But you should know that the Return of the Square Inch Project just got its deadline extended. If you missed the call the first time around, our favorite user-contributed contest on Hackaday.io is up and running again. Hackaday.io tossed in some good money for prizes,…