schwit1 quotes a report from Reuters: A hacking group linked to the Russian government and high-profile cyber attacks against Democrats during the U.S. presidential election likely used a malware implant on Android devices to track and target Ukrainian artillery units…
2016 MacBook Pro Fails To Receive a Recommendation From Consumer Reports
Consumer Reports has released its evaluation of the new MacBook Pro laptops, and it’s not good. The 2016 MacBook Pro is the first MacBook to fail to receive a recommendation from the nonprofit organization dedicated to unbiased product testing. 9to5Mac…
Uber Pulls Self-Driving Cars From San Francisco, Sends Them To Arizona
An anonymous reader quotes a report from SFGate: Uber is moving its self-driving pilot to Arizona, one day after the California Department of Motor Vehicles ordered the autonomous vehicles off the roads in San Francisco. “Our cars departed for Arizona…
World's First 'Solar Panel Road' Opens In France
The world’s first solar road has officially opened in the small village of Tourouvre-au-Perche in Normandy, France. The road is 1 kilometer long and can generate enough electricity to power the street lights. The Verge reports: That might not sound…
Wikipedia Announces the Most Edited Articles of 2016
Wikipedia has revealed its most edited articles of 2016. Believe it or not, the two most edited articles of the year were for Deaths in 2016, which was edited 18,230 times, and Donald Trump, with 8,933 edits as of December…
Congressional Group Says Encryption Backdoors Are a Bad Idea
Members of the bipartisan encryption working group released a year-end report concluding that encryption backdoor laws would do more harm than good.
Siemens Patches Insufficient Entropy Vulnerability in ICS Systems
German industrial giant Siemens has provided a firmware update addressing software vulnerabilities that are found in a popular line of its Desigo PX industrial control hardware.
NIST Calls for Submissions to Secure Data Against Quantum Computing
NIST has made a public plea for submissions for new crypto algorithms that can stand up against quantum computing and protect data.
Forwarding Emails
When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to…