By Soulskill from Slashdot's car,-take-me-home-then-find-an-EV-hater-to-annoy department
Tesla Motors CEO Elon Musk has been thinking about bringing autonomous driving technology to Tesla's electric cars. Quoting Bloomberg:"Musk, 41, said technologies that can take over for drivers are a logical step in the evolution of cars. He has talked with Google about the self-driving technology it’s been developing, though he prefers to think of applications that are more like an airplane’s autopilot system. 'I like the word autopilot more than I like the word self- driving,' Musk said in an interview. 'Self-driving sounds like it’s going to do something you don’t want it to do. Autopilot is a good thing to have in planes, and we should have it in cars.' ... Google’s approach builds on a push for the driverless-car technology long pursued by the U.S. military’s Defense Advanced Research Projects Agency, which held vehicle competitions for carmakers and research labs. Anthony Levandowski, product manager for Google’s self-driving car project, has said the company expects to release the technology within five years. 'The problem with Google’s current approach is that the sensor system is too expensive,' Musk said. 'It’s better to have an optical system, basically cameras with software that is able to figure out what’s going on just by looking at things.' ... 'I think Tesla will most likely develop its own autopilot system for the car, as I think it should be camera-based, not Lidar-based,' Musk said yesterday in an e-mail. 'However, it is also possible that we do something jointly with Google.'"
Musk later warned not to take this as an actual announcement
.Read Replies (0)
By Soulskill from Slashdot's polite-warnings-and-gentle-reprimands department
wiredmikey writes "A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber espionage is focused on the U.S. government, as well as American corporations. China kept up a steady campaign of hacking in 2012 that included attempts to target U.S. government computer networks, which could provide Beijing a better insight into America's policy deliberations and military capabilities, according to the Pentagon's annual assessment of China's military. 'China is using its computer network exploitation capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,' said the report to Congress (PDF). The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related U.S. and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said. One day later, Beijing dismissed the Pentagon's report that accused it of widespread cyberspying on the U.S. government, rejecting it as an 'irresponsible' attempt to drum up fear of China as a military threat."Read Replies (0)
By timothy from Slashdot's now-this-gives-pause department
SternisheFan writes with an excerpt from Ars Technica: "Attacks exploiting a previously unknown and currently unpatched vulnerability in Microsoft's Internet Explorer browser have spread to at least nine other websites, including those run by a big European company operating in the aerospace, defense, and security industries as well as non-profit groups and institutes, security researchers said. The revelation, from a blog post published Sunday by security firm AlienVault, means an attack campaign that surreptitiously installed malware on the computers of federal government workers involved in nuclear weapons research was broader and more ambitious than previously thought. Earlier reports identified only a website belonging to the US Department of Labor as redirecting to servers that exploited the zero-day remote-code vulnerability in IE version 8.
... 'The specific Department of Labor website that was compromised provides information on a compensation program for energy workers who were exposed to uranium,' CrowdStrike said. 'Likely targets of interest for this site include energy-related US government entities, energy companies, and possibly companies in the extractive sector. Based on the other compromised sites other targeted entities are likely to include those interested in labor, international health and political issues, as well as entities in the defense sector.'"Read Replies (1)
By Unknown Lamer from Slashdot's amazon-is-the-new-walmart department
schwit1 quotes The Washington Post
: "The Senate aimed to help traditional retailers and financially strapped state and local governments Monday by passing a bill that would widely subject online shopping — for many a largely tax-free frontier — to state sales taxes. The Senate passed the bill by a vote of 69 to 27, getting support from Republicans and Democrats alike."
schwit1 adds "Unfortunately online businesses could be in for a rude awakening
when it comes to the law's interpretation." Passage in the House is not certain, and companies like eBay are lobbying to raise the minimum sales required to collect state sales tax to $10 million instead of $1 million per year.Read Replies (0)
By Unknown Lamer from Slashdot's never-trust-malware department
wiredmikey writes "A group of researchers from Northwestern University and North Carolina State University tested ten of the most popular AV products on Android, and discovered that they were easily fooled by common obfuscation techniques. In a paper (PDF), the researchers said they tested AV software from several well-know security vendors. In order to evaluate the mobile security software, the researchers developed a tool called DroidChameleon, which applies transformation techniques to Android applications. Known malware samples were transformed to generate new variants that contain the exact malicious functions as before. These new variants were then passed to the AV products, and much to the surprise of the paper's authors, they were rarely flagged — if at all. According to the research, 43% of the signatures used by the AV products are based on file names, checksums or information obtained by the PackageManager API. This means that, as mentioned, common transformations will render their protection useless for the most part. For example, the researchers transformed the Android rootkit Droid Dream for their test. DroidDream is a widely-known and highly dangerous application. Yet, when it was transformed, every AV program failed to catch at least two variants."Read Replies (0)
By Unknown Lamer from Slashdot's death-wish department
An anonymous reader tipped us to news of an interesting
hack for the Oculus Rift: a simulation of being beheaded
by a Guillotine. Thrown together in a couple of days at the Exile Code Jam
, the simulation lets you... "look around to see the blade above, the crowd of onlookers around them, and the executioner who signals the blade be dropped. It also enhances the experience when someone watches the blade falling on a nearby screen and taps the user on the back of the neck at the time of impact."
Just a bit morbid. There's a video of people "playing"
(nsfw language in a few reactions to being virtually beheaded).Read Replies (0)
By Unknown Lamer from Slashdot's diagnose-like-it's-1899 department
New submitter Big Nemo '60 writes with news that the National Institute of Mental Health is seeking to modernize the diagnosis of mental illness
through the use of neuroscience, genetics, etc. From the article: "The world's biggest mental health research institute is abandoning the new version of psychiatry's 'bible' — the Diagnostic and Statistical Manual of Mental Disorders — questioning its validity and stating that 'patients with mental disorders deserve better.' This bombshell comes just weeks before the publication of the fifth revision of the manual, called DSM-5."
< article continued at Slashdot
>Read Replies (0)