Iceland drills 4.7 km down into volcano to tap clean energy

Iceland’s decision to harness the heat inside the earth in a process known as geothermal energy dates back to the 1970s and the oil crisis.

But the new geothermal well is expected to generate far more energy, as the extreme heat and pressure at that depth makes the water take the form of a “supercritical” fluid, which is neither gas nor liquid.

Source: Iceland drills 4.7 km down into volcano to tap clean energy

SpaceX plans to start launching high-speed internet satellites in 2019

SpaceX hopes to start testing its satellites before the end of this year and continuing through the early months of 2018. If that’s successful, the company plans to launch satellites in phases between 2019 and 2024, after which the system will be at full capacity.

Source: SpaceX plans to start launching high-speed internet satellites in 2019

OAUTH phishing against Google Docs ? beware!

As you can see, it appears as Google Docs wants full access to my Gmail as well as my contacts. Of course, this is not real Google Docs – the attacker has simply named his “application” Google Docs – this can be verified by clicking on the Google Docs text where the real web site behind this and developer info is shown:

Source: InfoSec Handlers Diary Blog – OAUTH phishing against Google Docs ? beware!

Finally, if you accidentally clicked on “Allow”, go to https://myaccount.google.com/u/0/permissions?pli=1 to revoke permissions.

What is a lambda expression in C++11?

C++ includes useful generic functions like std::for_each and std::transform, which can be very handy. Unfortunately they can also be quite cumbersome to use, particularly if the functor you would like to apply is unique to the particular function.

Source: What is a lambda expression in C++11?

C++11 introduces lambdas allow you to write an inline, anonymous functor to replace the struct f. For small simple examples this can be cleaner to read (it keeps everything in one place) and potentially simpler to maintain,

About 90% of Smart TVs Vulnerable to Remote Hacking via Rogue TV Signals

According to Scheel, the problem is that the HbbTV standard, carried by DVB-T signals and supported by all smart TVS, allows the sending of commands that tell smart TVs to access and load a website in the background.

Knowing this, Scheel developed two exploits he hosted on his own website, which when loaded in the TV’s built-in browser would execute malicious code, gain root access, and effectively take over the device.

Source: About 90% of Smart TVs Vulnerable to Remote Hacking via Rogue TV Signals

Earth-sized telescope set to snap first picture of a black hole

Each telescope will point at Sagittarius A*, the supermassive black hole at the centre of the Milky Way, and measure every radio wave coming from its direction. Linking together observatories spread across such a huge area and combining their observations to filter out extra light will effectively create a powerful “virtual telescope” almost the size of Earth.

Source: Earth-sized telescope set to snap first picture of a black hole | New Scientist

As other telescopes are added to the network in coming decades, observations of the black holes will become even more precise, and should provide fundamental insights into the workings of our universe.

Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware

Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform “unauthorized” repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their livelihood if their tractor breaks at an inopportune time.

Source: Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware – Motherboard

A license agreement John Deere required farmers to sign in October forbids nearly all repair and modification to farming equipment, and prevents farmers from suing for “crop loss, lost profits, loss of goodwill, loss of use of equipment … arising from the performance or non-performance of any aspect of the software.”

Hundreds of Cisco switches vulnerable to flaw found in WikiLeaks files

An attacker can exploit the vulnerability by sending a malformed protocol-specific Telnet command while establishing a connection to the affected device, because of a flaw in how the protocol fails to properly process some commands.

Cisco said that there are “no workarounds” to address the vulnerability, but it said that disabling Telnet would “eliminate” some risks.

Source: Hundreds of Cisco switches vulnerable to flaw found in WikiLeaks files | ZDNet