source: submitted by Artemus FAN Steve Jones!  (thank you, Steve!!!)

Energy harvesting technology is another emerging field of interest.   Think about it, car engines produce an immense amount of heat - could that be harvested for onboard electronics or store energy in a battery?
 
Just for fun, Google "energy harvesting technology" and then think of the potential forms of energy that could be captured and converted into a useful form and not totally wasted.
 
FAN members may have an opinion that could be shared.
 
- Steve

 
A recent study, led by Professor Kyoung Jin Choi in the School of Materials Science and Engineering at UNIST has introduced a new advanced energy harvesting system, capable of generating electricity by simply being attached to clothes, windows, and outer walls of a building.This new device is based on a temperature difference between the hot and cold sides. The temperature difference can be increased as high as 20.9 °C, which is much higher than the typical temperature differences of 1.5 to 4.1 °C of wearable thermoelectric generators driven by body heat. The research team expects that their wearable solar thermoelectric generator proposes a promising way to further improve the efficiency by raising the temperature difference.Energy harvesting is a diverse field encompassing many technologies, which involve a process that captures small amounts of energy that would otherwise be lost as heat, light, sound, vibration, or movement. A thermoelectric generator (TEGs) refers to a device that converts waste heat energy, such as solar energy, geothermal energy, and body heat into additional electrical power.

 source: wired.com

DON'T LET LIMITED storage stop you from taking another Instagram-worthy photo or downloading another album to listen to on the go. It's easy to free up space on your iPhone. Follow our best tips and tricks and you'll lighten the load on your iPhone within an hour.

Storage Audit

Before you do anything, it’s helpful to understand what’s taking up your storage space. Go to Settings > General > iPhone Storage. You’ll find a color-coded bar chart showing how your storage is being used, down to the gigabyte. Scroll down and you’ll see the list of apps and functions organized from most to least space. This is the index of your storage suckers.

Is your media taking up tons of room? The 6 GB shown next to the podcast app includes the dozens of podcasts you’ve downloaded over the year. Purge those old Reply All episodes you downloaded and listened to last year. Same goes for Spotify and any other apps with downloaded music, audio, or videos that you no longer need.

Lighten Your Load

Let’s be real. You haven’t opened PokémonGo in months. To truly can’t catch ‘em all, you might need some space. Delete any of the apps you no longer need.

Other apps might be useful later on, but don’t need space on your phone right now. Offloading an app deletes the app from your device but holds onto the data stored within that app. It doesn’t create as much space as deleting does, but it reduces the load and gives you the option to re-download later on. From the iPhone Storage interface, click on an app and tap offload. Once you’ve offloaded an app, the offload button will switch to reinstall. You can reinstall whenever you’d like to bring back the app and retrieve all app data present on your iPhone.

The browsing you’ve done on your phone also uses a sliver of data, but even that can take up valuable space. Safari and Chrome save your history to fill in your sentences and make it easier to log into sites you’ve previously visited. If you care more about the space than the convenience, go to Settings > Safari and click on Clear History and Website Data. For Chrome, open up the app and go to Settings. At the bottom of History, click Clear Browsing Data.

Photo Cleanse

Onto the hard stuff: photos. By default, iPhones automatically stream your most recent 1,000 photos across all of your iOS devices. It's good backup, but it's also a space-grabber that can lead to redundant photo storage. To stop the stream, go to Settings > Photos > Upload to My Photo Stream, and switch it off.

Another superfluous space-grabber: HDR photos. Shooting in HDR takes three separate exposures and uses the best parts each to produce one photo. There’s no real reason to hold onto the other exposures once they’ve been blended into one nice one. Go to Settings > Camera and turn off the option at the bottom to Keep Normal Photo.

 

 source: defenseone.com

Last year, North Korea and Russia used a vulnerability stolen from the U.S. government to conduct the WannaCry and NotPetya ransomware attacks.

Almost exactly one year ago, the world experienced two destructive cyberattacks in which offensive cyber tools developed by the National Security Agency were stolen and shared with the public. In May 2017, the WannaCry ransomware hit over 300,000 computers in 150 countries. One month later, the NotPetya attack hit the computer systems of companies and governmental entities across the globe causing millions of dollars in damages. These attacks exploited numerous vulnerabilities, and have subsequently exposed the slow response time of targeted countries and the lack of effective information sharing mechanisms between responsible agencies, something which could have mitigated the severe damage caused by the attacks.

The interesting feature of these attacks is that those responsible—North Korea and Russia—used the leaked offensive tools originally developed by the NSA. The investigation into WannaCry ultimately revealed that the attackers had exploited a security vulnerability called EternalBlue, originally developed by the NSA. NotPetya used a variant of the same vulnerability, which is still wreaking havoc a year later. For example, in February 2018, security researchers at Symantec reported that an Iran-based hacking group had used EternalBlue as part of its operations.

This situation whereby technologically advanced countries are investing efforts in developing offensive cyber capabilities only to have these very tools stolen and reused raises three critical questions of urgent policy relevance.

First, are states going to start reusing each other’s leaked cyber tools as a matter of course? The ability to reuse stolen cyber tools may signal the beginning of a shift in the distribution of international cyber power, as weaker actors (including non-state actors) become increasingly able to use sophisticated malware to cause global damage and possibly target the cyber weapons’ original designers. Countries that are less technologically advanced and less vulnerable to cyberattacks might find the reuse of stolen vulnerabilities appealing for their own offensive activity.

Second, is it possible to prevent the leaking of cyber tools from occurring in the first place? There aren’t many reasons to be optimistic. First, there’s the insider threat problem—a particularly thorny issue given the extensive use of contractors and the risk that they steal or mishandle sensitive information that they were exposed to during their service. A second and possibly more problematic reason is that it is cheaper to use stolen vulnerabilities than finding new ones. As new vulnerabilities like EternalBlue get exposed, the costs of using stolen cyber vulnerabilities and conducting attacks are being consistently lowered while benefits remain high. States with offensive capabilities know that putting their hands on unique vulnerabilities developed by their adversaries will enable them to more easily launch sophisticated attacks without the need pursue a lengthy and costly R&D process. This makes the reuse of cyber tools especially appealing and may motivate different actors to concentrate their efforts in this direction. As long as the benefits of using the stolen vulnerabilities are higher than the costs, these vulnerabilities will remain an attractive target.

 
 

  source: darkreading.com

The most effective hackers keep things simple, something organizations must take into account.

Organizations continue to learn the hard way that when it comes to IT security, the simplest things often cause the biggest problems. A network is only as secure as its weakest link, so hackers don't need to spend the time and money it takes to develop advanced persistent threats or zero-day attacks; they just need to focus on finding the easiest ways of getting in. In other words, the most effective hackers keep things simple, something organizations must take into account.

With that in mind, here are four basic principles that attackers exploit and companies need to stay on top of in order to secure their network.

1. People Are Almost Your Most-Targeted Link
Hackers looking for a way to infiltrate a network often start with the vulnerabilities of key users — 81% of hacking-related breaches leveraged either stolen and/or weak passwords, according to last year's Verizon Data Breach Investigations Report. Troubling statistics like this should remind us that people are often the hardest part of the security equation. People are fallible and emotional, which is why even regular security awareness training has its blind spots.

Think about it — how easy is it to make somebody's emotions take over in today's world? In the age of connectivity and social networks, it's easier than ever to find professional, personal, or political information that can allow an attacker to craft personalized lures that trigger a response. Inducing such feelings can often lead to irrational behavior, which in return can be something that can be exploited digitally. Additionally, as the lines blur between personal and professional communication platforms, it is important to make sure that security awareness training, especially when it comes to phishing, translates into the new mediums.

2. Flaws Remain Unfixed
Vendors and researchers don't always have the same goals or objectives, and security suffers as a result. There have been many cases where a researcher is forced to publish a legitimate vulnerability publicly because a vendor recognizes it as a true security issue when the matter is brought to its attention privately. This leaves gaping holes for attackers to exploit.

Similarly, when the company in charge of updates is not the owner of the piece of code exhibiting a vulnerability, flaws can remain for an extended period. For example, it can take a long time for a cellphone provider to push an update to users after Google fixes an Android security flaw in the OS. Flaws like this will always be present, providing an entry point for even the least-sophisticated attackers to access a network.