Header Image - Hugg Tech Computers, LLC

Drones (CNN)

Join the conversation by leaving a comment below!

CNN iReport

By Christina Zdanowicz, CNN

updated 3:33 PM EDT, Thu May 22, 2014 

Source: CNN

STORY HIGHLIGHTS

  • Hobbyists are using small drones to shoot aerial photography
  • With a few hundred dollars and practice, you can make breathtaking aerial videos
  • Keep drones and other model aircraft less than 400 feet above the ground
  • Learn to fly a cheap, toy drone, before adding a camera

(CNN) — A bird’s eye camera sweeps over the green fields of Ireland, flies over the towering Cliffs of Moher and pans the ocean hundreds of feet below.

It’s just like a scene in a movie. But this is not Hollywood magic. The spectacular footage was shot, not by a film crew in a helicopter, but with an inexpensive toy drone — an unmanned aerial vehicle, or UAV, as hobbyists call them — operated by Andreas Ostermann.

And with a few hundred dollars and some practice, you can make breathtaking aerial videos, too.

“It is the closest thing to flying like a bird,” said Ostermann, an aerial-photography hobbyist who lives in Germany. “My inspiration is to show how beautiful these shots can be and that this hobby is not at all dangerous if you know what you do.”

The world of remote-control aircraft has been around for decades, but the growth and technological wizardry of UAVs have created a new wave of hobbyists trying their hand at aerial photography.

From views of stunning vistas, waterfronts and landmarks to overhead shots of a house about to fall off an eroding cliff or a cheery scene of a fox trotting on ice, there are a lot of creative, fun ways people are using recreational drones for aerial videos.

A drone-eye view of Lake Havasu City, Arizona.

“Originally it was just a bunch of guys tinkering and building things. Now people want to focus on the applications rather than the technology,” said Timothy Reuter, founder of the Washington, D.C. Area Drone User Group, the largest UAV club in the country.

Instead of building drones from kits, Reuter and others like him are turning to off-the-shelf models that are ready to fly.

“Recently some of the sophisticated capabilities have gotten cheap and easy to use,” he said. “The difference between the professional and hobbyist tools isn’t that big anymore — that’s part of the revolution.”

Since the FAA’s 2007 warning not to use drones for commercial purposes, there’s been some debate and confusion in the hobbyist community about what you can and can’t do with aerial photography. So before you go out and strap a GoPro to a ready-made drone, here’s what you need to know:

Learn the rules

Keep drones and other model aircraft less than 400 feet above the ground and make sure you’re not within 3 miles of an airport or air traffic, per FAA guidelines. Also check your state law, as some states are more strict with trespassing laws. Flying over someone’s land could be considered trespassing.

While it’s tempting to turn aerial drone photography into a business, beware that the FAA regulates commercial flights on a case-by-case basis. Only two commercial operations have been approved, and those are for exploratory flights in the Arctic.

A DJI Phantom drone captured in action.

P.S. Before you take your drone to shoot footage on vacation, do your research first. UAV laws vary in each country.

Join a club or find an instructor

It’s better to work with experienced flyers than to test the skies alone.

“Find a community to learn with if you’re going to be serious, like a drone group or through the Academy of Model Aeronautics,” said Reuter. “They’ll teach you how to be safe and prevent any accidents.”

Study different models and what they can do

Toy drones, like the Blade Nano QX, are great introductory models for people learning how to fly, said Reuter. This model runs about $80 online.

Moving up to mid-range models, consider UAVs that come fully assembled, such as 3D Robotics’ Iris model, which runs $750. The company’s CEO, Chris Anderson, pioneered one of the first online drone forums, DIY Drones.

One of the more popular mid-range UAVs is DJI’s Phantom series. This quadcopter, priced from $500 without a camera and $1,000 and up for a model with an attached GoPro, is geared toward folks interested in aerial photography.

If you’re looking for something smaller than the Phantom, check out Reuter’s recent creation, the Pocket Drone. The multi-copter is lightweight and portable enough to fit in a backpack, he said.

Start small

Learn to fly a cheap toy drone before adding a camera. Once you know how to operate that, you can fly a larger model, advises Patrick McKay, a Colorado hobbyist who’s been flying UAVs since 2011.

“Don’t invest too much initially, since you will inevitably crash a lot while learning.”

A video-piloted remote control flying wing made from a kit.

Keep practicing until you’re comfortable

Canadian photographer Brent Foster encourages newcomers to learn how to fly in manual mode first. That way if your GPS goes out, “it’ll save you from a crash,” said the former LA Times photojournalist who got hooked on flying UAVs two years ago.

Knowing your gear and its limitations will be valuable for when you fly in new, sometimes unpredictable situations, several UAV hobbyists said.

Video: How to get started flying UAVs

Put safety first

“Always think about what you might hit if your craft crashed on a given flight,” said McKay, a Colorado hobbyist.

“Don’t fly over large crowds of people doing event photography unless you have a lot of experience and confidence in your equipment, and stay away from areas/altitudes where you could pose a collision risk to manned aircraft.”

Use online resources

Online forums and Facebook groups are great place to learn more about the hobby. DIY Drones is a pioneer forum that continues to be active. Other online resources include Multi-Rotor Forums, the DJI Phantom Users Group on Facebook and tons of local radio-controlled flyer group sites.

Have fun

Once you have the rules, safety precautions and practice time under your belt, it’s time to have fun.

“I love flying in the mountains and zooming down mountainsides,” said McKay. “It allows me to experience all the thrills of flight in spectacular locations with my body never leaving the ground.”

Hackers locking iPhones, demanding ransoms

Hackers appear to be remotely locking iPhones and iPads, mostly in Australia, then demanding a ransom to unlock them.

Hackers appear to be remotely locking iPhones and iPads, mostly in Australia, then demanding a ransom to unlock them.

(CNN) — A large number of people, mostly located in Australia, are reporting they have come under an unexplained attack that holds their iPhones and iPads hostage and demands they pay a $100 ransom.

The attack appears to work by compromising iCloud accounts associated with the disabled devices, according to an Apple support forum discussion that started Sunday morning and quickly accumulated several hundred posts.

Commandeered devices typically emit a loud tone that’s associated with a feature that helps users locate lost or stolen devices. iPhones and iPads also display the message: “Device hacked by Oleg Pliss. For unlock device, you need send voucher code by 100 usd/eur (Moneypack/Ukash/PaySafeCard) to email:lock404@hotmail.com for unlock.”

In some cases—specifically, when a user hasn’t assigned a strong passcode to a locked device—it can only be unlocked by performing a factory reset, which completely wipes all previously stored data and apps.

The mass compromise is a variation on so-called ransomware scams, which initially targeted Windows PC users and earlier this month were found targeting smartphone users running Google’s Android OS.

The forum accounts provide strong evidence that victims’ Apple IDs and passwords have been compromised so that attackers can remotely lock connected devices using Apple’s Find My iPhone service.

But so far it remains unclear exactly how the attackers are compromising the iCloud accounts.

While it’s possible the hijackers used phishing attacks or hacked password databases to obtain the credentials, those explanations are undermined by the observation that the vast majority of victims were located in Australia and reported using a variety of e-mail providers. Typically, phishing campaigns and database compromises involving multiple providers affect users from more geographic regions.

DNS poisoning?

One participant in the online discussion theorized the mass compromise may have been the result of hacking domain name system (DNS) servers used by Australian service providers to translate human readable addresses such as Apple.com into the IP addresses Internet routers rely on.

Such an attack, which has yet to be confirmed in this case, works by “poisoning” the lookup tables of DNS servers so they secretly direct people to impostor sites. Assuming this technique was at play in the iPhone and iPad locking, affected users who entered a password on what appeared to be Apple’s site could have unknowingly provided it to the people behind the attack.

Apple officials have yet to comment on the report. There is no indication the hijackings are the result of any compromise on Apple servers, so that leaves end users to figure out for themselves how to secure their own devices.

Readers are once again advised to use long, randomly generated passwords that are unique to their iCloud account. They should also enable two-factor authentication and assign a separate, randomly generated passcode to each iPhone and iPad they own.

Readers are reminded they can be permanently locked out of their Apple ID accounts, and possibly their iPhone or iPad when running iOS 7 with Find My iPhone turned on, if they are compromised before two-factor authentication is enabled. Two-factor authentication won’t automatically prevent an attacker from compromising an iCloud account, but it will prevent the attacker from changing security questions and other crucial settings in the event of a breach.

The identities of the people behind the attack are unknown. There’s no indication they have any connection to anyone named Oleg Pliss.

People with a locked device should immediately try changing the credentials for their Apple ID and ensure two-factor authentication is set up. In the event their locked device didn’t have a passcode associated with it, they can perform a factory reset by using a cable to plug the device into their computer while iTunes is open.

More instructions are here.

 

COPYRIGHT 2011 ARSTECHNICA.COM

Your car is a giant computer – and it can be hacked (CNN)

Imagine driving down the highway at 70 miles per hour, when suddenly the wheel turns hard right. You crash. And it was because someone hacked your car.

It’s not far-fetched science fiction. It’s the near-term future today’s hackers are warning about.

Most people aren’t aware their cars are already high-tech computers. And now we’re networking them by giving them wireless connectivity. Yet there’s a danger to turning your car into a smartphone on wheels: It makes them a powerful target for hackers.

Interviews with automakers, suppliers and security advisers reveal a major problem with the new wave of “connected” cars: The inside of your car has ancient technology that presents a security risk.

  • The 50 to 100 tiny computers that control your steering, acceleration and brakes are really dumb. They rarely conduct authentication, checking whether that message is really coming from you. An outsider can send them commands.
  • The computer code in cars is outdated. It’s similar to the on/off switches used in industrial controls. It’s easily manipulated.
  • Much like the human central nervous system, every electronic part inside a car is connected to a central spine. Tap one part, you can likely reach any other.

“The protocol and internal parts of the car were never meant to be connected to anything,” said Joe Klein, a researcher at security firm Disrupt6.

Cars’ computers were built safely enough back in the 1990s, when the car was a closed box. But their architecture won’t hold up as we hook them up to the Internet.

Related story: Tesla car doors can be hacked

Consider the level of complexity of modern day cars — and the chance for a screw up. The space ship that put humans on the moon, Apollo 11, had 145,000 lines of computer code. The Android operating system has 12 million. A modern car? Easily 100 million lines of code.

“Auto manufacturers are not up to speed,” said Ed Adams, a researcher at Security Innovation, a company that tests the safety of automobiles. “They’re just behind the times. Car software is not built to the same standards as, say, a bank application. Or software coming out of Microsoft.”

The nightmare scenario: Hackers access your car’s core controls by breaching its Internet-connected entertainment system and tamper with your brakes.

Hackers have already proven that scenario can happen. Security engineers Charlie Miller and Chris Valasek demonstrated last year how they could hijack control of a car by connecting laptops to the dashboard.

 

Hackers control car’s steering and brakes

But cars are going wireless. The next generation of Audi and Tesla (TSLA) automobiles are connected to the AT&T (T) network. Wires won’t be needed to hack them.

Related: Cybersecurity: How safe are you?

Meanwhile, there’s a growing potential for car malware. Makers of “infotainment” systems — dashboards that function like a tablet — are racing to add fun apps. But if automobiles’ internal electronics remain insecure, downloading a malicious app to your car could spell big trouble. That’s why auto suppliers are taking initiative.

Harman (HAR) makes Bluetooth audio devices that end up in BMWs, Hyundais, Mercedes-Benzes and others. The company is adding its own layers of security by using software to virtually separate the entertainment system from the car’s network. It raises the bar of difficulty for a hacker to use a music app to worm his way into your steering controls.

Sachin Lawande leads Harman’s infotainment division and justifies its initiative: “The assumption we’re making is that it’ll take a while for the auto industry to move to a more secure internal network than what we have today.”

Continental, one of the world’s three major auto parts suppliers, is partnering with IBM (IBM) and Cisco (CSCO) to make firewalls that control the information flow between the car’s devices. Until it gets security all figured out, the German company is holding back from adding full Internet connectivity features, such as real-time information from the engine that alerts the local car shop ahead of time.

“Without having a good firewall or security in place, I can’t go to the auto manufacturer and say, ‘Let me have access to information from engine management,'” said Tejas Desai, Continental’s head of interior electronics for North America.

Related story: Half of American adults hacked this year

For their part, car manufacturers are working on these problems too.

Ford (F) hardware has built-in firewalls to prevent malicious tampering, and the company has a team of noble hackers constantly probing for weaknesses.

Toyota (TM) does all that too, plus it embeds security chips in the tiny computers throughout the car, narrowing how they communicate and lessening the chance of outsider interference. The company even has forward-thinking plans this year to visit the world’s largest hacker conference, Black Hat.

It should be no surprise that Tesla (TSLA) is ahead of the pack. The Model S is the most advanced and connected car currently available. It’s worth noting the company’s mature approach to addressing vulnerabilities. Instead of hunting down hackers who spot weaknesses, they reward them with an “Information Security” badge that works like a Willy Wonka golden ticket, granting exclusive access to Tesla’s factory in Fremont, Calif. The company recently sent one to a British hacker who goes by Jon of Bitquark.

But there remains a glaring, three-prong problem beneath all of these security approaches. The car’s many little computers will continue to be connected to one another. All auto makers are moving toward Internet-connected cars. And no one is willing to physically separate the core controls from the car’s wireless communication hub.

That’s partly because federal regulators will soon demand that cars automatically relay information wirelessly to one another as part of the U.S. government’s vehicle-to-vehicle communication program. Those car-to-car messages will one day be able to engage breaks — or your steering wheel.

If decades of computer hacking has shown us anything, it’s that smart people will find a way to break in and bounce around.

Scott Morrison, who oversees automotive app engineering at CA Technologies (CA), acknowledged all of these problems exist and said the industry knows what’s on the line.

“They’re very aware they don’t get second chances on this, so they’re taking it very seriously,” he said.

First Published: June 1, 2014: 1:27 PM ET