January 2017 is third warmest month in 137 years

February 17, 2017

New York, Feb 17: Last month was the third warmest January in 137 years of modern record-keeping, according to a monthly analysis of global temperatures by Nasa scientists. Last month"s temperature was 0.20 degrees Celsius cooler than the warmest January in 2016. However, it was 0.92 degrees Celsius warmer than the mean January temperature from 1951-1980.temp

Two of the three top January temperature anomalies have been during the past two years. Year 2016 was the hottest on record, at 1.12 degrees Celsius warmer than the January mean temperature, followed by 2007 at 0.96 degrees Celsius warmer. January 2017 placed third. Scientists at Nasa"s Goddard Institute for Space Studies (GISS) in the US created a map of the January 2017 land-ocean temperature index (LOTI) anomaly.

It shows that most of North America and Siberia were much warmer than the 1951-1980 base period. Much of the rest of Asia was also relatively warm. The monthly analysis by the GISS team is assembled from publicly available data acquired by about 6,300 meteorological stations around the world, ship- and buoy-based instruments measuring sea surface temperature, and Antarctic research stations. The modern global temperature record begins around 1,880 because previous observations did not cover enough of the planet.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 28,2020

The US space agency has thrown open a challenge to win over Rs 26 lakh, calling the global community to send novel design concepts for compact toilets that can operate in both microgravity and lunar gravity.

NASA is preparing for return to the Moon and innumerable activities to equip, shelter, and otherwise support future astronauts are underway.

The astronauts will be eating and drinking, and subsequently urinating and defecating in microgravity and lunar gravity.

NASA said that while astronauts are in the cabin and out of their spacesuits, they will need a toilet that has all the same capabilities as ones here on Earth.

The public designs for space toilet may be adapted for use in the Artemis lunar landers that take humans back to the Moon.

"Although space toilets already exist and are in use (at the International Space Station, for example), they are designed for microgravity only," the US space agency said in a statement.

NASA's Human Landing System Programme is looking for a next-generation device that is smaller, more efficient, and capable of working in both microgravity and lunar gravity.

The new NASA challenge includes a Technical category and Junior category and the last date to send designs is August 17.

NASA's Artemis Moon mission will land the first woman and next man on the lunar surface by 2024.

The Artemis programme is part of America's broader Moon to Mars exploration approach, in which astronauts will explore the Moon and experience gained there to enable humanity's next giant leap, sending humans to Mars.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 23,2020

Google has indexed invite links to private WhatsApp group chats, meaning anyone can join various private chat groups (including several porn-sharing groups) with a simple search.

According to a report in Motherboard, invitations to WhatsApp group chats were being indexed by Google.

The team found private groups using specific Google searches and even joined a group intended for NGOs accredited by the UN and had access to all the participants and their phone numbers.

Journalist Jordan Wildon said on Twitter that he discovered that WhatsApp's "Invite to Group Link" feature lets Google index groups, making them available across the internet since the links are being shared outside of WhatsApp's secure private messaging service.

"Your WhatsApp groups may not be as secure as you think they are," Wildon tweeted on Friday, adding that using particular Google searches, people can discover links to the chats.

According to app reverse-engineer Jane Wong, Google has around 470,000 results for a simple search of "chat.whatsapp.com", part of the URL that makes up invites to WhatsApp groups.

WhatsApp spokesperson Alison Bonny said: "Like all content that is shared in searchable public channels, invite links that are posted publicly on the internet can be found by other WhatsApp users."

"The links that users wish to share privately with people they know and trust should not be posted on a publicly accessible website," Bonny told The Verge.

Danny Sullivan, Google's public search liaison, tweeted: "Search engines like Google & others list pages from the open web. That's what's happening here. It's no different than any case where a site allows URLs to be publicly listed. We do offer tools allowing sites to block content being listed in our results."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.