BitTorrent, the company which owns the popular file-sharing client uTorrent, has quietly been sold for $140 million in cash to Justin Sun, the founder of blockchain-focused startup TRON.

TRON is a decentralized entertainment and content-sharing platform that uses blockchain and distributed storage technology. It allows users to publish content without having to use third-party platforms such as YouTube or Facebook, and trades in Tronix (TRX) cryptocurrency.

Since BitTorrent is one of the most recognizable brands in the world for decentralized computing and peer-to-peer (P2P) networking, and TRON aims to establish a truly decentralized Internet, BitTorrent would be of great use for Sun to help achieve that goal.
Researchers have demonstrated how sonic and ultrasonic signals (inaudible to human) can be used to cause physical damage to hard drives just by playing ultrasonic sounds through a target computer's own built-in speaker or by exploiting a speaker near the targeted device.

Similar research was conducted last year by a group of researchers from Princeton and Purdue University, who demonstrated a denial-of-service (DoS) attack against HDDs by exploiting a physical phenomenon called acoustic resonance.
The Ram 1500 is about far more than off-road fun. The half-ton pickup is now in its 15th generation, comes in six different trims, has two different engines (for now), and can be had with two- or four-wheel drive. And with a weight loss of 225 pounds, some nifty new tech and electric assist, the 2019 Ram 1500 is poised to keep Fiat-Chrysler's pickup competitive for years to come.
Set of 4 Vulnerabilities are discovered in D-Link DIR-620 firmware that allows an attacker to exploit with the hardcoded default credentials to gain high privileged access to the firmware.

D-Link routers are one of the biggest ISPs in Russia based on the Router login string contains hardcoded credentials with the name of the ISP.

The Vulnerabilities allow attack could gain the privileged access to the firmware that leads to extract the sensitive data such as Plain text Passwords.
Chinese security researchers have discovered more than a dozen vulnerabilities in the onboard compute units of BMW cars, some of which can be exploited remotely to compromise a vehicle.

The security flaws have been discovered during a year-long security audit conducted by researchers from Keen Security Lab, a cybersecurity research unit of Chinese firm Tencent, between January 2017 and February 2018.
"The autopilot saved my butt!" the driver said.

A driver on Highway 99 north of Seattle claims his Tesla Autopilot feature saved him from hitting another vehicle at 45 mph.

Recorded by his dashcam and uploaded to YouTube (there’s no sound, so don’t bother adjusting your volume), the driver — who explained he uses his Tesla for his job as an Uber driver — appears to be cruising along until the car comes to an abrupt stop to prevent a crash.
A Google security researcher has discovered a critical remote command injection vulnerability in the DHCP client implementation of Red Hat Linux and its derivatives like Fedora operating system.

The vulnerability, tracked as CVE-2018-1111, could allow attackers to execute arbitrary commands with root privileges on targeted systems.

Whenever your system joins a network, it’s the DHCP client application which allows your system to automatically receive network configuration parameters, such as an IP address and DNS servers, from the DHCP (Dynamic Host Control Protocol) server.