There’s a handful of cars that virtually all people can recognize, and the original Lamborghini Countach, which was manufactured from 1974 to 1990 is among them. Now, the Italian automobile manufacturer is bringing the ‘80s icon back as a hybrid.
The new version is called the Countach LPI 800-4, and it’s supposed to honor the 50th anniversary of the original release. LPI stands for Longitudinale Posteriore Ibrido, or Longitudinal Posterior Hybrid in English. The number 800 is the total output of the hybrid powertrain (804 brake horsepower to be precise), and the number 4 indicates that the car uses a permanent four-wheel drive transmission.
Just like the original Countach, the hybrid successor has a naturally aspirated V12 engine, but the engine is assisted by a 48 V electric motor powered by the same supercapacitor technology used in Lamborghini’s Sián. Because the car is made out of carbon fiber and weighs just 1,595 kilograms (3,516 pounds), it can produce a 0–100km/h time of 2.8 seconds, a 0–200km/h time of 8.6 seconds, and a top speed of 355km/h.
But performance isn’t what the original Countach is remembered for — the distinctive angular and geometric styling is.
“The first Countach has been present in our Centro Stile as a model for some years now,” said Lamborghini’s design boss Mitja Borkert. “Whenever I look at it, it gives me goosebumps, and it serves as the perfect reminder for me and the entire design team to design every future Lamborghini in a visionary and futuristic way.”
While the hybrid isn’t quite as angular as the original one (blame years of aerodynamic research), Lamborghini has successfully captured the essence of Countach and produced a car that every cyberpunk megacorp CEO would love to own.
But even if you’re actually are a CEO with over €2 million to spare, you can’t buy your own Countach LPI 800-4 because all 112 units (that’s how many Lamborghini is making) are sold out, and their owners will receive them in the first quarter of 2022.
New Variants Of Android Spyware Are Targeting Middle East Users
Sophos recommends Android users to never install apps from untrusted sources and avoid ignoring available OS and app updates.
British security software and hardware company Sophos has recently revealed that new variants of Android spyware used by the C-23 group are actively targeting users in the Middle East.
C-23, also known as GnatSpy, FrozenCell, or VAMP, is what cybersecurity professionals refer to as an advanced persistent threat (APT) adversary. Such adversaries are typically well-funded and well-organized, which allows them to quickly evolve their tactics to overcome even the most sophisticated cybersecurity defenses.
The C-23 adversary has been known for targeting individuals in the Middle East since at least 2017, with a particular focus on the Palestinian territories.
The latest variants of its Android spyware are most likely distributed via a download link sent to victims as text messages. The link leads to a malicious app that pretends to install legitimate updates on the victim’s mobile device. When the app is launched for the first time, it requests a number of permissions that let it spy on the victim. It then disguises itself to make removal more difficult.
“The new variants use more, and more varied, disguises than previous versions, hiding behind popular app icons such as Chrome, Google, Google Play, YouTube, or the BOTIM voice-over-IP service” explain Sophos. “If targets click a fraudulent icon, the spyware launches the legitimate version of the app, while maintaining surveillance in the background”.
The information the new spyware can steal includes everything from text messages to the names of installed apps to contacts from all kinds of apps, including Facebook and WhatsApp. The spyware can even dismiss notifications and toggle “Do Not Disturb” settings.
Sophos recommends Android users to never install apps from untrusted sources and avoid ignoring available OS and app updates. The company’s own mobile antivirus app, called Sophos Intercept X for Mobile, can detect the new spyware as well as all kinds of other malicious software.