Tesla Introduces Optimus Robot Prototype

Tesla introduces the humanoid Optimus robot prototype and claims to be aiming for a price of under $20,000.

After the event started, Tesla’s eagerly anticipated humanoid robot was unveiled. The prototype walked unfettered across the stage. Tesla’s CEO, Elon Musk, stated that the team is working to make the robot accessible as soon as possible for less than a car at under $20,000.

According to Musk, Optimus is being developed to be a strong robot that can be produced in large quantities. During the event, a video showed the robot moving packages throughout a workplace and watering a plant, among other simple chores.

Tesla also displayed a fully built prototype showing the design of a potential final product. This prototype had a slick, cutting-edge design similar to what was showcased at the event last year.

The Optimus’ hands are designed to have a complete range of motion in their fingers. However, the humanoid movements are not restricted to the hands; the entire robot’s operation is fashioned after a human body. According to a Tesla engineer, the robot will have a human form, a broad range of motion, and strength. The Optimus will be programmed to have human brain-like capabilities, including vision processing, decision-making on the fly, and communicating; this is made possible by Tesla employing autopilot software and a battery pack from its vehicles in the robot.

CEO Elon Musk was passionate about the positive impact Optimus could bring to society and the economy. He stated, “It’ll be a fundamental transformation for civilization as we know it.”

When questioned about an exact timeframe, Musk responded that Optimus deliveries will be “probably within three years and not more than five years.”

The public has been hesitant toward technology since the humanoid robot announcement. After all, the scenario does resemble the ending of a sci-fi horror film in which machines might take over. However, Musk said that despite his attempts to get it out as fast as possible, safety is still a top priority in response to these worries.

It’s anyone’s guess whether a Tesla Bot will ever become a reality since Tesla has a history of fanciful ideas that never materialized. But the company is not where it is today because it decided to produce everything it invented.

Firefox 105.0 Update, The End of Low Memory Crashes and Other Features

The most recent version of Firefox, version 105, was made available for download on September 20, 2022. This version is a minor update that does not offer as many new features as previous versions.

However, the most striking improvement in Firefox 105 is that Mozilla has drastically decreased the number of out-of-memory browser crashes the Windows and Linux users experience.

When the system’s memory becomes low, the improved protection guarantees that the browser’s primary process is not disrupted. In addition, to free up RAM, Firefox 105 will stop content processes in pages that have not been used for an extended period. When the content processes are terminated, only the webpage, rather than the entire browser, becomes unresponsive.

Mozilla’s software developers have also improved the browser’s performance in several ways. Firefox 105 supports multi-finger gestures that allow users to quickly and easily switch between touchpad platforms. There have also been enhancements made to the touchpad scrolling experience on macOS. A new printing option has been added that enables users to print directly from the current page without printing excessive irrelevant information.

Mozilla offers some developer-focused improvements, including optimizing searching in large arrays. This enhancement, along with others in Firefox 105, is aimed at increasing the functionality and efficiency of developers. Furthermore, Firefox 105 Stable resolves seven security concerns classified by Firefox as high vulnerabilities.

On September 23, 2022, Mozilla released an update, Firefox 105.0.1, which addresses a bug reported in the original 105 version. In most circumstances, Firefox will update automatically. However, you can manually verify that you have the most updated version by selecting Menu > Help > About Firefox to perform a manual check for the update.

The next version of Firefox, version 106 and ESR 102.4, is expected to be available for download on October 18, 2022.

Windows 11 2022 Update

Microsoft released the “first major update” for Windows 11 on Tuesday, September 20, 2022, as Windows 11 nears its first anniversary. According to a blog posted by Microsoft, the Windows 11 update focuses on four key areas:

● Making the PC easier and safer to use for everyone
● Empowering people to be more productive
● Making Windows the best place to connect, create and play
● Delivering added security, management, and flexibility to the workplace

Microsoft is committed to making computers more accessible. An added accessibility feature includes system-wide live captions to automatically generate captions from any form of audio content on Windows 11.

Windows 11 also includes snap layouts which have become a game changer for multitasking by helping users optimize their applications and documents. In addition, Microsoft introduced Focus sessions and Do Not Disturb to assist in minimizing distractions.

Advanced artificial intelligence features significantly improve the new Windows Studio camera and audio effects. The Voice Focus, background blur, eye contact, and automatic framing features can assist users in conference calls and content creation.

According to Microsoft, “Windows 11 provides layers of hardware and software integration for powerful, out-of-the-box protection from the moment you start your device – and we’re
continuing to innovate.” For example, within the Windows 11 update is the launch of Microsoft Defender SmartScreen. Microsoft Defender SmartScreen will alert users when their login credentials are entered on a malicious application or website.

The Windows 11 2022 is packed with many subtle changes that all come together to boost
productivity and empower creativity. The changes include enhancements to the file explorer, photo applications, taskbar overflow, and much more.

Microsoft Windows users can access the new features by updating and restarting their
computers. To begin the update for Windows 11 2022, users can go to the start menu, select settings, then choose update and security from the list of options. Next, users are taken to the menu, where they can update and restart their computer immediately or schedule the restart.

Updating to Windows 11, users can experience all the newly added and improved on applications to increase productivity while protecting from known vulnerabilities.

Microsoft 365 Accounts Targeted In New BEC Scam

Recently, researchers at Mitiga have sounded the alarm about a new Business Email Compromise (BEC) campaign.  They discovered evidence of the campaign responding to another incident and have watched the campaign grow in scope and scale over time.

Here’s how the attack works:

The individual targeted by the campaign receives an email that appears to be from a bank and explains that the corporate account they usually send payments to has been frozen while a financial audit is underway.

In the meantime, the email explains that if the target needs to send payments, they can follow the instructions below the message.

The instructions appear to be inside a document behind a DocuSign wall, which is a contract management platform used widely in the corporate world.

To access the instructions, a potential victim needs to press the “Review Documents” button, which hands the victim off to a website controlled by the hackers.

These websites typically have names that appear to be legitimate companies the victim is familiar with, but a careful review of the URL will reveal an intentional typo, which gave rise to the term “typosquatting” to describe this very phenomenon.

On this page, the victim is asked to log into the Windows domain. If they do so, they inadvertently hand the attackers their Microsoft 365 account details which can be used later for any nefarious purpose the hacker’s desire.

On the face of it, this may not seem terribly convincing, but the hackers employ several tricks to make it seem completely legitimate.  Chief among these is the fact that the hackers hijack existing email streams and interrupt them. So to a reader who’s not paying close attention, the instructions seem to come from someone the victim is having an ongoing conversation with.

So far, the campaign has been devastatingly effective, so keep your guard up.  You don’t want to become their next victim.

Oracle Cloud Infrastructure New Vulnerability Patch

In June, Wiz engineers discovered and reported #AttachMe, a critical cloud isolation flaw in Oracle Cloud Infrastructure (OCI).

Due to its potential to affect all OCI customers, the #AttachMe cloud vulnerability is one of the most severe vulnerabilities discovered to date. The majority of the time, cloud isolation flaws only impact a single cloud service. However, in this case, the impact is related to an integral part of the cloud service.

Engineers discovered that no special permissions were necessary to attach a disk to a virtual machine under a different user account. This suggests that a potential attacker could have gained access to and modified the data of any OCI client and, in certain circumstances, take control of the environment.

Before the patch, any OCI customer could have been a target of a malicious actor familiar with the #AttachMe vulnerability. If the attacker had the Oracle Cloud Identifier, any unattached or attached storage volume that allowed multiple attachments could have been viewed or altered (OCID). This would have allowed sensitive data to be stolen and future attacks initiated through executable file manipulation.

After being informed by Wiz of the vulnerability, Oracle quickly and efficiently distributed a patch for #AttachMe to all OCI customers in less than one day.

The separation of tenants is a critical aspect of cloud computing. Customers expect their data to be inaccessible to other customers. Still, vulnerabilities in cloud isolation break down the walls between tenants. This demonstrates the critical need for proactive research into cloud vulnerabilities, ethical disclosure, and public tracking of cloud vulnerabilities for cloud security.