Connect with us

Technology

San Francisco wants to slow robotaxi rollout over blocked traffic and false 911 calls

Published

on

San Francisco wants to slow robotaxi rollout over blocked traffic and false 911 calls

San Francisco transportation officers need Waymo and Cruise to sluggish the growth of their robotaxi providers within the metropolis attributable to security considerations, as reported earlier by NBC Information. In two letters written to the California Public Utilities Fee (CPUC), the officers on San Francisco County’s Transportation Authority say the growth of both service “is unreasonable,” citing current incidents involving stopped driverless automobiles blocking site visitors and obstructing emergency responders.

The GM-backed Cruise and Alphabet-owned Waymo are at present the one firms permitted to supply driverless rides to passengers in San Francisco. In June, Cruise received a allow to cost for rides in its autonomous automobiles (AV) between 10PM and 6AM, whereas Waymo obtained a allow to supply absolutely driverless rides just a few months later. In contrast to Cruise, Waymo nonetheless can’t cost for driverless rides, because it’s nonetheless awaiting an extra allow from the CPUC.

Now that each firms have had their absolutely driverless automobiles on San Francisco streets for a number of months, we’re beginning to see the automobiles’ response — or lack thereof — to complicated site visitors conditions.

In July, a gaggle of driverless Cruise automobiles blocked site visitors for hours after the automobiles inexplicably stopped working, and the same incident occurred in September. In the meantime, a driverless Waymo automobile created a site visitors jam in San Francisco after it stopped in the course of an intersection earlier this month. The Nationwide Freeway Site visitors Security Administration opened an investigation into Cruise final December over considerations concerning the automobiles blocking site visitors and inflicting rear-end collisions with exhausting braking.

“A sequence of restricted deployments with incremental expansions — moderately than limitless authorizations — provide one of the best path towards public confidence in driving automation and business success in San Francisco and past,” the letter reads.

Advertisement

Firefighters say they may solely cease a Cruise automobile from working over the hose after “they shattered a entrance window” of the automotive

Nonetheless, metropolis officers additionally specific concern over the best way driverless automobiles cope with emergency automobiles. Final April, officers say an autonomous Cruise automobile stopped in a journey lane and “created an obstruction for a San Francisco Hearth Division automobile on its solution to a 3 alarm hearth.”

Months later, a Cruise AV “ran over a hearth home that was in use at an energetic hearth scene,” and one other Cruise automobile virtually did the identical at an energetic firefighting scene earlier this month. Firefighters say they may solely cease the automobile from working over the hose after “they shattered a entrance window” of the automotive. Different incidents contain Cruise calling 911 about “unresponsive” passengers on three separate events, just for emergency providers to reach and discover that the rider simply fell asleep.

“Cruise’s security file is publicly reported and consists of having pushed tens of millions of miles in a particularly complicated city atmosphere with zero life-threatening accidents or fatalities,” Cruise spokesperson Aaron Mclear tells The Verge.

Whereas the San Francisco Transportation Authority helps the growth of driverless expertise, it desires extra transparency and extra safeguards put in place. Officers say firms ought to be required to gather extra knowledge concerning the efficiency of the automobiles, together with how typically and the way lengthy their driverless automobiles block site visitors. It additionally desires to limit AV firms from working on San Francisco’s “downtown core streets” throughout peak journey hours till they show that they will constantly function “with out important interruption of road operations and transit providers.”

Advertisement

Even nonetheless, Cruise is seeking to function its paid robotaxi service in San Francisco 24 / 7. Whereas the corporate gained approval from the California Division of Motor Automobiles in December, it’s nonetheless ready for the inexperienced mild from CPUC. Each firms already provide rides in Phoenix, Arizona, and Cruise introduced its robotaxi service to Austin, Texas, too.

“These letters are a typical a part of the regulatory course of, and now we have lengthy appreciated a wholesome dialogue with metropolis officers and authorities companies in California,” Waymo spokesperson Katherine Barna says in an announcement to The Verge. “Waymo may have the chance to answer in our submission to the CPUC subsequent week.”

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Fox News AI Newsletter: How artificial intelligence is reshaping modern warfare

Published

on

Fox News AI Newsletter: How artificial intelligence is reshaping modern warfare

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– How artificial intelligence is reshaping modern warfare
– Sebastian Maniscalco admits AI makes a guy who writes like ‘Rocky Balboa’ sound like he ‘went to Yale’
– Researchers create AI-powered sarcasm detector

NEXT-GEN BATTLE: Modern warfare is changing rapidly, and harnessing artificial intelligence is key to staying ahead of America’s adversaries.

Pentagon illustration

Modern warfare is rapidly changing — and artificial intelligence may only speed up that process. (istock)

TECHNICALLY SPEAKING: Comedian Sebastian Maniscalco isn’t sure what to make of artificial intelligence in the industry. 

Advertisement

FUNNY BOT: A team of university researchers in the Netherlands says they’ve developed an artificial intelligence (AI) platform that can recognize sarcasm, according to a new report.

AI letters

AI (artificial intelligence) letters are placed on a computer motherboard in this illustration taken on June 23, 2023.  (REUTERS/Dado Ruvic/Illustration)

‘OUTCOMPETE CHINA’: A bipartisan group of U.S. senators on Wednesday joined in a call to boost American funding of artificial intelligence research.

‘MACHINE LEARNING’: The widespread use of artificial intelligence tools has many workers concerned that the rapidly-evolving technology will eventually result in them losing their job, and one expert says that is a real concern — but not in the way some might expect.

Ukraine Drone training

A recruit of the 1st Separate Mechanized Battalion ‘Da Vinci Wolves’ named after Dmytro Kotsiubailo trains and learns to work with FPV strike drones while undergoing five-day training at a military outdoor firing range on March 12, 2024, in central Ukraine. After training, recruits can join the Armed Forces of Ukraine to defend Ukraine in the war started in 2014 and escalated during the full-scale Russian invasion in 2022.  (Valentyna Polishchuk/Global Images Ukraine via Getty Images)

AI AT WAR: The world may end up breaking into tech alliances as a guiding political issue in the years to come, according to a retired American serviceman-turned-novelist as detailed in his new book. 

Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Advertisement

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

Advertisement

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Advertisement

Continue Reading

Technology

This modder proves everything’s better with a GBA SP screen attached

Published

on

This modder proves everything’s better with a GBA SP screen attached

Have you ever looked at a Nintendo DS and thought it would be cooler if the top screen was swapped for the Game Boy Advance SP’s? Or looked at a Super Nintendo controller and wished it had a GBA SP screen bolted onto the back? Whether you have or not, Hardware modder Hairo Satoh, aka Retrohai hai Softbank, has you covered with some truly cursed reimaginings of Nintendo’s portable consoles. (Recall their portable emulated PlayStation built into the Takara Roulette Controller.)

Let’s go on a little journey through Satoh’s Instagram account. Before we get into my favorite mutated Nintendo handhelds — frankententos, if you will — know that Satoh also does some very pretty custom jobs on the company’s various portable consoles. And they’re made to order.

This one they posted recently is a good example. We are Known Transparent Case Stans here at The Verge, but this goes a step further with its colorful hologram stickers and ChromaFlair-style color-changing sheen. Oh, and it runs Game Boy Advance games.

That controller mod I mentioned up top isn’t the only time Satoh has turned a console gamepad into its own handheld. The GBA SP’s screen looks remarkably at home on an SNES (well, Super Famicom, technically) pad…

…and on a PS2 Dual Shock controller, too.

Advertisement

But why not jam one onto a Nintendo DS Lite, too? It doesn’t make sense at all, even if this is a mash-up of the two most attractive pieces of hardware Nintendo ever made, but I don’t need any justification for this thing’s existence. Also, this is the point where things start getting a little cursed.

I guess this is also a Nintendo DS?

Again, but more colorful.

Ah yes, the Original Game Boy Advance SP DS (OGBASPDS).

I’m enamored with the concept of a multi-position adjustable screen on this original DS.

Advertisement

Give me this and the ability to emulate the fantastic vertical-scrolling shooter Ikaruga, please.

Ah, yes, this makes sense.

I can’t say I understand the extra buttons and d-pad here, but I respect the chaos.

The Nintendo Long Boy DS.

I think this is probably the final boss of Satoh’s inventive creations.

Advertisement

Satoh didn’t respond to us when we reached out, but we’d love to know more about these creations. How much of these are made up of custom hardware on the inside? How many of them are emulating Nintendo’s handhelds, rather than rejiggering its original hardware components to fit? If we receive a response, we’ll dig in some more.

Continue Reading

Technology

Massive Dell data breach hits 49 million users; what this means for your privacy and security

Published

on

Massive Dell data breach hits 49 million users; what this means for your privacy and security

Computer maker Dell faced a huge security challenge after a cyberattack stole information for approximately 49 million customers. 

Dell confirmed that the type of information stolen includes people’s names, postal addresses, and Dell hardware and order information, such as service tags, item descriptions, order dates and different warranty information.

What happened: a breakdown of the incidents

Menelik, the threat actor behind the attack, openly told told TechCrunch how he extracted such a huge amount of data from Dell without being detected.

CLICK HERE TO GET KURT’S FREE NEWSLETTER, THE CYBERGUY REPORT

Advertisement

Menelik set up several partner accounts within the Dell company portal which, when approved, allowed the hacker to use a brute-force attack to access customer data. A brute-force attack consists of an attacker submitting many passwords or passphrases hoping to eventually guess correctly.

The hacker sent more than 5,000 requests per minute to the page for nearly three weeks, and Dell did not notice anything. After sending nearly 50 million requests and scraping enough data, Menelik sent multiple emails to Dell, notifying the company of the vulnerability. It took Dell nearly a week to patch it all up, according to the hacker. Dell confirmed to TechCrunch that it received the hacker’s email notification of the vulnerability.

open dell laptop

MASSIVE FREE VPN DATA BREACH EXPOSES 360 MILLION RECORDS

How Dell responded to the data breach

Dell sits as the No. 3 PC vendor in the world behind Lenovo and HP, and the affected accounts represent a small fraction of its user base. The company communicated this statement to affected users:

“We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell. We believe there is not a significant risk to our customers given the type of information involved.”

Advertisement

We reached out to Dell and a representative for the company provided us with this statement:

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

“Dell Technologies has a cybersecurity program designed to limit risk to our environments, including those used by our customers and partners. Our program includes prompt assessment and response to identified threats and risks. We recently identified an incident involving a Dell portal with access to a database containing limited types of customer information including name, physical address, and certain Dell hardware and order information. It did not include financial or payment information, email address, telephone number or any highly sensitive customer data. 

“Upon discovering this incident, we promptly implemented our incident response procedures, applied containment measures, began investigating, and notified law enforcement. Our investigation is supported by external forensic specialists. We continue to monitor the situation and take steps to protect our customers’ information.  Although we don’t believe there is significant risk to our customers given the type of information involved, we are taking proactive steps to notify them as appropriate.”

DELL COMPUTERS

WHAT A MASSIVE HEALTHCARE CYBERATTACK AT ASCENSION MEANS FOR YOUR PRIVACY AND SECURITY

Advertisement

What this means for your privacy and security

There’s no immediate aftermath of this data leak. Dell believes the risk to its customers is not significant since financial and payment information, email addresses and phone numbers were not stolen in this attack. However, the risk of phishing or even major malware and ransomware attacks still exists. The threat actors might try sending personalized letters with infected drives, a tactic seen before.

ASK OUR TECH EXPERT ANY QUESTION, AND GET KURT’S FREE CYBERGUY REPORT NEWSLETTER HERE

There’s a good chance this data leak has already been sold on the dark web. The hacker posted the information for sale on the dark web and then took it down quickly, which often happens when someone buys the whole database. If you’re a Dell customer who bought hardware between 2017 and 2024, be very careful about any messages you get in the mail claiming to be from Dell, especially if they ask for personal information.

OVER HALF A MILLION ROKU ACCOUNTS COMPROMISED IN SECOND CYBER SECURITY BREACH

Line of laptops

Advertisement

7 proactive measures to take to protect your data

In the wake of the cyberattack on Dell, consider taking several proactive steps to protect your personal information:

1. Change your passwords: Although Dell says your personal details like phone number and email address haven’t been leaked, it’s still advisable to change the password of your Dell account if you have one. Consider using a password manager to generate and store complex passwords.

2. Avoid tech support phone scams: Since the hackers have your data, they may try to get in touch with you, posing as a Dell employee. Always verify if the tech support person you’re talking to actually works for Dell. Be skeptical about all unsolicited phone calls, and don’t provide any personal information.

3. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.

4. Report any suspicious activity: If you notice any suspicious activity related to your Dell accounts or purchases, report them to security@dell.com. This may include unauthorized purchases, unusual login attempts, or changes in account information.

Advertisement

QUICK TIPS. EXPERT INSIGHTS. CLICK TO GET THE FREE CYBERGUY REPORT NEWSLETTER

5. Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or the authorities as soon as possible. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

6. Use identity theft protection

Identity Theft protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number and email address and alert you if it is being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

Advertisement

7.  Invest in personal data removal services: While no service guarantees complete data removal from the internet, utilizing a removal service can be beneficial for those seeking to monitor and automate the deletion of their personal information from numerous sites over time. Check out my top recommendations for removal services here.

Kurt’s key takeaways

Dell’s recent data leak highlights the lapse in the computer maker’s security infrastructure. The attackers being inside the network for an extended period is especially troubling. Given Dell’s role in providing hardware and software solutions, including backup and recovery tools, for critical infrastructure, a thorough investigation into its code and supply chain for signs of tampering is crucial. Dell is working with law enforcement and third-party security experts to investigate the incident, so that’s a step in the right direction.

Have you adjusted your online behavior or preferences due to concerns about data privacy and security breaches? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on Facebook, YouTube and Instagram

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Trending