Connect with us

Technology

Tesla recalls all 3,878 Cybertrucks over faulty accelerator pedal

Published

on

Tesla recalls all 3,878 Cybertrucks over faulty accelerator pedal

Tesla has issued a recall for effectively every Cybertruck it’s delivered to customers due to a fault that’s causing the vehicle’s accelerator pedals to get stuck.

The fault was caused by an “unapproved change” that introduced “lubricant (soap)” during the assembly of the accelerator pedals, which reduced the retention of the pad, the recall notice states. The truck’s brakes will still function if the accelerator pedal becomes trapped, though this obviously isn’t an ideal workaround.

The recall impacts “all Model Year (‘MY’) 2024 Cybertruck vehicles manufactured from November 13, 2023, to April 4, 2024,” with the fault estimated to be present in 100 percent of the total 3,878 vehicles. This is essentially every Cybertruck delivered to customers since its launch event last year.

A recall seemed to be inevitable after Cybertruck customers were reportedly notified earlier this week that their deliveries were being delayed, with at least one owner being informed by their vehicle dealership that the truck was being recalled over its accelerator pedal. The issue was also highlighted by another Cybertruck owner on TikTok, showing how the fault “held the accelerator down 100 percent, full throttle.”

The timeline reported in the NHTSA filing says that Tesla was first notified of the defective accelerator pedals on March 31st, followed by a second report on April 3rd. The company completed internal assessments to find the cause on April 12th before voluntarily issuing a recall. As of Monday this week, Tesla said it isn’t aware of any “collisions, injuries, or deaths” attributed to the pedal fault.

Advertisement

Tesla is notifying its stores and service centers of the issue “on or around” April 19th and has committed to replacing or reworking the pedals on recalled vehicles at no charge to Cybertruck owners. Any trucks produced from April 17th onward will also be equipped with a new accelerator pedal component and part number.

This is actually the second of Tesla’s many recalls to affect the Cybertruck, but it is the most significant. The company issued a recall for 2 million Tesla vehicles in the US back in February due to the font on the warning lights panel being too small to comply with safety standards, though this was resolved with a software update.

Tesla fans have taken issue with the word “recall” in the past when the company has proven adept at fixing its problems through over-the-air software updates. But they likely will have to admit that, in this case, the terminology applies.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

TikTok and Universal Music Group end feud with new agreement

Published

on

TikTok and Universal Music Group end feud with new agreement

Universal Music Group has inked a “multi-dimensional” deal with TikTok that will see its roster of artists — which includes Taylor Swift, Drake, and Olivia Rodrigo — return to the social media platform’s one billion-plus users. UMG began pulling its music from TikTok on February 1st after the old contract expired.

Notably, the deal will address concerns that UMG and its artists have with generative AI. “TikTok and UMG will work together to ensure AI development across the music industry will protect human artistry and the economics that flow to those artists and songwriters,” reads a press release announcing the deal. “TikTok is also committed to working with UMG to remove unauthorized AI-generated music from the platform, as well as tools to improve artist and songwriter attribution.”

“We are delighted to welcome UMG and UMPG back to TikTok,” said Ole Obermann, TikTok’s Global Head of Music Business Development. “In particular, we will work together to make sure that AI tools are developed responsibly to enable a new era of musical creativity and fan engagement while protecting human creativity.”

The deal also includes “new monetization opportunities” that stem from TikTok’s growing e-commerce capabilities. TikTok also commits to continue building tools to help artists better leverage the platform in areas like analytics and integrated ticketing.

The companies say they are “working expeditiously” to return artists to the platform.

Advertisement
Continue Reading

Technology

Asus won’t say if the ROG Ally’s SD card reader will ever be truly fixed

Published

on

Asus won’t say if the ROG Ally’s SD card reader will ever be truly fixed

1) Has Asus actually found a hardware fix for the faulty SD card readers? If someone RMAs their Ally to Asus this way, will they get an SD card reader that no longer fails?

Our commitment is to assist all customers effectively. If any user suspects they’re encountering issues with their products, we encourage them to reach out and make use of our RMA process as needed. They can expect us to provide a suitable resolution.

2) What percentage of ROG Ally systems have this issue?

We cannot comment on this at this time.

3) Assuming there is no hardware fix yet, why has the warranty only been extended by one year? 

Advertisement

Apologies Sean, but we cannot comment on assumptions.

4) What does Asus plan to do for customers in territories outside the US? Will we see warranty extensions and SD card reimbursement elsewhere?

Service policies vary from region to region and are subject to local laws and regulations. While I cannot provide you a blanket statement that encompasses all global operations, you can rest assured that our focus is quality and our objective is to effectively answer our users concerns, regardless of location.

Continue Reading

Technology

Ask Kurt: How to avoid phishing scams, protect your iPhone

Published

on

Ask Kurt: How to avoid phishing scams, protect your iPhone

In the digital age, where our lives are intertwined with technology, scammers and hackers lurk in the shadows, always on the prowl for a chance to breach our defenses. They craft their schemes with a facade of legitimacy and an air of urgency, preying on the unsuspecting. It’s a game of wits where staying one step ahead is the key to safety.

Let’s take a look at a real-life scenario that underscores the importance of vigilance:

“Two days ago I received an email (from a local store) thanking me for shopping with them. I unfortunately opened the email and it was an invoice for antivirus software that cost $399.98. I immediately called the number provided but used my landline. I only use my iPhone; don’t own a computer of any kind. Two calls didn’t get me anywhere except to worry. I called my credit card company and with [advised canceling] my credit card. No such charge was in their cue. How [did a hacker] obtain my email and what should I have [done?] I am interested in protecting my IPhone. Please respond with advice.” — Judith, Signal Mountain, Tennessee

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Judith, we’re sorry you had to go through that scary experience of opening what seemed like a legitimate email. Sadly, you are not the only one to suffer from this type of activity called phishing. 

Advertisement

Hackers and scammers alike masquerade as legitimate companies or people with an urgent proposition to get you to open compromising documents or links that can endanger your security. Our digital data is readily available online, which is likely how your email address was obtained. Additionally, it’s possible that the hacker obtained your email address through a phishing attack, data breach or email harvesting. While we are glad that there were no charges on your credit card accounts, below are some steps you can take to secure your iPhone. (Android users, follow these tips.)

Man using his thumb for biometric authentication (Kurt “CyberGuy” Knutsson)

7 steps to outsmart digital intruders

1. Make sure your iPhone is secure with a passcode and biometric authentication (Face or Touch ID) enabled: Because your biometric information is unique to you, it adds a second layer of security before someone can access your phone.

2. Change your Apple ID & email account password: Your Apple ID is important for protecting your information and accessing your iPhone. Opening a phishing email may have compromised your email account. Change your email and Apple ID to unique, complex alphanumeric passwords.

Advertisement

3. Enable two-factor authentication for any account impacted by the phishing scam: This would include both your Apple ID and your email address. If you have this additional layer of security activated, the hacker or scammer would have to send a code to your other device or account to gain access, even with your password. When you step up the two-factor authentication, choose a device that isn’t your iPhone, if possible, so if your phone becomes compromised, you can still gain access.

phishing scam 2

Illustration of emails on smartphone (Kurt “CyberGuy” Knutsson)

MORE: HOW A FLAW IN IPHONE’S SECURITY COULD LEAVE YOU LOCKED OUT

4. Check your email settings: See if there are rules set up to forward emails. If there are any rules set up, delete any you didn’t set up so that your messages aren’t forwarded to someone else’s address.

5. Get SIM-swapping protection added to your phone: SIM-swapping fraud is when someone gains control of your cellphone number by moving it to a new SIM card. If you want to add SIM-swapping protection to your phone, you can contact your provider to see if this feature can be added.

phishing scam 3

Cyberattack warning with sign-in on iPhone (Kurt “CyberGuy” Knutsson)

FINNISH HACKER SENTENCED FOR BLACKMAILING THERAPY PATIENTS AFTER ACCESSING THOUSANDS OF RECORDS

Advertisement

6. Use antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

7. Get identity theft protection: While getting an identity theft service seems like overkill, many identity theft protection services actually provide dark web monitoring services. They continually monitor the dark web to see if any crucial pieces of personal information like your email addresses or social security number end up compromised or up for sale on the dark web. Getting those alerts immediately gives you the opportunity to act faster and take the other steps listed above. If you already gave out your information to a potential scammer, you should follow these steps to see if your identity has been stolen.

One of the best parts of using identity theft protection is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

MORE: UNFORGETTABLE MOTHER’S DAY GIFTS 2024

Kurt’s key takeaways

Despite our best efforts and intentions, we all will or have fallen for a phishing scam at one point or another. Instead of letting the fear of the inevitable terrorize your digital life, take the precautionary steps listed above to stay one step ahead of the scammers even if you slip up.

Advertisement

In what ways do you think technology companies can further enhance user security against cyberthreats? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement

Trending