Part cow, part… bacterium? Biotech company makes heifer of gene-editing blunder

https://arstechnica.com/?p=1560849

A Holstein calf, which has not been gene-edited.
Enlarge /

A Holstein calf, which has not been gene-edited.

A Minnesota-based gene-editing company is left red in the face after it took on bull genetics—and got slammed.

The company, Recombinetics, set out years ago to genetically engineer Holstein dairy cattle to come without their troublesome horns, which farmers typically remove to keep themselves and other cows safe. In 2015, the company seemed to have succeeded, unveiling two hornless bulls, Spotigy and Buri. Recombinetics touted them as a bona fide, 100%-bovine success story.

Though Spotigy was sacrificed for research, Buri lived on to sire 17 offspring—one of whom graced the cover of Wired, as MIT Technology Review notes. And, until just a few months ago, Brazil was set to create a herd of hornless Holsteins from shipments of Buri’s sperm, Wired reported.

But the plans were bucked after scientists at the Food and Drug Administration stumbled upon an utterly damning find earlier this year—Buri isn’t all bull: he’s a wee bit bacterium.

Bullish edits

When Recombinetics edited the cow cells that would later give rise to Buri, the company did so using bacterial DNA-editing machinery—which inadvertently got stitched into Buri’s genome.

The machinery involved are called TALENs (transcription activator-like effector nucleases), which are enzymes that can be customized to snip a targeted spot in a genetic code. That break in the code can then be patched up with a desired DNA sequence—say, a stretch of DNA that leads to hornlessness, swiped from other, hornless cattle breeds.

Recombinetics’ scientists used a standard method to get the TALENs into the cow cells—they delivered the TALENs via a loop of bacterial DNA called a plasmid. Usually, after the plasmid-encoded TALENs do their snipping, the plasmid’s work is done and it doesn’t hang around. But in Buri’s case, the whole plasmid ended up inserting itself into the bull’s genome, right next to the inserted stretch of DNA for hornlessness.

That means that Buri’s genome contains the entire DNA sequence of the plasmid. And in addition to all the bacterial-editing machinery from the loop of DNA, Buri’s genome includes the antibiotic resistance genes present on the plasmid, too—though they’re unlikely to have any affect.

Blind spot

The plasmid insertion is a big cow plop. But the fact that the company didn’t find the problem itself is perhaps more embarrassing.

“It was not something expected, and we didn’t look for it,” Tad Sonstegard, CEO of Acceligen, a subsidiary of Recombinetics that owns the animals, told MIT Technology Review. He added that a more thorough check “should have been done.”

The FDA scientists who found the problem agreed. In their report on the case, they noted that their find “highlights a potential blind spot in standard genome-editing screening methods.”

However embarrassing, the genetic insertion is unlikely to affect the cows or anyone who might end up eating them. As Sonstegard put it, they’re “safe to eat with or without the plasmid.”

But the inclusion of bacterial DNA in a cow’s genome makes the regulatory aspects of Buri and his offspring far more complicated—practically untenable. They’re not just edited, all-cow cows—they are genetically modified organisms with DNA from a completely different branch of life.

Some of the animals have already been incinerated, and regulators in Brazil have rejected plans involving the animals.

Recombinetics, meanwhile, isn’t ruminating over the blunder. It has already moved forward with gene-edited, heat-tolerant beef. The company noted that it hasn’t found any bacterial genes in those animals.

via Ars Technica https://arstechnica.com

September 1, 2019 at 08:06AM

Cops Take Over a Botnet to Clear Malware Off Nearly a Million PCs

https://www.wired.com/story/retadup-malware-botnet-ios-hacking-iran-cyberattack-security-news

The week may have started relatively quiet, but it ended with a shock: Google security researchers revealed Thursday night that it had observed a hacking campaign that hit thousands of iPhones, completely upending conventional wisdom about iOS security. Apple patched the problem in February, but it had persisted for at least two years prior. So, yikes!

In another concerning development, security researchers at Belgian university KU Leuven discovered that they could crack the encryption of a Tesla Model S key fob, letting them clone it within seconds. That’s bad enough as it is, but made a little worse by this being the second year in a row the KU Leuven team pulled off this particular trick. The key fobs Tesla made available last year to help fix the problem held up only slightly better to a similar attack. This time, though, Tesla’s pushing out an over-the-air fix that should shore up both the car’s locking mechanism and the fob itself. Until next year, at least.

Meanwhile, Donald Trump has at this point repeatedly denied a report in Axios that he earnestly proposed dropping a nuclear bomb into the eye of a hurricane. But if he did happen to float the idea, he wouldn’t have been anywhere near the first. WIRED contributor Garrett Graff traced the long-standing tradition, dating back to the Atomic Age, of scientists suggesting nuclear strikes against everything from polar ice caps to the Sahara desert.

In less oddball news, the Justice Department this week announced the indictment of eight men in connection with running popular piracy streaming sites Jetflicks and iStreamItAll. The services charged a monthly subscription fee to users, in exchange letting them stream and sometimes download popular televisions shows from every network and popular streaming service. The DoJ also served up another indictment against alleged Capital One hacker Paige Thompson, which added fresh details about the case—including a claim that Thompson used her access to mine cryptocurrency.

And there’s more! Every Saturday we round up the security and privacy stories that we didn’t break or report on in-depth but which we think you should know about nonetheless. Click on the headlines to read them, and stay safe out there.

Here’s a heartwarming tale of teamwork making the dream work. Several months ago, antivirus company Avast began looking under the hood of malware called Retadup, which had infected around 850,000 Windows computers. When it found a flaw in Retadup’s command and control server communications protocol, it alerted the French National Gendarmerie, who in turn seized the servers. But they didn’t stop there! They used those C2 servers to send instructions to infected machines to delete the malware, ultimately relieving nearly a million devices of the cryptomining intruder.

The New York Times reported this week that a US cyberattack on June 20 was even more effective than planned, knocking key Iranian systems offline and disrupting the country’s ability to “choose which tankers to target and where.” The strike also appears to have created controversy within the administration and intelligence community, with some officials concerned that it gave up strategic capabilities, potentially cutting off a reliable source of information once Iran patches the underlying vulnerability. At least, though, Iran appears not to have stepped up its retaliatory cyberattacks in response.

Facebook, Google, and a Chinese telecom have invested heavily in the Pacific Light Cable Network, an 8,000-mile stretch of cable that, when completed, will connect China to Los Angeles. But with tensions between the US and China continuing to escalate, The Wall Street Journal reported this week that the effort might not survive a national security review. The FCC will ultimately make the call, but strong opposition from a group known as Team Telecom has apparently cast the project in some doubt. However it plays out, it’s a reminder that Huawei’s not the only one feeling the squeeze.

Web hosting platform Hostinger disclosed a data breach this week that affected up to 14 million of the company’s 29 million customers. A hacker apparently used an access token, found on Hostinger’s servers, to access an API database that included usernames, email addresses, and weakly hashed passwords. In response, Hostinger automatically reset customer passwords and upgraded its safeguards.


More Great WIRED Stories

via Wired Top Stories https://ift.tt/2uc60ci

August 31, 2019 at 07:12AM

Check if Your Mobile Carrier is Throttling Netflix With This App

https://lifehacker.com/check-if-your-mobile-carrier-is-throttling-netflix-with-1837781730

Image: Chesnot / Contributor (Getty)

A recent study by Northwestern University and the University of Massachusetts at Amherst found that every major carrier in the United States has artificially slowed down videos from places like Netflix, Hulu, and YouTube.

If you’re curious whether or not your carrier is throttling your mobile video data, CNET pointed out an app this week that can help.

Rather than show the speed of your data connection in general, Wehe will show you the specific speed of different apps on your phone. Created by the researchers, the app lets you run tests on the speed you get through apps like Netflix, Hulu, Twitch, Prime Video, and Spotify.

To use it you just download the app, select which apps you want it to run a test on (or select them all) and then press “Run Tests” at the bottom of the page.

I have a grandfathered unlimited plan from AT&T that I received with the first iPhone, which means that technically AT&T shouldn’t be allowed to throttle my data at all.

Apparently that plan isn’t enough to make it stop; however, It looks like my phone has a pretty significant amount of throttling happening on the Netflix front, as well as several other apps. Although it’s leaving Hulu, Skype, and Twitch alone.

Worth noting: This can also take a while to do. Checking just Netflix takes a whole minute. Each service takes roughly the same, so if you decide to check everything you should be prepared to wait for a while.

That said, this is pretty interesting to look at, and really highlights how much I need to find a new mobile carrier ASAP, amongst other things

via Lifehacker https://lifehacker.com

August 31, 2019 at 06:48PM

Just How Bad is Amazon’s Banned Products Problem?

https://gizmodo.com/just-how-bad-is-amazons-banned-products-problem-1837778839

Photo: Ross D. Franklin (AP)

The average American purportedly has more trust in Amazon than their own government, which makes recent reports on thousands of potentially unsafe products making their way onto the company’s online marketplace particularly terrifying.

More than 4,100 products available on the site—everything from motorcycle helmets to children’s toys—were “declared unsafe by federal agencies, are deceptively labeled or are banned by federal regulators” according to an investigation by the Wall Street Journal last week. On Friday, Wired similarly reported that several of the top-selling listings for signal boosters on Amazon lacked federal certification, which is kind of important for a device that has the potential to seriously mess with nearby cell towers. Gizmodo reached out to Amazon and will update this article with the company’s response.

Just to give you a snapshot of how pervasive Amazon’s issue is, in a roughly four-month period, the Journal found:

  • 157 listings for products Amazon previously said it banned from the platform
  • More than 100 listings falsely claiming to be “FDA-approved”, when some of the products themselves (like toys) aren’t approved by the agency to begin with
  • 80 infant sleeping mats with eerily similar descriptions to one that Amazon purportedly banned after the FDA warned it could cause suffocation
  • Over 2,000 toys lacking proper warning labels
  • 44 listings for motorcycle helmets that the Wall Street Journal later discovered had failed to pass federal safety tests in 2018

Wired also found several cell phone signal boosters being sold for $100 less than their FCC-certified counterparts on Amazon. Some even featured an “Amazon’s Choice” badge, a company recommendation for “highly rated, well-priced products” according to Amazon’s site. The FCC put regulations in place in 2014 to minimize how certified signal boosters interfere with wireless networks, but illegal ones like those sold on Amazon and other online marketplaces ignore all that red tape. Without these safeguards, these models can cause a lot of dropped calls, cell network interference, and some serious headaches for network providers.

The majority of the Amazon listings detailed in these reports came from the many thousands of third-party vendors on Amazon. Despite being responsible for most of the sales on the site, these types of sellers have been a constant headache for Amazon when it comes to keeping crappy bootleg products off its marketplace.

Counterfeit products have littered the platform for years now, everything from knock-off Snuggies to off-brand cables that could fry your electronics. Amazon took one of its first major steps toward combatting this practice in 2016, when the company announced plans to make an international brand registry so that only vendors with the right permissions could sell their Amazon-registered products on the site.

But Amazon still retained the sole right to remove allegedly counterfeit listings. So in 2019, it debuted “Project Zero,” a project aimed at allowing registered brands to identify and remove these fake items themselves with the help of machine learning. Though Amazon hasn’t really explained yet how it plans to keep these companies from potentially abusing this authority or pushing legitimate competition out of the running.

The e-commerce giant seems to have as much trouble with regulating potentially harmed listings as it does with these counterfeits. After the Journal noted the problematic products its investigation found, Amazon purportedly removed or reworded 57 percent of these listings.

“We invest significant resources to protect our customers and have built robust programs designed to ensure products offered for sale in our store are safe and compliant,” the company wrote in a blog post addressing the investigation on Friday.

However, within two weeks Journal investigators reportedly came across “at least 130 items with the same policy violations reappeared, some sold by the same vendors previously identified by the Journal under different listings” in addition to more than 2,000 new listings for balloons that lacked proper choking hazard warnings.

So while Amazon definitely seems more on the alert for these potentially harmful products given all the recent press coverage, it’s already looking like the same game of Whack-a-Mole the company plays with trying to block knock-offs.

via Gizmodo https://gizmodo.com

August 31, 2019 at 05:03PM

Windows 10 will let you reinstall the OS from the cloud

https://www.engadget.com/2019/08/31/windows-10-reinstall-from-cloud/

To date, reinstalling Windows has meant using a local copy — either something already stored on your PC (and thus at risk of going bad) or something external. Soon, though, it might just be a matter of grabbing it online. On top of changing tablet mode, the latest Windows 10 Insider Preview Build on the Fast ring includes a "download Windows" option when you want to reset your PC. Much like the feature Macs have had for years, you can use your broadband connection to grab a fresh install from the cloud. You don’t need a backup partition or a thumb drive to get back in business.

The company stressed that this will wipe your existing apps, and your data you choose "remove everything." And remember, this is pre-release software. You’ll likely want to wait until there’s a polished version before trusting the fate of your PC to the cloud option. When it does arrive, though, it could offer a valuable failsafe if Windows is falling apart and you want a more reliable fix.

Source: Windows Blogs

via Engadget http://www.engadget.com

August 31, 2019 at 06:12PM

Volocopter proves its air taxi can work with air traffic control

https://www.autoblog.com/2019/08/31/volocopter-air-taxi-airport-test-flight-traffic/

Volocopter is one of the first flying taxi companies to integrate into air traffic control systems, but others aren’t too far behind. As Engadget‘s Andrew Tarantola wrote, more than 70 companies are currently developing their own personal flying vehicles. Uber, in particular, has invested heavily. And the demonstration at Helsinki Airport isn’t just good news for Volocopter. It also speaks to the fact that multiple air traffic systems are ready to safely manage air taxis and their interactions with traditional aircraft.

Earlier this month, Volocopter revealed the designs for its first commercial autonomous flying taxi. The company previously said it hopes to have air taxis in the sky by 2023, but it will have to build take-off and landing infrastructure and integrate with air traffic management systems. Thursday’s successful test flights demonstrated that Volocopter is at least ready to do the latter.

via Autoblog https://ift.tt/1afPJWx

August 31, 2019 at 04:14PM