Mass Effect: Andromeda cinematic trailer. After two years of teases , teases , and more teases , fans of Bioware’s Mass Effect series were hoping for a substantive amount of info on Mass Effect: Andromeda for “N7 Day” this year. Unfortunately, we instead got yet another tease: Bioware released a 1:43 cinematic trailer for the title with a “Spring 2017” release date. We learned in past sneak-peeks that the game takes place in the neighboring Andromeda Galaxy , in a region called the Helios cluster. We already know that the game focuses on the Ryder family, who are part of a massive multi-species exploration/colonization effort called the “Andromeda Initiative.” And, we learned last week that the game is likely set 600 years after the main storyline in the previous Mass Effect games. Today’s trailer gives us a few dribs and drabs of additional plot details—something went wrong during the Andromeda Initiative’s trip, and the “Pathfinder”—the mysterious N7 figure shown in previous trailers , rumored to be the main character’s father—has been killed, incapacitated, or otherwise removed from the picture. This leaves the player as the new “Pathfinder,” which jibes with dialog heard in this year’s 4K tech demo video . Read 6 remaining paragraphs | Comments
Follow this link:
New tease for Mass Effect: Andromeda shows tiny plot details, but that’s all
An anonymous reader quotes Bleeping Computer: “Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world. The attack targets PLCs (Programmable Logic Controllers), devices that sit between normal computers that run industrial monitoring software and the actual industrial equipment, such as motors, valves, sensors, breakers, alarms, and others.” Researchers say they packed their attack as a loadable kernel module [PDF], which makes it both undetectable and reboot persistent. The attack goes after PLC pin configurations, meaning the PLC won’t be able to tell which are the actual input and output pins, allowing the attacker full-control to make up bogus sensor data, send fake commands, or block legitimate ones. The researchers acknowledge that the attack is extremely complicated, but the article argues it would still be of interest to a state-sponsored actor. Read more of this story at Slashdot.