Adult Swim A full day of Rick and Morty -related teases and jokes on Twitter ended with a nice April Fool’s surprise from Adult Swim on Saturday: The complete first episode of the animated series’ upcoming third season. As of press time, it’s playing over and over at Adult Swim’s default live-streaming site. ( Update : Readers are noting that it’s also airing on the TV version of Adult Swim/Cartoon Network this evening, though channel guides have mis-advertised its listing.) Much like the second season’s premiere, this episode is built to resolve the prior season’s cliffhanger arc, and that may make it a confusing episode for anybody unfamiliar with the show. (If you’ve never watched the bonkers sci-fi cartoon series, head to Hulu to binge, post-haste.) Series fans, on the other hand, can look forward to a nice mix of deep-lore reveals and out-of-nowhere weirdness. Read 2 remaining paragraphs | Comments
Follow this link:
Not an April Fool: Rick and Morty third season premiere surprise-launched online [Updated]
An anonymous reader quotes a report from TmoNews: T-Mobile’s new deprioritization threshold is 30GB of usage in a single billing cycle. While T-Mo didn’t make an official announcement about the change, you can see in this cached page that the network management policy says 28GB: “Based on network statistics for the most recent quarter, customers who use more than 28GB of data during a billing cycle will have their data usage prioritized below other customers’ data usage for the remainder of the billing cycle in times and at locations where there are competing customer demands for network resources.” Navigating to the webpage today now says 30GB. What this change means is that if you use more than 30GB of data in one billing cycle, your data usage will be prioritized below others for the remainder of that billing cycle. The only time that you’re likely to see the effects of that, though, is when you’re at a location on the network that is congested, during which time you may see slower speeds. Once you move to a different location or the congestion goes down, your speeds will likely go back up. And once the new billing cycle rolls around, your usage will be reset. Read more of this story at Slashdot.
Last year an attacker forced thousands of unsecured printers to spew racist and anti-semitic messages. But this year’s attack is even bigger. An anonymous reader writes: A grey-hat hacker going by the name of Stackoverflowin has pwned over 150, 000 printers that have been left accessible online. For the past 24 hours, Stackoverflowin has been running an automated script that searches for open printer ports and sends a rogue print job to the target’s device. The script targets IPP (Internet Printing Protocol) ports, LPD (Line Printer Daemon) ports, and port 9100 left open to external connections. From high-end multi-functional printers at corporate headquarters to lowly receipt printers in small town restaurants, all have been affected. The list includes brands such as Afico, Brother, Canon, Epson, HP, Lexmark, Konica Minolta, Oki, and Samsung. The printed out message included recommendations for printer owners to secure their device. The hacker said that people who reached out were very nice and thanked him. The printers apparently spew out an ASCII drawing of a robot, along with the words “stackoverflowin the hacker god has returned. your printer is part of a flaming botnet… For the love of God, please close this port.” The messages sometimes also include a link to a Twitter feed named LMAOstack. Read more of this story at Slashdot.
An anonymous reader writes: A luxury hotel “paid “thousands” in Bitcoin ransom to cybercriminals who hacked into their electronic key system. The “furious” hotel manager says it’s the third time their electronic system has been attacked, though one local news site reports that “on the fourth attempt the hackers had no chance because the computers had been replaced and the latest security standards integrated, and some networks had been decoupled.” The 111-year-old hotel is now planning to remove all their electronic locks, and return to old-fashioned door locks with real keys. But they’re going public to warn other hotels — some of which they say have also already been hit by ransomware. UPDATE: The hotel’s managing director has clarified today that despite press reports, “We were hacked, but nobody was locked in or out” of their rooms. Read more of this story at Slashdot.