WTF Fun Fact 13333 – Dead Bird Drones

In a somewhat morbid turn of events, scientists are reportedly making dead bird drones. Researchers at the University of New Mexico are using taxidermy techniques to preserve dead birds in order to outfit them with drone components, such as motors, propellers, and sensors.

Why dead bird drones?

Drones have long been modeled on birds and their flight mechanics. In this sense, it’s no surprise that engineers would try to improve drone design using birds so their machines can navigate through difficult terrain and adapt to changing conditions with ease. But the zombie bird thing gives us pause.

However, the project is still in its early stages. the researchers are experimenting with different types of birds to see which ones make the best drones. So far, they have tested the concept using quails and doves.

They’ve found that bird drones can fly and maneuver in ways that traditional drones cannot. For example, bird drones are able to fly close to the ground and through narrow gaps. This could eventually be useful for tasks such as search and rescue or inspecting infrastructure.

Isn’t this morbid?

While the concept of turning dead birds into drones may seem macabre, the researchers behind the project believe that it could have important implications for the future of drone technology. For example, bird-like drones are more energy-efficient than traditional drones.

“If we learn how these birds manage … energy between themselves, we can apply (that) into the future aviation industry to save more energy and save more fuel,” said Dr. Mostafa Hassanalian, a mechanical engineering professor who is leading the project at the New Mexico Institute of Mining and Technology in Socorro.

Bird drones can also be less obtrusive than traditional drones, which may be noisy and disruptive. Since they’re quieter, bird drones could even be used for wildlife monitoring or scientific research without disturbing the animals being studied.

Of course, there are still many challenges to overcome, including the ethical considerations of taking an animal (even a dead one) and turning it into a tool.

Right now, the taxidermied prototype the engineers have built can only fly for 20 minutes.

 WTF fun facts

Source: “Scientists Turned Dead Birds Into Zombie Drones to Spy on Humans” — Popular Mechanics

WTF Fun Fact 13332 – The Cost of Cybercrime

The global cost of cybercrime in 2022 was $8.44 TRILLION! That cost is only expected to rise, reaching $10.5 trillion by 2025. Studies predict that the costs will skyrocket because cyberattacks are becoming more sophisticated, and more information than ever is stored online.

What is cybercrime?

Cybercrime refers to criminal activities like hacking, phishing, identity theft, and the spread of malware or viruses. Cybercriminals use these tactics to steal private data. That might be financial information, private company data, or personal data. The goal is typically either to profit or to cause physical or reputational damage to organizations and their networks (or all of these).

Cybercrime is a growing problem since more of our personal and professional lives happen online.

Why is the cost of cybercrime so high?

A major factor driving the rise of cybercrime is the increasing interconnectedness of devices and systems. This has created what’s called a larger “attack surface” for cybercriminals to exploit. Once they get into a system, they can move into different parts of a network and gain access to everything from customer information to intellectual property.

Another factor contributing to the rise of cybercrime is the growing use of cryptocurrencies. When criminals demand ransoms in crypto, it’s easier for them to launder and stay anonymous.

The cost of cybercrime is not just financial. Cyberattacks can also result in lost productivity and legal and regulatory costs.

Responding to the next-gen crime wave

To combat the growing threat of cybercrime, organizations continue to invest in security measures like firewalls, encryption, and employee training programs. That last piece of the puzzle may actually be the most important since a lot of cybercrime starts with one employee accidentally or intentionally giving up security credentials.

That’s because cybercriminals use social engineering tactics, like phishing emails, to trick employees into divulging sensitive information or clicking on links that install malware on their devices. If an employee isn’t trained in cybersecurity best practices, they’re far more likely to fall for these schemes. And the result is putting their organization’s data and systems at risk.

Employees also unintentionally compromise security through simple mistakes. These include seemingly innocent things like using weak passwords, leaving their devices unlocked or unattended, or failing to install security updates.

 WTF fun facts

Source: “Cybercrime Expected To Skyrocket in Coming Years” — Statista

WTF Fun Fact 13328 – Juice Jacking

Have you ever been out and about, only to find that your smartphone’s battery is running dangerously low? You might have felt relieved to spot a public USB charging station, ready to juice up your device. But did you know that these seemingly innocent charging points could put your personal data at risk? Juice jacking is a cyberattack that uses public charging stations to steal data and install malware on devices. The Federal Bureau of Investigation (FBI) has issued a warning about this growing threat, which you can read more about in this Snopes article.

What is juice jacking?

Juice jacking is a type of cyberattack where criminals modify public USB charging stations, allowing them to access and steal data from devices that are connected to these stations. The attackers can also install malware on your device, which could allow them to remotely control your phone or access your sensitive information.

USB charging ports carry both power and data. When you plug your device into a charging port, you may unknowingly create a connection that allows for the transfer of data. Cybercriminals exploit this connection by installing hardware or software in the charging port that can intercept the data transfer between your device and the charger. This could include personal information such as photos, passwords, or banking information.

The risks associated with juice jacking

The risks associated with juice jacking can be severe, especially if your device contains sensitive information. Some potential consequences of a juice jacking attack include:

  1. Identity Theft: Cybercriminals may steal personal information such as your name, address, Social Security number, or banking details. This data can be used to open accounts in your name or commit other fraudulent activities.
  2. Financial Loss: If your banking or credit card information is compromised, criminals can make unauthorized transactions, emptying your accounts or racking up charges on your credit cards.
  3. Data Loss: Attackers can wipe your device, resulting in the loss of important data such as contacts, messages, and photos.
  4. Malware Infection: Malware installed on your device during a juice jacking attack could give criminals remote access to your device, allowing them to track your movements, eavesdrop on your conversations, or access sensitive information.

How to protect yourself

To reduce the risk of falling victim to a juice jacking attack, consider the following safety tips:

  1. Carry a Portable Charger: Invest in a portable charger or power bank that you can carry with you, ensuring that you always have a reliable and safe source of power for your device.
  2. Use AC Power Outlets: When possible, opt for traditional AC power outlets instead of USB charging stations. By using your own charger, you minimize the risk of connecting your device to a compromised port.
  3. Use a USB Data Blocker: Also known as a “USB condom,” a data blocker is a small device that you can plug into a USB port before connecting your charging cable. It allows power to pass through while blocking data transfer, protecting your device from potential attacks.
  4. Keep Your Devices Updated: Regularly update your devices with the latest security patches and software updates to minimize the risk of malware infections.

While public USB charging stations can be a convenient solution when your device is running low on power, they may also pose a significant risk to your personal data. By being aware of the threat of juice jacking and following the tips outlined above, you can protect yourself and your devices from this growing cybersecurity menace.

 WTF fun facts

Source: “How Serious Is the Security Threat of ‘Juice-Jacking’?” — Snopes

WTF Fun Fact 13323 – Helicopter Tree Trimming

Helicopter tree trimming involves the use of a helicopter equipped with a circular saw to trim tree branches. Skilled pilots and experienced arborists execute the carefully planned process of helicopter tree trimming, which can be dangerous and risky.

The wild world of helicopter tree trimming

The use of helicopters for tree trimming has become increasingly popular in recent years due to its efficiency and effectiveness. And it’s not just for giant trees. In fact, traditional methods of tree trimming, such as using cherry pickers or bucket trucks, can sometimes be too time-consuming or require crews to shut down roads and neighborhoods. With helicopter tree trimming, a team of arborists can trim several trees in a single day while minimizing disruption to the community.

Still sounds dangerous, right?

How does this process work?

Before the trimming process begins, arborists carefully examine trees and render a thorough assessment of the surrounding environment. The team obviously needs to take into consideration any obstacles or hazards, such as power lines or buildings (or people!) in the area.

Arborists identify the trees to be trimmed, then the helicopter takes off, and the pilot hovers over the target tree. An arborist then lowers from the helicopter on a line carrying a chainsaw or the pilot lowers a specially designed trimming saw to get the job done. These saws are equipped with a circular blade that can quickly and cleanly cut through thick branches.

Obviously, the arborists are highly skilled and experienced in using the saw. They need to be able to make precise cuts, avoid hitting power lines, and make sure there are no unfortunate accidents. They also need to be able to move quickly move from one branch to another as the helicopter hovers and maneuvers around the tree.

Helicopter tree trimming allows arborists to trim trees in areas that are otherwise difficult or impossible to reach. This includes steep slopes, remote areas, and densely forested regions.

It should come as no surprise that this is a risky business. The arborists work at great heights and in challenging weather conditions. They must be constantly aware of the rotor blades and other potential hazards. But with proper safety protocols in place, it is a safe and effective technique.

 WTF fun facts

Source: “Aerial Saw Is Boon to Line Trimming” — T&D World

WTF Fun Fact 13319 – Solar Panel Production

As nations throughout the world work to decrease their carbon footprint and transition to renewable energy, solar panel production has increased significantly in recent years. China is one of the major players in the solar panel business thanks to its extensive production and inexpensive prices. Yet, the U.S. is making efforts to catch up and reclaim its position as a global leader in the manufacture of solar panels.

Dominance in solar panel production

China controls 80% of the global solar panel market and is now able to sell solar panels for far less than businesses in other nations. However, there has been increasing concern about China’s use of forced labor, particularly of the Uyghur population, in the production of their solar panels.

While it’s not clear how many solar panels produced in China use forced labor, given the scale of the industry and the reports of human rights abuses in the region, there have been calls for the solar industry to ensure that their supply chains are free from forced labor and other human rights abuses.

U.S. attempts to corner the solar supply chain

The United States is gradually catching up to China’s solar industry thanks to rules and incentives put in place to encourage domestic production and consumer uptake. For example, the US Bipartisan Infrastructure Bill (BIL) has set aside money for the procurement of raw materials, manufacturing, and utility-level adoption.

Additionally, American businesses are funding emerging technologies that might transform the manufacturing of solar panels so it no longer needs to rely on China for raw materials, such as polysilicon. Thin-film solar panels, for instance, which are being tested by some businesses and could bring down the price of solar panels and increase consumer access to them.

In 2021, the United States installed over 20 gigawatts of solar capacity (bringing the total installed capacity to 142.3 gigawatts), which accounted for 50% of new electricity.

 WTF fun facts

Source: “Solar Panels Made in USA vs China: What’s Better?” — Go Green Solar

WTF Fun Fact 13314 – The First Stoplight

No one really enjoys sititng at stoplights, but we know they’re valuable. But do you know the history of the first stoplight?

The first stoplight

Stoplights, or traffic lights, date back to the mid-19th century. In 1868, the first traffic signal was installed outside the British Houses of Parliament in London. This signal featured a revolving gas lamp with red and green lenses and was manually operated by a police officer. The officer would signal to drivers using an arm.

However, the signals were not very effective, and it was eventually removed after only a month. It wasn’t until the 20th century that traffic signals looked like the modern traffic lights we know today.

The first electric traffic signal was installed in 1912 by a Salt Lake City police officer named Lester Wire. The signal used red and green lights and a buzzer to signal changes in traffic patterns. This device was effective in reducing the number of accidents in Salt Lake City.

The modern traffic light, with its familiar red, yellow, and green lights, was invented in 1920 by a Detroit police officer named William Potts. Potts was inspired to create the new signal after witnessing a terrible accident at an intersection.

He designed the modern three-color light operated by an automatic timer. This allowed for a smoother traffic flow and reduced accidents. Potts’ design quickly became popular, and the lights were soon adopted throughout the United States.

Today, millions of stoplights are installed around the world. Some now use sensors to detect the presence of vehicles and adjust their timing accordingly.

Another fun fact

One interesting feature of traffic lights is their use of the color yellow. While red and green have obvious meanings (stop and go, respectively), the use of yellow is less clear. In the early days of traffic lights, yellow was used to indicate that the signal was about to change.

However, over time, yellow has come to represent caution, with drivers expected to slow down and prepare to stop. Despite their importance, traffic lights can also be a source of frustration for drivers. In fact, traffic lights are one of the most common causes of traffic congestion in urban areas.

Today, new systems are being developed to improve traffic flow and reduce congestion.

 WTF fun facts

Source: “A Brief History of the Stoplight” — Smithsonian Magazine

WTF Fun Fact 13312 – Hairbrush History

Who knew hairbrush history was so fascinating (and painful-sounding?). It turns out that the first mass-produced hairbrush was created in England during the 1770s. They were made of pig bristle, which was a big improvement of their predecessors. Some of those were made of porcupine quills!

Hair-raising hairbrush history

The earliest hairbrushes date back to antiquity. They were constructed out of many different materials, such as animal bones, shells, and bird feathers.

Hairbrushes were employed to style hair as well as clean up dirt and tangles. It wasn’t until the 18th century (specifically the 1770s) that the modern hair brush as we know it today appeared.

In the 1770s, pig bristles were used to make the first hairbrush that was mass-produced. It was not only more resilient, but it also made detangling hair easier.

The evolution of hairbrushes

Hair brushes became better and more advanced over time. A new kind of hairbrush with a concave form and gentle bristles was developed during the early 1800s, making it simpler to style hair. The creation of elaborate hairstyles like bouffants and beehives became popular using this design.

By the 20th century. there were many different kinds of hair brushes available, each with a distinct function. While some are used to detangle hair, others are intended to increase volume or produce a certain hairstyle. A lot of contemporary hair brushes also have features like ion-infused technology or heat-resistant bristles.

Lyda Newman was an African American inventor who was awarded a patent in 1898 for her design of an improved hairbrush. Her hairbrush was unique in that it had evenly spaced synthetic bristles that could be removed for cleaning or replacement. This design addressed the common issue of hairbrushes collecting dirt and oils, which made them difficult to clean and often resulted in hair loss. Newman’s invention revolutionized the hairbrush industry and her design is still used today.

The benefits of brushing

A hair brush can be used for more than just detangling hair. It can be used to distribute natural oils from the scalp more evenly to the ends. Brushing your hair can also help to maintain healthy, lustrous hair. It even aids in exfoliating the scalp, removing dead skin cells, and encouraging strong hair growth.

Frequent hair brushing can aid in preventing split ends and breakage by gently and evenly detangling hair. The blood flow to the scalp can be stimulated by brushing your hair. This encourages hair development and maintains healthy hair.

 WTF fun facts

Source: “Antique Hair Brush History, Brands & Sophisticated Styles” — Love to Know

WTF Fun Fact 13302 – Bug Bounty Programs

Have you heard of “bug bounty programs”? No, they’re not about capturing critters in your yard. These programs are run by major tech companies. Companies like Google, Microsoft, and Facebook use these programs to incentivize hackers and security researchers to find and report vulnerabilities in their systems by offering rewards or cash bounties.

Big Tech’s bug bounty programs

Bug bounty programs allow tech companies to identify and address security weaknesses. But more importantly, they do so before the weaknesses can be exploited by cybercriminals. Some programs have paid out millions to researchers and hackers who found major vulnerabilities. For example, in 2019, Google paid out over $6.5 million in bug bounties to people around the world.

Bug bounty programs typically have guidelines and rules. These outline what types of vulnerabilities are eligible for rewards and how they should be reported. Once a researcher or hacker identifies a vulnerability, they submit it to the company’s bug bounty program. The company then verifies the bug and determines if it is eligible for a reward. If the vulnerability is valid, the company forks over the reward to the person who reported it.

Some companies may also offer other incentives, such as swag or recognition. This helps encourage participation. Some programs may even have different reward tiers for different types of vulnerabilities. For example, more critical or severe vulnerabilities earn higher payouts.

A win-win solution for cybersecurity

There are several reasons why companies use these programs. Identifying security vulnerabilities before they can be exploited by cybercriminals saves the company from potential data breaches, financial losses, and reputational damage.

The programs also allow companies to work with the security community. This helps them improve their security measures and stay ahead of emerging threats. These programs are also cost-effective. Companies discover security weaknesses, as they only pay for valid bugs that are reported.

 WTF fun facts

Source: “Google paid $6.7 million to bug bounty hunters in 2020” — ZDNet

WTF Fun Fact 13287 – The First Spacewalk

On March 18th, 1965, Soviet cosmonaut Alexei Leonov made history by becoming the first person to walk in space. Leonov left his spacecraft, the Voskhod 2, and floated in space for 12 minutes and 9 seconds. The first spacewalk paved the way for future space exploration and opened up new possibilities for scientific research in space.

The Soviets made the first spacewalk

The spacewalk was a remarkable achievement for the Soviet space program, which was in competition with the United States at the time to achieve milestones in space exploration. The mission was not without its challenges, however. Leonov’s space suit had inflated in the vacuum of space, making it difficult for him to move and causing him to experience overheating.

Despite these challenges, Leonov successfully completed his spacewalk and returned to the spacecraft, where he faced another problem. The spacecraft’s automatic landing system had failed, and Leonov and his crewmate had to manually steer the spacecraft to a safe landing.

Subsequent spacewalks

Since Leonov’s historic feat, many other astronauts and cosmonauts have followed in his footsteps (or rather, lack of footsteps). Here are some quirky facts about spacewalking:

  • The longest spacewalk in history was conducted by Russian cosmonauts in 2013. They spent 8 hours and 7 minutes outside the International Space Station.
  • Spacewalks are often referred to as “EVA,” which stands for “extravehicular activity.”
  • Spacewalkers wear special suits called Extravehicular Mobility Units (EMUs). These are designed to protect them from the extreme conditions of space.
  • During a spacewalk, astronauts and cosmonauts tether themselves to the spacecraft to prevent them from floating away into space.
  • The first American to conduct a spacewalk was Ed White in 1965, just a few months after Leonov’s historic walk.
  • In 1984, American astronaut Bruce McCandless made history. He became the first person to fly freely in space without being tethered to a spacecraft.
  • The first all-female spacewalk took place in 2019. Astronauts Christina Koch and Jessica Meir conducted a 7-hour walk to replace a failed power controller.

As space exploration continues to advance, it’s likely that we’ll see even more remarkable achievements in spacewalking. But Alexei Leonov’s historic spacewalk on March 18th, 1965 opened up a new world of possibilities for space exploration.

 WTF fun facts

Source: “The First Spacewalk” — New Scientist