Slashdot: Hardware's Journal
[Most Recent Entries]
[Calendar View]
Friday, June 27th, 2025
Time |
Event |
3:30a |
Doctors Perform First Robotic Heart Transplant In US Without Opening a Chest An anonymous reader quotes a report from Neuroscience News Science Magazine: Surgeons have performed the first fully robotic heart transplant in the U.S., using advanced robotic tools to avoid opening the chest. [...] Using a surgical robot, lead surgeon Dr. Kenneth Liao and his team made small, precise incisions, eliminating the need to open the chest and break the breast bone. Liao removed the diseased heart, and the new heart was implanted through preperitoneal space, avoiding chest incision.
"Opening the chest and spreading the breastbone can affect wound healing and delay rehabilitation and prolong the patient's recovery, especially in heart transplant patients who take immunosuppressants," said Liao, professor and chief of cardiothoracic transplantation and circulatory support at Baylor College of Medicine and chief of cardiothoracic transplantation and mechanical circulatory support at Baylor St. Luke's Medical Center. "With the robotic approach, we preserve the integrity of the chest wall, which reduces the risk of infection and helps with early mobility, respiratory function and overall recovery."
In addition to less surgical trauma, the clinical benefits of robotic heart transplant surgery include avoiding excessive bleeding from cutting the bone and reducing the need for blood transfusions, which minimizes the risk of developing antibodies against the transplanted heart. Before the transplant surgery, the 45-year-old patient had been hospitalized with advanced heart failure since November 2024 and required multiple mechanical devices to support his heart function. He received a heart transplant in early March 2025 and after heart transplant surgery, he spent a month in the hospital before being discharged home, without complications.
Read more of this story at Slashdot. | 7:00a |
Britain Shuns $34 Billion Morocco-UK Subsea Power Project The UK government has rejected the 25 billion ($34.39 billion) pound Morocco-UK Power Project, citing a preference for domestic renewable initiatives that offer greater economic and strategic benefits. The project aimed to supply solar and wind energy from the Sahara to power up to seven million UK homes. Reuters reports: "The government has concluded that it is not in the UK national interest at this time to continue further consideration of support for the Morocco-UK Power Project," energy department minister Michael Shanks said in a written statement to parliament. He also said the project did not clearly align strategically with the government's mission to build homegrown power in the UK.
Xlinks' Morocco-UK power project would have tapped Moroccan renewable energy via what would have been the world's longest subsea power cable. The plan involved building 3,800 kilometers (2,361 miles) of high-voltage direct current subsea cables from Morocco to southwest England. The company had been seeking a guaranteed minimum price for the electricity supplied, known as contract for difference, from Britain's government.
Read more of this story at Slashdot. | 1:00p |
Brother Printer Bug In 689 Models Exposes Millions To Hacking An anonymous reader quotes a report from SecurityWeek: Hundreds of printer models from Brother and other vendors are impacted by potentially serious vulnerabilities discovered by researchers at Rapid7. The cybersecurity firm revealed on Wednesday that its researchers identified eight vulnerabilities affecting multifunction printers made by Brother. The security holes have been found to impact 689 printer, scanner and label maker models from Brother, and some or all of the flaws also affect 46 Fujifilm Business Innovation, five Ricoh, six Konica Minolta, and two Toshiba printers. Overall, millions of enterprise and home printers are believed to be exposed to hacker attacks due to these vulnerabilities.
The most serious of the flaws, tracked as CVE-2024-51978 and with a severity rating of 'critical', can allow a remote and unauthenticated attacker to bypass authentication by obtaining the device's default administrator password. CVE-2024-51978 can be chained with an information disclosure vulnerability tracked as CVE-2024-51977, which can be exploited to obtain a device's serial number. This serial number is needed to generate the default admin password. "This is due to the discovery of the default password generation procedure used by Brother devices," Rapid7 explained. "This procedure transforms a serial number into a default password. Affected devices have their default password set, based on each device's unique serial number, during the manufacturing process."
Having the admin password enables an attacker to reconfigure the device or abuse functionality intended for authenticated users. The remaining vulnerabilities, which have severity ratings of 'medium' and 'high', can be exploited for DoS attacks, forcing the printer to open a TCP connection, obtain the password of a configured external service, trigger a stack overflow, and perform arbitrary HTTP requests. Six of the eight vulnerabilities found by Rapid7 can be exploited without authentication. Brother has patched most of the flaws, but CVE-2024-51978 requires a new manufacturing process to fully resolve, which will apply only to future devices.
Read more of this story at Slashdot. |
|