Feeds

Killer cyberappliances: Satan implicated

The Devil is in the wiring

  • alert
  • submit to reddit

Bridging the IT gap between rising business demands and ageing tools

Inhabitants of the Italian village of Canneto di Caronia - previously evacuated after domestic appliances staged an inflammatory uprising - have made a fearful return to their homes.

The tiny hamlet earlier this year became the front line of the war of annihilation between man and machine when normally docile equipment - including TVs and fuse boxes - began to spontaneously combust.

To add to the terror, mobile phones rang without reason and electronic car door locks became self-aware. After several house fires, the residents moved out, and the scientists moved in.

Despite extensive investigations by bodies as diverse as the National Institute of Geophysics and Volcanology, the National Research Centre and power company Enel, no single plausible reason for the occurrences has been found. The theories include a burst of electro-magnetic energy, or supercharged ions released from a fault in the Earth's crust, or good old static electricity.

The head of Sicily's Civil Protection Agency, Tullio Martella, admitted to the NY Times: "The cause of the fires seems to have been static electric charges. What we don't understand is why there were these static electric charges." He further conceded that: "It is not certain that the fires are finished forever. They were episodic to begin with."

Some villagers, however, are certain they know the cause: mephistopholean intervention. Nino Pezzino, a 43-year-old insurance salesman who has just rather reluctantly moved back to his house of terror, said: "I'm Catholic. I believe in the Devil. I don't know why the Devil is here. If it happens again, I'm bringing in the exorcist."

Pezzino will not stop at exorcism to purge his village of this evil: "If we're going to do it, we have to do it right," he said. "In order to do it, you need a sacrifice for the immortal gods, like a black goat or a black sheep. You have to dig a hole into the ground, because this is serious."

It is indeed. And those of us who have been watching the inexorable rise of the machines with growing alarm know it will take more than a bottle of Holy water and sacrificial black goat to turn back the tide. ®

The Rise of the Machines

Killer cyberloo kidnaps kiddie
A robot in every home by 2010
Fire-breathing buses threaten London
Cyberappliances attack Italian village
Cyberloo blast rocks Stoke-on-Trent
Spanish cyberkiosks claim second victim
Cyberkiosk assaults Spanish teenager
Hi-tech toilet swallows woman

Mobile application security vulnerability report

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.