Feeds

Darwin alarmed by six-legged mutant cane toad

Beast sprouts extra legs in Oz's Northern Territory

Securing Web Applications Made Simple and Scalable

Anyone who doubts that the cane toad will ultimately gain supremacy over Australia is directed to the Northern Territory News, which has a chilling story on a hexaped mutant Bufo marinus captured south of Darwin.

Bufo marinus (aka Cane Toad) - a regular four-legged version

Bufo marinus (aka cane toad) - with a paltry four limbs.
Pic via opencage.info licensed under Creative Commons

Cane toads were disastrously introduced into Northern Queensland from Hawaii in 1935, and have since spread 3,000km across Oz. In the process, they've developed longer legs to speed their invasion, and more recently deployed an experimental fifth leg, presumably in an attempt to gain extra hopping power.

This evidently proved inadequate, since the individual spotted last week in Batchelor, 42km south of Darwin, has no less than six legs.

Mercifully, toad-catcher Savvas Christodoulou noted that the beast's additional limbs didn't actually enhance its mobility. He said: "He was more clumsy than normal. I hope there's no more."

In fact, there are. The NT News notes that another six-legged batrachian variant was bagged in Queensland last year. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.