News Article | April 2, 2016
Telstra subscribers in Australia will surely send the company's networks into overdrive again come April 3, Sunday, for the scheduled free data event. Previous records hit 1,841 TB worth of data accessed and downloaded by subscribers during the last unlimited data browsing on February 14. This was roughly estimated at around 5.1 million copies of "Game of Thrones" episodes. The upcoming event will be made available for all Telstra mobile subscribers, which include small businesses, global enterprise services, managed businesses, mobile broadband subscribers and prepaid customers with no active credit but still have a working service. Free mobile data will start at exactly midnight (Sunday morning), and end at midnight (Sunday night) in each local time zone. Daylight saving time has been considered, which means 25 hours of unrestrained Internet browsing, streaming and downloading will be available. MMS messaging, on the other hand, is not included as it is part of call subscriptions. Users who start browsing before April 3 won't be charged as soon as the event starts. The subscription will automatically end once the event ends at midnight. Telstra CEO Andrew Penn issued an apology on the company's website for previous network outages that subscribers had experienced. Initial findings reported that the outages were caused by subscribers simultaneously disconnecting from their service and reconnecting at the same time. The massive traffic of sudden reconnections proved too heavy for the carrier, resulting in major disruptions in services. This recent incident will be added to the pending overview of problems causing the network to crash. The company had earlier hired engineers and global network experts to determine the root cause of the problem after the events that led to the free data day on February 14. "Once again, I apologize for any inconvenience we have caused. You expect seamless mobile service with Telstra and it is our responsibility to ensure that is delivered day in, day out," Penn wrote.
News Article | September 9, 2016
More than a year after the original discovery of the infamous Android bugs known as Stagefright, hackers keep finding similar flaws. On Wednesday, Google’s own elite team of hackers released a proof-of-concept hacking technique that some believe could be used against practically all Android phones. Last summer, a security researcher found that a series of bugs in a core part of the Android operating system could be abused to hack users with a simple multimedia message, potentially giving hackers full control of the phone before the target even saw the message notification. The bugs came to be known as Stagefright, and other security researchers and hackers soon found other ways to exploit them. Stagefright was a watershed moment in the history of Android security. It pushed Google to implement a monthly update cycle in an attempt to improve Android’s biggest security flaw, the fact that some critical fixes depend on the whims of phone manufacturers and not Google. Thanks to the discovery of Stagefright, Android security has overall improved—provided your phone gets patches, of course—but Android still has a long way to go. Google Project Zero researcher Mark Brand recently found a new bug in a part of Android’s operating system known as libstagefright (hence the original Stagefright name), “deep in the bowels of the usermode Android system,” as he put it in a blog post published on Wednesday. Brand called it “an extremely serious bug,” because it can be leveraged to achieve “remote code execution,” hacker lingo for obtaining control of a phone from afar. The researcher detailed how he found the bug, and also released code so that others can exploit it too. Brand noted that his exploit works “on several recent Android versions for the Nexus 5x,” but also added that with some more work it would be possible to use it even on the new Android Nougat. The good news is that Google fixed the bug in Android’s most recent release, where the company called the bug “a critical security vulnerability” that can be exploited “through multiple methods such as email, web browsing, and MMS when processing media files.” The bad news, as usual, is that unless you are among the lucky few who get regular Android updates (which essentially means you own a Google Nexus phone), you are, in theory, vulnerable. Zuk Avraham, the founder and CTO of mobile security firm Zimperium, claimed that this bug affects 99.9% of all devices, given that most people still use old Android versions, and that malicious hackers could use the technique detailed by Brand in the real world. “This is really big,” Avraham told Motherboard in an online chat, adding that he’s “100%” certain that “this or similar Stagefright/Mediaserver exploits are used in the wild in targeted attacks.” A Google spokesperson, however, countered that Brand’s hacking technique is just a “proof-of-concept for research purposes that could not be used in real world attacks without substantial modification and even further research,” because “it does not include a full exploit chain and is specific only to a subset of Nexus devices.” Jon Sawyer, an independent researcher who specializes in Android security said that while this is a “serious” vulnerability, it’s also “reasonably complex” to exploit, so it’s unlikely that cybercriminals with “run of the mill malware” will use it. Sawyer is skeptical that even targeted attacks from government hackers will leverage it, given that at this point it’s a public vulnerability and using it would risk making the attack more likely to be caught or detected. In theory, however, the exploit that Brand released could be repurposed to target other versions of Android, according to Alberto Pelliccione, a former Hacking Team employee who developed the company’s Android malware. “It’s not trivial, but someone whose work is to develop exploits and has studied Stagefright could do it in a few days, less than a week, for sure,” Pelliccione, who now runs a defensive security company called ReaQta, told Motherboard, adding that repurposing the exploit for Nougat would be much harder. The chances that someone targets you specifically with this exploit are low, but, as usual, if you can update your Android phone, please do it and download Nougat. If you have an old phone that’s not getting security updates, you might want to invest in a new phone. Want more Motherboard in your life? Then sign up for our daily newsletter.
The use and care of animals complied with the guideline of the Biomedical Research Ethics Committee at the Shanghai Institutes for Biological Science (CAS), which approved the application entitled ‘Reproductive physiology of cynomolgus monkey and establishment transgenic monkey’ (#ER-SIBS-221106P). Laparoscopy was used for oocyte collection. Oocytes were aspirated from follicles 2–8 mm in diameter, about 32–36 h after hCG stimulation31. The collected oocytes were cultured in the pre-equilibrated maturation medium32. Metaphase II arrested oocytes were selected for perivitelline space injection32 of lentiviruses and ICSI. The lentivirus concentration for injection was 1 × 1010 viral genome (vg) per ml. After microinjection, the oocytes were cultured in the maturation medium at 37 °C (in 5% CO ) for about 1 h, until fertilization by ICSI. Monkey semen was collected by penile electro-ejaculation. For ICSI, a single sperm was immobilized and aspirated with the tail first. A single oocyte was fixed by the holding pipette, and the injection pipette was pushed through the zona pellucida and subsequently through the oolemma to release the spermatozoon32. After ICSI, the oocytes were cultured in pre-equilibrated Hamster Embryo Culture Medium 9 (HECM-9) at 37 °C (in 5% CO ) until the next morning33, 34. Menstrual cycles of females were recorded daily. To synchronize the developmental stage of embryos with the recipient, monkeys were chosen for tubal embryo transfer at 0–3 days after ovulation, and a stigma or a new corpus luteum on the ovary could be observed by laparoscopy. About 2–3 pronuclear-stage embryos were selected for tubal transfer to each surrogate female31. Hair-root samples collected from newborn monkey pups were used to extract DNA. Samples were digested by proteinase K overnight at 65 °C and precipitated for DNA and PCR with specific primers again GFP and mCherry were used for initial genotyping analysis as follows: mCherry-R: 5′-TGCTTGATCTCGCCCTTCAG-3′, mCherry-F: 5′-GCCATCATCAAGGAGTTCATGC-3′; GFP-F: 5′-AAGTTCATCTGCACCACCG-3′, GFP-R: 5′-TCCTTGAAGAAGATGGTGCG-3′. A total of 15 μg of genomic DNA was prepared and digested with BamHI and EcoRI, which released transgenes. Genomic DNAs were separated with 1% agarose gel and transferred to Nippon N+ membrane (GE). DNA probes from hMECP2-2a-GFP was prepared using ready-to-go DNA label kit (279240D-20, GE Life Sciences). 32P-labelled probes were hybridized with blots of genomic DNAs and exposed to phosphor-imager after extensively washing. Decisions of whether euthanasia procedures would be carried out for sick or aborted newborn monkeys are made by veterinarians, after consulting with principal investigators and followed the approved protocol (#ER-SIBS-221106P). Aborted or sick MECP2 TG and WT monkeys were deeply anaesthetized with ketamine hydrochloride (5–10 mg kg−1) to avoid possible pain and then perfused with 0.9% saline with 2–4% paraformaldehyde (PFA) for further immunohistochemistry experiments. The procedure is approved by the Biomedical Research Ethics Committee at the Shanghai Institutes for Biological Science (CAS), described in the protocol entitled ‘Reproductive physiology of cynomolgus monkey and establishment transgenic monkey’ (#ER-SIBS-221106P). After perfusion, the hemispheres of the brain were dissected, cut in to small blocks, fixed with 4% PFA in phosphate buffer, and equilibrated in 30% sucrose. Fixed and equilibrated brain tissue blocks were cut into 30-μm cortical sections with a Microm HM525 cryostat. Sections were washed for 5 min in PBS containing 5% bovine serum albumin (BSA) and 0.3% Triton X-100, and incubated with primary antibodies (in PBS with 3% BSA and 0.3% Triton X-100) overnight at 4 °C and subsequently with corresponding secondary antibodies (Alexa-Fluor-conjugated, Invitrogen, at 1:1,000). DAPI was used to label the nuclei and sections were mounted with 75% glycerol. Other antibodies used: HA antibody (Covance, MMS-101R), NeuN antibody (Millipore, MAB377), MeCP2 antibody (Cell Signaling, 3456S) and GFP antibody (Abcam, ab6673). Four sets of primers targeted to MECP2 were designed. One set (mecp2_1) was a cross-intron primer targeted to transgenic cDNA fragments representing the copy number of transgenic DNA; the second (mecp2_2) was targeted to one exon of transgenic cDNA fragments representing the total MECP2 copy number; and the other two primer sets (mecp2IN_1 and mecp2IN_2) were targeted to introns of monkey MECP2 gene representing the endogenous MECP2 copy number. Two sets of EGFP primers (EGFP_1 and EGFP_2) were designed to verify the copy number of the transgene, and one set of mCherry primers was designed as negative control. The copy number of these DNA fragments was measured using custom-designed Multiplex AccuCopyTM Kit (Geneskies Biotechnologies, CN0105). The copy number of these target DNA fragments was measured using custom-designed Multiplex AccuCopy kit (Geneskies Biotechnologies, CN0105). For each DNA fragment amplified, a piece of synthesized competitive double-stranded DNA of known concentration and with insertions or deletions of a few base pairs was added to the PCR reaction mix. Each PCR reaction was carried out by mixing the synthesized competitive double-stranded DNAs for target and reference genes (POP1, RPP14 and POLR2A) together with a defined amount of sample DNAs. A multiplex competitive PCR was then performed to simultaneously amplify all reference and target genes from both sample and competitive DNAs using multiple fluorescence-labelled primer pairs. In brief, the 20-μl PCR reaction for each sample contained 1× AccuCopy PCR Master Mix, 1× Fluorescence Primer Mix, 1× Competitive DNA mix and ~10 ng sample DNA. The PCR program used was: 95 °C for 10 min; 11 cycles of 94 °C for 20 s, 65 °C–0.5 °C/cycle 40 s, 72 °C for 1.5 min; 24 cycles of 94 °C for 20 s, 59 °C for 30 s, 72 °C for 1.5 min; 60 °C for 60 min. PCR products were diluted 20-fold before loaded on ABI3730XL sequencer (Applied Biosystems) to separate amplicons of different sizes by capillary electrophoresis. Raw data were analysed using GeneMapper4.0, and the peak ratios of sample DNA to competitive DNA (S/C ratio) for all target and reference fragments were exported to Excel. The S/C ratio of each target fragment was first normalized to the S/C ratio of the reference genes, and then further normalized to the median copy number of the entire data set. The final normalized ratio was averaged for each MECP2 primer and EGFP primer, and the similarity between the two ratio further confirmed the copy number of the transgene. Lentiviruses were produced by standard protocols and provided at a titre of 1010 vg ml−1 by the Shanghai SBO Medical Biotechnology Co. Ltd. A total of 2 μg genomic DNA was used to construct a DNA library for each case35, 36, 37, 38. Sequencing linkers were further added onto genomic segments (length around 500–700 base pairs (bp)) (Extended Data Fig. 1b). After end repairing and 3′ A-adding, the fragmented DNAs were ligated with Y-shape adaptor. Amplification was performed with the adaptor primers. Asymmetry-primer PCR (APP) was used to enrich the viral integration sites in each library. The APP method includes two PCR systems. The first PCR system includes only LTR specific primer. After 12 cycles of linear amplification, adaptor specific primer was added in the PCR system followed by 12 cycles of exponential amplification. PCR products were purified using 0.7 × AMPure beads (Beckman, A63882). The second PCR system uses a pair of primers nest the primers in the first PCR system. After 12 cycles of linear amplification and 15 cycles of exponential amplification, the PCR products of 500–700 bp in size were isolated by agarose gel electrophoresis before being used to construct libraries with Illumina paired-end adapters according to the manufacturer protocol and sequenced by Illumina MiSeq V3 (2 × 300 base paired ends). Only the paired-end reads showing the fusions of viral sequences and the cynomolgus (Macaca fascicularis) genome segments were selected, in which two mismatches were allowed. The reads showing the same integration position were merged and treated as a unique integration site. Experiments were repeated three times independently with different sequencing linkers. Determination of insertion sites is under the following criteria: (1) total insert numbers are greater than 100 times after three experiments; (2) being detected at least twice after three experiments. Cynomolgus monkey genome is used in the following database: http://www.ncbi.nlm.nih.gov/genome/?term=crab+eating+monkey. Target sequences containing LTR of transgene cassettes and genomic segments flanking the transgenes were analysed (Supplementary Tables 2 and 6). Monkey brain tissues were homogenized in RIPA buffer (containing 50 mM Tris-HCl, pH 7.4, 150 mM NaCl, 1% Triton X-100, 0.1% SDS, 1% sodium deoxycholate, protease inhibitor cocktail and phosphatase inhibitor cocktail) on ice and then centrifuged at 1,000g for 10 min at 4 °C. The supernatant was stored at −80 °C until use. Protein concentration was measured with BCA method. Approximately 30 μg protein of each sample was loaded in on 10% SDS–PAGE and run at 120 V constant voltage. A constant current of 0.36 mA was used for transblotting. Blots were probed with primary antibodies (1:1,000) overnight at 4 °C. After washing three times, blots were then incubated with goat anti-rabbit secondary antibody (1:3,000) at room temperature for 2 h. Chemiluminescence was used to visualize protein bands. Antibodies used: HA antibody (Abcam, ab9110), MeCP2 antibody (Cell Signaling, 3456S) and GFP antibody (Invitrogen, A11122). Fresh whole blood from upper arms of monkeys was taken by a professional veterinarian in the morning before feeding. Whole blood (200–400 μl) was dropped onto filter paper immediately. After air drying, filter papers were store at −20 °C before mass spectrometry analysis. API2000 from AB SCIEX were used for analysing fatty acid and amino acids. Data were obtained from three rounds of blood collections independently. Behaviour observation and analysis were performed by two independent trained observers, with demonstrated inter-observer reliability of at least 80%. All observers were blinded to the genotypes of the monkeys. The dimension of cages using for living and behaviour monitoring is 1.5 × 1 × 1.1 m. Monkeys individually, were observed alone in an observation cage (1.5 × 1 × 1.1 m) after they had been accustomed to community living following weaning. The observation cage was similar to their home cage. All locomotion behaviours were video-record without interruption for 20 min each day for 5 days. Data from 5 days were pooled. Social behaviours of TG and WT monkeys with familiar and unfamiliar monkeys were studied by examining the interactions of monkey from the same and different home cage, respectively. To study the interaction with familiar monkeys, we housed three groups of monkeys, each consisting three WT and two TG monkey of the same age, in three separate cages for 6 months before the observation (at about 1.5 years old). In this analysis, the observer followed the time each monkey spent sitting together with another monkey for a duration of 1 h each day for 5 consecutive days. We defined that two monkeys sat together by obvious interactions between the two for more than 3 s, during which the monkeys may exhibit touching and grooming behaviours or lean against each other. To study interaction with unfamiliar monkeys, we regrouped the females from same cohorts after the above observation for another 8 months in four separate cages (see Supplementary Table 4a, b). (Males were kept together separately owing to their proximity to sexual maturity, thus not used for observation). For each observation of social interaction, we paired two monkeys from different group and observation was made in the same manner as that described above for the interaction between familiar monkeys. To study the interaction with F TG monkeys, we housed two groups of monkeys (group info see Supplementary Table 7), each consisting of three WT and two TG F monkeys of similar age (at 10–11 months old), in two separate cages before the observation. In this analysis, the observer followed the time each monkey spent sitting together with another monkey for a duration of 1 h each day for 5 consecutive days. The TAD behavioural model was used to assay the monkey’s response to human gaze (Extended Data Fig. 5a). In each session of observation, an individual monkey from either the transgenic or WT group was placed in an observation cage (1.5 × 1 × 1.1 m), and allowed to adapt to the cage alone for 9 min. An observer then sat in front of the cage at a distance of 2 m, showing the face profile to the monkey without eye contact for 9 min (‘non-gaze period’). This was followed by the relaxation period (3 min) without the human presence, and the ‘gaze period’ (9 min) in which the observer sat in front of the cage and gazed at monkey with a neutral face. Behaviour and vocalizations were recorded on videotape39, 40, 41. WGTA tests were performed on 8 TG and 6 WT monkeys at the age of 1.5 years, in accordance to WGTA protocol25, 26, by trained technicians. The WGTA apparatus includes a testing box that for observing subject’s activity, a presentation board with food wells for reward placing, a trial door and an access door connected by pulley cord to separate the subject and presentation board, and a camera for recording. All tests were carried out in a quiet and standard lighted room. This test includes three stages: adaptation, discrimination and reversal. For the adaptation step, each monkey was tested for the ability to take the food reward on the presentation board that was placed by experimenter. Before the adaptation step, the monkey needs to pass several pre-test steps: the reward was placed in front of the food well, in the food well, in the food well next to the adaptation block, and in the food well with half covered by the adaptation block. Finally for adaptation step, the monkey had to take the food in the food well with the block covered completely. Each monkey received a maximum of 25 trials per day, and was considered to be passed when showing correct responses on 23 out of 25 trials. During the discrimination step, each monkey needed to choose the only reward in the food well that was covered by either a black or white block with an empty well covered the opposite colour. The same monkey was always rewarded with either black or white but with random location, with assignment of monkeys by the Gellerman order. Each monkey received 25 trials per day and was considered to be passed when showing correct responses on 23 out of 25 trials. For the reversal step, the procedure was the same as discrimination step, except that the monkey was rewarded black if white was rewarded during the discrimination step, and vice versa. This test includes four steps: adaptation, Hamilton search, Hamilton search set-breaking, and Hamilton search forced set-breaking. The adaptation step was similar to that for black/white test, with the same criterion for passing. For the Hamilton search step, four little boxes that represented the different positions from experimenter’s left to right on the presentation board were used for testing. The only reward was randomly placed in one of the four closed boxes in each trial. Monkey was allowed to find the reward from these four closed boxes. One trial was terminated when the monkey open the correct box. Each monkey performed 25 trials per day for 5 consecutive days. For the Hamilton search set-breaking step, the box that was the least preferred was first determined from the above step, and was always rewarded when chosen by the monkey. One trial was terminated when the subject open the correct box. Each monkey performed 25 trials per day for 5 days. For the Hamilton search forced set-breaking step, the procedure was the same as the set-breaking test, except that the monkey was allowed to make only one choice for finding the reward that placed in the least preferred box. The monkey was scored for the rate of correct choice over 25 trials each day for 5 consecutive days. The monkeys were tested for the ability to distinguish 240 pairs of toys. The toys in each pair were labelled A or B to cover the two food wells, one of which had food. For each monkey, either A or B was always rewarded. Each pair of toys was presented for 6 trials and 6 pairs were tested each day. Six different pairs were used for different days, with the test lasting 8 weeks until all 240 pairs were used. The monkey was scored for the rate of correct choice, averaged over 180 trials (5 days). Total RNA was extracted from three independent pieces of cortical tissues from brains of T05, T07, T09 and T14 and four WT monkeys by Trizol reagent (Invitrogen) separately. The RNA quality was checked by Bioanalyzer 2200 (Aligent) and kept at −80 °C. The RNA with RIN (RNA integrity number) > 8.0 is acceptable for cDNA library construction. RNA-seq and bioinformatic data analysis were performed by Shanghai Novelbio Ltd. The cDNA libraries for single-end sequencing were prepared using Ion Total RNA-Seq Kit v2.0 (Life Technologies) according to the manufacturer’s instructions. The cDNA libraries were then processed for the proton sequencing process according to the commercially available protocols. Samples were diluted and mixed, the mixture was processed on a OneTouch 2 instrument (Life Technologies) and enriched on a OneTouch 2 ES station (Life Technologies) for preparing the template-positive Ion PI Ion Sphere Particles (Life Technologies) according to Ion PI Template OT2 200 Kit v2.0 (Life Technologies). After enrichment, the mixed template-positive Ion PI Ion Sphere Particles of samples was loaded on to 1 P1v2 Proton Chip (Life Technologies) and sequenced on Proton Sequencers according to Ion PI Sequencing 200 Kit v2.0 (Life Technologies). Before read mapping, clean reads were obtained from the raw reads by removing the adaptor sequences, reads with >5% ambiguous bases (noted as N) and low-quality reads containing more than 20% of bases with qualities of <13. The clean reads were then aligned to crab eating macaque genome (version: Mfa5.0) using the MapSplice program (v2.1.6). In alignment, preliminary experiments were performed to optimize the alignment parameters (-s 22 -p 15–ins 6–del 6–non-canonical) to provide the largest information on the AS events42. Dif-Gene-Find er-t. We applied DEseq algorithm to filter the differentially expressed genes, after the significant analysis and false discovery rate (FDR) analysis under the following criteria: (1) fold change > 1.5 or < 0.667; (2) FDR < 0.05 (ref. 43). A Volcano plot was drawn by P value based on the differential gene analysis, and the colour was determined by the filtering criteria (red, log (P value) > 1.5; blue, log (P value) < 1.5; black, log (FC(TG/WT)) < ±0.5). The F offspring was generated by ICSI using sperms obtained from testicular tissue xenografts of the T07 monkey. The method of testicular xenografting greatly shortened the time required for sexual maturation of TG monkey44.
The four MMS spacecraft appear as greenish streaks in this series of photos taken on Nov. 30, 2015 (Dec. 1, 2015, local time), near Tokyo. Credit: Courtesy of Naritoshi Kitamura Looking like artificial shooting stars, the four Magnetospheric Multiscale, or MMS, spacecraft appear as greenish streaks in this series of photos taken with a DSLR camera from Japan on Nov. 30, 2015, at 2:11 p.m. EST (Dec. 1, 2015, at 4:11 a.m. local time). The spacecraft appear lit up to our eyes, because they reflect sunlight coming in from over the horizon. The slightly staggered spacing of the four spacecraft reflects their stretched-out pyramid-shaped flying formation, which allows them to create three-dimensional maps of the particles and magnetic fields in near-Earth space—key information for understanding the dynamic magnetic system around our planet and an explosive process called magnetic reconnection, which can send particles hurtling through space at dramatic speeds. The four spacecraft were flying at distances of six to 60 miles apart as they streaked over Sagamihara, Japan, near Tokyo on Earth's night side. Over the day side, their formation compressed into a three-sided pyramid shape with a mere six miles between each of the spacecraft—the tightest multi-spacecraft formation ever flown in orbit. The bright spot near the top of the image is the brighter star of the constellation Canis Minor. Two pieces of space junk are also visible—in the upper left of the frame, an Atlas 1 Centaur rocket body can be seen as it shoots across the sky. Near the bottom of the frame, an Ariane 5 upper stage moves more slowly from right to left. Captured by space scientist Naritoshi Kitamura from JAXA's Institute of Space and Astronautical Science, the 10 two-second exposures were taken with a Canon EOS 6D with sensitivity ISO-25600, F5.6 aperture, and 300 mm focal length.
News Article | January 27, 2016
There have been reports that Windows Insiders for Windows 10 Mobile are experiencing rogue data usage that is eating up their data plans, even when a Wi-Fi connection is available. Windows 10 Mobile is a relatively new mobile operating system compared to iOS and Android, and as such bugs are expected to pop up here and there. The reported issue, however, is not just a mere annoyance, but rather a serious problem that could have users seeing dollars upon dollars going the drain. Several threads have been created on the Windows Phone Reddit regarding the problem, with one such thread started by a user with a Lumia 830 running the Insider Build of Windows 10 Mobile. According to the user, the smartphone is constantly trying to connect to the network. Upon checking the data option in the phone's settings, System is shown to take up most of the device's usage. The user's AT&T plan have already used 4 GB, with System responsible for more than 3 GB of the consumed data. The user claims that the only way to prevent Windows 10 Mobile from consuming data is to deactivate cellular data. Other users have reported that System consumes hundreds of MB daily, which will quickly add up as most subscribers are on a data cap for their mobile subscriptions. The cause of the problem was believed to have been found by another Reddit user, who claimed that it was the message sync feature that was behind the data plan drains. It seems that the feature is eating up massive amounts of data as it restores backups of years of SMS and MMS through the cellular connections of users, even when devices are connected to a Wi-Fi network. The user mentioned that to fix the problem, users will have to enter the Windows 10 Mobile device's settings and access the Messaging menu under System. There, the option to sync messages between devices should be toggled off. The user said that this solved the issue after about an hour as tasks that have already been started were finished over the time, with no new tasks added as the feature has been turned off. For what it's worth, Microsoft's data team is looking into the issue, with the problem being tracked through the feedback app.