The U.S. Supreme Court on Monday grappled over whether to upend a quarter-century of practice and limit where patent-infringement lawsuits can be filed. From a report on Reuters: The U.S. Supreme Court struggled over whether to upend nearly 30 years…
No One Knows What To Do With the International Space Station
An anonymous reader shares a report: In 2024 the clock will run out on the International Space Station. Maybe. That’s the arbitrary deadline that Congress imposed back in 2014, at which point they’ll have to decide whether or not to…
Elon Musk Launches Neuralink To Connect Brains With Computers
At Recode’s conference last year, Elon Musk said he would love to see someone do something about linking human brains with computers. With no other human being volunteering, Mr. Musk — who founded PayPal and OpenAI, thought of Hyperloop, is…
Four Years Later, Xbox Exec Admits How Microsoft Screwed Up Disc Resale Plan
An anonymous reader quotes a report from Ars Technica: We’re now approaching the four-year anniversary of Microsoft’s rollout (and subsequent reversal) of a controversial plan to let game publishers limit resale of used, disc-based games. Looking back on that time…
Interviews: Ask Lithium-Ion Battery Inventor John Goodenough a Question
John B. Goodenough is a solid-state physicist and professor of mechanical engineering and materials science at The University of Texas at Austin. While he is most famous for identifying and developing the lithium-ion battery, which can be found in just…
Fileless UAC Bypass Uses Windows Backup and Restore Utility
Researcher Matt Nelson disclosed another Windows UAC bypass, this one abusing the sdclt.exe backup and restore utility to execute a payload without triggering an alert.
APT29 Used Domain Fronting, Tor to Execute Backdoor
APT29, a/k/a Cozy Bear, has used Tor and a technique called domain fronting in order to secure backdoor access to targets for nearly two years running.
New Clues Surface on Shamoon 2’s Destructive Behavior
Researchers report new connections between Magic Hound and Shamoon 2, along with descriptions of how the Disttrack malware component of campaigns moves laterally within infected networks.