re

Canada reports 1st local case of H5 bird flu

A teen in Canada may be the first person to catch an H5 bird flu virus within the country. Health officials are now working to confirm the diagnosis.




re

Global carbon emissions reach new record high in 2024, with no end in sight, scientists say

There is a 50% chance that global warming will consistently exceed 1.5 degrees Celsius in the next six years, according to a new report.




re

04 – The Internet Musician – 8 Steps to Create a Music Website

Show Notes for Episode 4: Subscribe to the Internet Musician Podcast with iTunes: As a musician, you need a good website.  You know that. But you really don’t need to spend years trying to understand the technology. You also don’t want to spend tons of time working on your site without knowing if you’re doing things […]



  • Podcast
  • create a music website
  • create a website
  • music website design

re

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls

Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming




re

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)

As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain.  Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s




re

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)

This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ????️‍♀️) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! ???? It's enough to make you want to chuck your phone in the ocean.




re

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka




re

Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the




re

Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few




re

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF)," Cleafy researchers Michele Roviello, Alessandro Strino




re

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country's Personal Information Protection Commission (PIPC) said Meta gathered information such as




re

Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute




re

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to




re

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management




re

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. "The campaign




re

5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN's Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging




re

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as




re

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The "intriguing" campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. "What makes the CRON#




re

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available




re

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point




re

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. "This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures," CloudSEK said in a




re

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier this March. The U.S. Department of Justice (DoJ)




re

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the




re

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week. "However, threat actors have




re

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways,




re

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. "Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness," Russian cybersecurity vendor Kaspersky said. "Threat actors leveraged an unconventional blend




re

5 Ways Behavioral Analytics is Revolutionizing Incident Response

Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more




re

North Korean Hackers Target macOS Using Flutter-Embedded Malware

Threat actors with ties to the Democratic People's Republic of Korea (DPRK aka North Korea) have been found embedding malware within Flutter applications, marking the first time this tactic has been adopted by the adversary to infect Apple macOS devices. Jamf Threat Labs, which made the discovery based on artifacts uploaded to the VirusTotal platform earlier this month, said the Flutter-built




re

Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks

The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group's playbook to orchestrate its own version of the Dream Job campaign targeting the aerospace industry by offering fake jobs since at least September 2023. "The campaign distributed the SnailResin malware, which activates the SlugResin backdoor," Israeli cybersecurity company ClearSky said




re

ANOTHER GREAT GUN GUY PASSES

I was saddened to be told of the recent death of my old friend Ed Lovette. He had a long and distinguished career in military, law enforcement, and the CIA. Ed was a thinking man’s instructor. We took each other’s classes. He went through my LFI-I course back in the day , and about thirty […]




re

WHY COMPETITION IS RELEVANT TO SELF-DEFENSE

Recently saw this on YouTube, from a grandmaster competition shooter who is also in law enforcement. I agree with him. I’ve said for years that while a shooting match is not a gunfight, a gunfight most certainly is a shooting match. Competition experience makes shooting under pressure the norm. Wyatt Earp competed in the informal […]




re

THE NEXT TIME AN ANTI-GUNNER SAYS CITIZENS’ RIFLES ARE USELESS AGAINST ARMIES…

…remind them of this. I was recently reading “Andrew Jackson and the Miracle of New Orleans” by Brian Kilmeade and Don Yeager. The War of 1812 was going badly for the Americans. The British had burned the White House, and a huge contingent of British troops was in Louisiana planning to march north in conquest. […]




re

THE LAW AND THE FACTS ARE ON OUR SIDE, BUT WE SHOULD BE USING EMOTION, TOO

Historically, both law and facts are on the gun owners’ side of the “gun control” debate, and the Other Side had relied largely on emotion.  I respectfully submit that emotion is something our side should play to, as well. I made that point recently at the 2024 Gun Rights Policy Conference in San Diego last […]




re

SUICIDE PREVENTION

While participating in a Zoom conference with other members of the New Hampshire Firearms Safety Coalition, of which I’ve been a proud member for a quarter century or so, I was reminded that I have not addressed here a topic NHFSC has strongly and successfully focused upon: suicide prevention. The organization was founded by the […]




re

Record of Achievement

On the interesting properties of becoming the kind of person who buys vinyl records.




re

Typo in Trump’s Name on Ballot Review Screen Is Not ‘Election Fraud’

A misspelling of former President Donald Trump's name occurred on an optional ballot review screen in Virginia, prompting an unfounded claim on social media of "election fraud." The error was a typo that appeared only on the ballot review screen, not on actual ballots, and would not affect any votes, election officials said.

The post Typo in Trump’s Name on Ballot Review Screen Is Not ‘Election Fraud’ appeared first on FactCheck.org.




re

Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia

Posts shared on Facebook make an unfounded claim of racially motivated threats of violence in Gwinnett County, Georgia, "from now until the Inauguration." The county sheriff's office said it had "not received any information indicating threats to any group(s) on or after election day."

The post Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia appeared first on FactCheck.org.




re

Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias

Social media users alleged bias against former President Donald Trump when a Google search on Election Day for “where to vote” returned an interactive map to find a person’s polling station when including the word “Harris” but not “Trump.” The reason is because “Harris” is a county in Texas, whereas “Trump” is not a location.

The post Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias appeared first on FactCheck.org.




re

Posts Falsely Claim CBS News Reported ‘Cheating’ in Election

Some social media posts falsely claimed that CBS News reported there was "cheating" in the 2024 presidential election that benefitted President-elect Donald Trump. We found no evidence of such a report, and a CBS News spokesperson said the outlet "did not report or say there was cheating in the election."

The post Posts Falsely Claim CBS News Reported ‘Cheating’ in Election appeared first on FactCheck.org.




re

More inexpensive ebook goodies!


You can now download Peter F. Hamilton's Pandora's Star for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

The year is 2380. The Intersolar Commonwealth, a sphere of stars, contains more than six hundred worlds interconnected by a web of transport “tunnels” known as wormholes. At the farthest edge of the Commonwealth, astronomer Dudley Bose observes the impossible: over one thousand light-years away, a star . . . disappears. Since the location is too distant to reach by wormhole, the Second Chance, a faster-than-light starship commanded by Wilson Kime, a five-times-rejuvenated ex-NASA pilot, is dispatched to learn what has occurred and whether it represents a threat.

Opposed to the mission are the Guardians of Selfhood, led by Bradley Johansson. Shortly after the journey begins, Kime wonders if the crew of the Second Chance has been infiltrated. But soon enough he will have other worries. Halfway across the galaxy, something truly incredible is waiting: a deadly discovery whose unleashing will threaten to destroy the Commonwealth . . . and humanity itself.




re

More inexpensive ebook goodies!


You can now get your hands on the digital edition of Blake Crouch's Upgrade for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

The mind-blowing new thriller from the New York Times bestselling author of Dark Matter and Recursion—currently in development as a motion picture at Steven Spielberg's Amblin Partners

“You are the next step in human evolution.”

At first, Logan Ramsay isn’t sure if anything’s different. He just feels a little . . . sharper. Better able to concentrate. Better at multitasking. Reading a bit faster, memorizing better, needing less sleep.

But before long, he can’t deny it: Something’s happening to his brain. To his body. He’s starting to see the world, and those around him—even those he loves most—in whole new ways.

The truth is, Logan’s genome has been hacked. And there’s a reason he’s been targeted for this upgrade. A reason that goes back decades to the darkest part of his past, and a horrific family legacy.

Worse still, what’s happening to him is just the first step in a much larger plan, one that will inflict the same changes on humanity at large—at a terrifying cost.

Because of his new abilities, Logan’s the one person in the world capable of stopping what’s been set in motion. But to have a chance at winning this war, he’ll have to become something other than himself. Maybe even something other than human.

And even as he’s fighting, he can’t help wondering: what if humanity’s only hope for a future really does lie in engineering our own evolution?

Intimate in scale yet epic in scope, Upgrade is an intricately plotted, lightning-fast tale that charts one man’s thrilling transformation, even as it asks us to ponder the limits of our humanity—and our boundless potential.





re

More inexpensive ebook goodies!


You can now download Sebastien de Castell's Play of Shadows for only 0.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

Swordplay, magic, intrigue and friendships stronger than iron: the first volume in the new swashbuckling fantasy series set in the universe of THE GREATCOATS.

Damelas Chademantaigne picked a poor night to flee a judicial duel.

He has precious little hope of escaping the wrath of the Vixen, the most feared duellist in the entire city, until he stumbles through the stage doors of the magnificent Operato Belleza and tricks his way into the company of actors. An archaic law provides a temporary respite from his troubles - until one night a ghostly voice in his head causes Damelas to fumble his lines, inadvertently blurting out a dreadful truth: the city's most legendary hero may actually be a traitor and a brutal murderer.

With only the help of his boisterous and lusty friend Bereto, a beautiful assassin whose target may well be Damelas himself, and a company of misfit actors who'd just as soon see him dead, this failed grandson of two Greatcoats must somehow find within himself the courage to dig up long-buried truths before a ruthless band of bravos known as the Iron Orchids come for his head.

Oh, and there's still that matter of the Vixen waiting to duel him . . .





re

More inexpensive ebook goodies!


For a limited time, you can download Paolo Bacigalupi's Navola for only 5.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

From the New York Times best-selling author of The Windup Girl and The Water Knife comes a sweeping literary historical fantasy about the young scion from a ruling-class family who faces rebellion as he ascends to power.

"You must be as sharp as a stilettotore’s dagger and as subtle as a fish beneath the waters. This is what it is to be Navolese, this is what it is to be di Regulai."

In Navola, a bustling city-state dominated by a handful of influential families, business is power, and power is everything. For generations, the di Regulai family—merchant bankers with a vast empire—has nurtured tendrils that stretch to the farthest reaches of the known world. And though they claim not to be political, their staggering wealth has bought cities and toppled kingdoms. Soon, Davico di Regulai will be expected to take the reins of power from his father and demonstrate his mastery of the games of Navolese diplomacy: knowing who to trust and who to doubt, and how to read what lies hidden behind a smile. But in Navola, strange and ancient undercurrents lurk behind the gilt and grandeur—like the fossilized dragon eye in the family’s possession, a potent symbol of their raw power and a talisman that seems to be summoning Davico to act.

As tensions rise and the events unfold, Davico will be tested to his limits. His fate depends on the eldritch dragon relic and on what lies buried in the heart of his adopted sister, Celia di Balcosi, whose own family was destroyed by Nalova’s twisted politics. With echoes of Renaissance Italy, The Godfather, and Game of Thrones, Navola is a stunning feat of world-building and a mesmerizing depiction of drive and will.





re

More inexpensive ebook goodies!


You can now download R. Scott Bakker's The Darkness That Comes Before for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

A score of centuries has passed since the First Apocalypse. The No-God has been vanquished and the thoughts of men have turned, inevitably, to more worldly concerns...Drusas Achamian, tormented by 2,000 year old nightmares, is a sorcerer and a spy, constantly seeking news of an ancient enemy that few believe still exists. Ikurei Conphas, nephew to the Nansur Emperor, is the Exalt-General of the Imperial Army and a military genius. He plots to conquer the known world for his Emperor and dreams of the throne for himself. Maithanet, mysterious and charismatic, is spiritual leader of the Thousand Temples. He seeks a Holy War to cleanse the land of the infidel. Cnaiur, Chieftain of the Utemot, is a Scylvendi barbarian. Rejected by his people, he seeks vengeance against the former slave who slew his father, and disgraced him in the eyes of his tribe. Into this world steps Anasurimbor Kellhus, the product of two thousand years of breeding and a lifetime of training in the ways of thought, limb, and face. Steering souls through the subtleties of word and expression, he slowly binds all - man and woman, emperor and slave - to his own mysterious ends. But the fate of men - even great men - means little when the world itself may soon be torn asunder. Behind the politics, beneath the imperialist expansion, amongst the religious fervour, a dark and ancient evil is reawakening. After two thousand years, the No-God is returning. The Second Apocalypse is nigh. And one cannot raise walls against what has been forgotten...




re

More inexpensive ebook goodies!


You can now download Guy Gavriel Kay's The Lions of Al-Rassan for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

The ruling Asharites of Al-Rassan have come from the desert sands, but over centuries, seduced by the sensuous pleasures of their new land, their stern piety has eroded. The Asharite empire has splintered into decadent city-states led by warring petty kings. King Almalik of Cartada is on the ascendancy, aided always by his friend and advisor, the notorious Ammar ibn Khairan -- poet, diplomat, soldier -- until a summer afternoon of savage brutality changes their relationship forever.

Meanwhile, in the north, the conquered Jaddites' most celebrated -- and feared -- military leader, Rodrigo Belmonte, driven into exile, leads his mercenary company south.

In the dangerous lands of Al-Rassan, these two men from different worlds meet and serve -- for a time -- the same master. Sharing their interwoven fate -- and increasingly torn by her feelings -- is Jehane, the accomplished court physician, whose own skills play an increasing role as Al-Rassan is swept to the brink of holy war, and beyond.

Hauntingly evocative of medieval Spain, The Lions of Al-Rassan is both a brilliant adventure and a deeply compelling story of love, divided loyalties, and what happens to men and women when hardening beliefs begin to remake -- or destroy -- a world.




re

More inexpensive ebook goodies!


You can now get your hands on the digital edition of Hugh Howey's Machine Learning: New and Collected Stories for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

A collection of shockingly prescient stories covering topics from aliens to AI, including some that have never before been seen, from the New York Times best-selling author of the Silo trilogy

Hugh Howey is known for crafting riveting and immersive page-turners of boundless imagination, spawning millions of fans worldwide, first with his best-selling novel Wool, and then with other enthralling works such as Sand and Beacon 23.

Now comes Machine Learning, an impressive collection of Howey’s science fiction and fantasy short fiction, including three stories set in the world of Wool, two never-before-published tales written exclusively for this volume, and fifteen additional stories collected here for the first time. "Glitch" asks what happens when a battle bot refuses to fight. “The Automated Ones” introduces ideas of discrimination in a world populated by both humans and AI, and its sequel “WHILE (u > i) i –;” explores the challenges a human woman and an android face after falling in love. In "Select Character" a new mother who is bored with being stuck at home starts playing her husbands' video game according to her own rules-- and makes a surprising discovery. These stories explore everything from artificial intelligence to parallel universes to video games, and each story is accompanied by an author’s note exploring the background and genesis of each story.

Howey’s incisive mind makes Machine Learning: New and Collected Stories a compulsively readable and thought-provoking selection of short works—from a modern master at the top of his game.





re

More inexpensive ebook goodies!


You can now download Barbara Hambly's The Sun Wolf and Starhawk omnibus, comprised of The Ladies of Mandrigyn, The Witches of Wenshar, and The Dark Hand of Magic, for only 3.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

Three fantasy novels of war and wizardry by a “fabulously talented” New York Times–bestselling author (Charlaine Harris).

In The Ladies of Mandrigyn, a brilliant mercenary must lead his army against the forces of the most powerful wizard alive. Gifted with courage, strength, and the intelligence to know when to fight, Sun Wolf is the greatest mercenary in a land overrun by war. With his first lieutenant, Starhawk, at his side, he has laid waste to countless cities, taking the best of their treasures for himself, and distributing the rest among his bloodthirsty crew.

Then a woman comes to him, an emissary from the town of Mandrigyn, a lush port city recently sacked by a powerful, mad wizard of unmatched abilities. She offers Sun Wolf untold riches for the use of his army, but the captain is not fool enough to wage war against a magician. He refuses her offer, but that is not the end of it. The women of Mandrigyn can be very persuasive.

In The Witches of Wenshar, to harness his newfound magical powers, Sun Wolf must cross the desert in search of a witch who can teach him the ways of sorcery. Accompanied by his lieutenant, Starhawk, he travels across the forbidding desert to the land of Wenshar, where witchcraft is said to flourish. There he seeks out a witch with powers far beyond her years, who is rumored to have mastered the ancient art of white magic. But when he and Starhawk finally reach her, there is evil in the air—an evil against which all their might is useless. Sun Wolf must learn to harness his newfound powers—or be taken by this sinister trap.

In The Dark Hand of Magic, Sun Wolf must use his immature magical powers to rescue his old army from an evil wizard’s curse. A string of rotten luck has befallen his old crew’s latest campaign, and they have begun to suspect a curse. Their arrows break; their food rots; their tunnels cave in. They have heard rumors of Sun Wolf’s magical abilities, and beg for his help. But when he goes after whatever is targeting his men, he finds himself up against the deadliest force he has ever encountered.





re

More inexpensive ebook goodies!


You can now download Neal Stephenson's Termination Shock for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

New York Times Bestseller

From Neal Stephenson—who coined the term “metaverse” in his 1992 novel Snow Crash—comes a sweeping, prescient new thriller that transports readers to a near-future world in which the greenhouse effect has inexorably resulted in a whirling-dervish troposphere of superstorms, rising sea levels, global flooding, merciless heat waves, and virulent, deadly pandemics.

One man—visionary billionaire restaurant chain magnate T. R. Schmidt, Ph.D.—has a Big Idea for reversing global warming, a master plan perhaps best described as “elemental.” But will it work? And just as important, what are the consequences for the planet and all of humanity should it be applied?

Ranging from the Texas heartland to the Dutch royal palace in the Hague, from the snow-capped peaks of the Himalayas to the sunbaked Chihuahuan Desert, Termination Shock brings together a disparate group of characters from different cultures and continents who grapple with the real-life repercussions of global warming. Ultimately, it asks the question: Might the cure be worse than the disease?

Epic in scope while heartbreakingly human in perspective, Termination Shock sounds a clarion alarm, ponders potential solutions and dire risks, and wraps it all together in an exhilarating, witty, mind-expanding speculative adventure.





re

More inexpensive ebook goodies!


You can now download Robert Jordan's The Eye of the World for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

The three next installments, The Great Hunt, The Dragon Reborn, and The Shadow Rising are also on sale.

Here's the blurb:

The Wheel of Time ® is a PBS Great American Read Selection! Now in development for TV!

Since its debut in 1990, The Wheel of Time® by Robert Jordan has captivated millions of readers around the globe with its scope, originality, and compelling characters.

The Wheel of Time turns and Ages come and go, leaving memories that become legend. Legend fades to myth, and even myth is long forgotten when the Age that gave it birth returns again. In the Third Age, an Age of Prophecy, the World and Time themselves hang in the balance. What was, what will be, and what is, may yet fall under the Shadow.

When The Two Rivers is attacked by Trollocs—a savage tribe of half-men, half-beasts— five villagers flee that night into a world they barely imagined, with new dangers waiting in the shadows and in the light.




re

More inexpensive ebook goodies!


You can now download Joanne Bertin's The Last Dragonlord for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

Dragonlord Linden Rathan, last-born of a race of immortal weredragons, has spent six hundred years alone, searching for his soultwin while his fellow Dragonlords watch over humanity’s Five Kingdoms.

When the Queen of Cassori dies mysteriously, Linden and the other Dragonlords are called upon to prevent civil war as two human claimants vie for the regency. As the battle for Cassori rule escalates, Linden becomes the target of the Fellowship, a secret society of true-humans who could actually destroy his immortal life.

Then he meets a beautiful young ship captain named Maurynna who may be the only one who can help Linden bring Cassori back from the brink of chaos. The Last Dragonlord is the debut novel in Joanne Bertin’s acclaimed Dragonlord series.



You can also download Greg Bear's Eon for only 1.99$ here.

Here's the blurb:

In a supernova flash, the asteroid arrived and entered Earth’s orbit. Three hundred kilometers in length, it is not solid rock but a series of hollowed-out chambers housing ancient, abandoned cities of human origin, a civilization named Thistledown. The people who lived there survived a nuclear holocaust that nearly rendered humanity extinct—more than a thousand years from now.

To prevent this future from coming to pass, theoretical mathematician Patricia Vasquez must explore Thistledown and decipher its secret history. But what she discovers is an even greater mystery, a tunnel that exists beyond the physical dimensions of the asteroid. Called the Way, it leads to the home of humanity’s descendants, and to a conflict greater than the impending war between Earth’s superpowers over the fate of the asteroid, in “the grandest work yet” by Nebula Award–winning author Greg Bear (Locus).