ed

Untitled




ed

How Harlan Ellison Claimed <i>The Terminator</i>

Prolific science fiction author Harlan Ellison wrote two episodes of the TV series The Outer Limits, "Soldier" and "Demon with a Glass Head." They both ran during the show's second season in 1964. In 1984, Ellison heard that James Cameron was working on a film that seemed quite similar to the plot of "Soldier," which you can watch in full. Hemdale Productions wouldn't let him see the script. When he saw The Terminator, Ellison was ready to sue.

The lawsuit never came about, because Hemdale Productions settled the case, for money, screen credit in subsequent releases of the film, and a gag order. To this day, people argue over whether The Terminator was at all plagiarized and if so, how much. Read what Ellison had to say about the case at the time and the reaction from James Cameron at Den of Geek. You've probably already seen The Terminator, and it's up to you to watch The Outer Limits episode if you want to form your own opinion.  




ed

Untitled




ed

Seed Money




ed

Your Teacher Warned Me About You









ed

Girl Texts Guy Insult in an Attempt to Flirt, and Ends up Getting Stonewalled after Some Serious Awkwardness

It all starts with the anything-but-smooth introduction...










ed

Drink of the Day: The Trump Tower Martini That Put Twitter on Ice And Weirded Everybody Out





ed

2,600-year-old Celtic wooden burial chamber of 'outstanding scientific importance' uncovered by archaeologists in Germany

The discovery of an impeccably preserved Celtic burial chamber in southern Germany is a "stroke of luck for archaeology," scientists say.




ed

Our ancestor Lucy may have used tools more than 3 million years ago

An analysis looking at the hand bones of australopithecines, apes and humans reveals that tool use likely evolved before the Homo genus arose.




ed

Extremely rare 'failed supernova' may have erased a star from the night sky without a trace

An artist's rendering of a black hole




ed

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka




ed

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to "Android/data," "Android/obb," and "Android/sandbox" directories, and their respective




ed

Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the




ed

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an entity in the region. "During this attack, the threat actor used as a lure the upcoming World Expo, which will be held in 2025 in Osaka, Japan," ESET said in its APT Activity Report for the period April to




ed

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point




ed

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier this March. The U.S. Department of Justice (DoJ)




ed

North Korean Hackers Target macOS Using Flutter-Embedded Malware

Threat actors with ties to the Democratic People's Republic of Korea (DPRK aka North Korea) have been found embedding malware within Flutter applications, marking the first time this tactic has been adopted by the adversary to infect Apple macOS devices. Jamf Threat Labs, which made the discovery based on artifacts uploaded to the VirusTotal platform earlier this month, said the Flutter-built




ed

Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs

Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler have come under active exploitation in the wild. The security vulnerabilities are among the 90 security bugs the tech giant addressed as part of its Patch Tuesday update for November 2024. Of the 90 flaws, four are rated Critical, 85 are rated Important, and one is rated Moderate in




ed

ISRAEL DISARMED

Mark Smith is a brilliant attorney, gun-focused and one of our most articulate spokespersons for firearms owners civil rights. Check out his blog called The Four Boxes Diner. That’s a reference to Boxes of Liberty: the soapbox, the ballot box, the jury box, and finally the cartridge box. You also want to check out his […]




ed

Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia

Posts shared on Facebook make an unfounded claim of racially motivated threats of violence in Gwinnett County, Georgia, "from now until the Inauguration." The county sheriff's office said it had "not received any information indicating threats to any group(s) on or after election day."

The post Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia appeared first on FactCheck.org.




ed

Trump Makes Unsupported Claim About ‘Massive CHEATING’ in Philadelphia

Former President Donald Trump posted to social media an unsupported claim about "massive CHEATING" in Philadelphia, which he claimed had drawn the attention of law enforcement. The Philadelphia Police Department, the Philadelphia district attorney, a Republican city council member and the Pennsylvania Department of State all refuted the claim.

The post Trump Makes Unsupported Claim About ‘Massive CHEATING’ in Philadelphia appeared first on FactCheck.org.




ed

Posts Falsely Claim CBS News Reported ‘Cheating’ in Election

Some social media posts falsely claimed that CBS News reported there was "cheating" in the 2024 presidential election that benefitted President-elect Donald Trump. We found no evidence of such a report, and a CBS News spokesperson said the outlet "did not report or say there was cheating in the election."

The post Posts Falsely Claim CBS News Reported ‘Cheating’ in Election appeared first on FactCheck.org.




ed

LA man wearing GPS ankle monitor is accused of a robbery string. Officials can't track him




ed

AI in radio: A Polish interviewer fired




ed

Annoyed Redditors tanking Google Search results illustrates perils of AI scrapers




ed

Election Officials Are Prepared for a Lot More Than You Might Think




ed

Man who made 'depraved' child images with AI jailed




ed

Australia plans social media ban for under-16s




ed

X is the latest social media site letting 3rd parties use your data to train AI models




ed

1700 letters from the tax office: Daylight exit messed up




ed

Why am I subscribed to Penelope’s Substack?

I had email FOMO. I could be making a million dollars a year from my subscriber list! I read email marketing advice like it was porn — people say it can happen but I don’t think it really does happen. Finally I capitulated and started collecting data. The best insight from that data set is […]

The post Why am I subscribed to Penelope’s Substack? appeared first on Penelope Trunk Careers.




ed

How to get funding from deluded, self-congratulating investors

From 1997 to 2012 just 1% of VC funded companies had female founders. Three of those companies were mine. People tell me it’s much better for women now, but statistically, this is BS. I raised money for a startup recently, and here’s what I found works best for female founders: Get a male cofounder. Women raising money without […]

The post How to get funding from deluded, self-congratulating investors appeared first on Penelope Trunk Careers.




ed

What explains the outsized success of autistic applicants to college

Z went to a Duke recruiting weekend where accepted kids can get a feel for the university. He hung out with some kids who decided to go to Harvard and Stanford, and a bunch of kids who decided on Duke. What was similar about all of them? They talked openly about having autism. At lunch […]

The post What explains the outsized success of autistic applicants to college appeared first on Penelope Trunk Careers.




ed

Questionnaire for everyone who stopped talking to me

I’ve developed a survey to give to people who slipped me into their not-friend category. Since I’m a person with no ability to cope with nuance, answers to all questions are yes/no. 1. Were you ever my real friend?  I want to know if you needed me like I needed you, but I don’t want […]

The post Questionnaire for everyone who stopped talking to me appeared first on Penelope Trunk Careers.