li

Scientific Replication is Harder Than YouThink -and Can Be Hilarious

Science experiments are not considered completely valid unless they can be replicated. Replicating an experiment is pretty much impossible unless you've been steeped in the various factors of scientific theory. And even if you are thoroughly trained in those factors, it's easy to lose track when you're doing a casual experiment at home. That goes double when your aim is to debunk something that you find obviously wrong.

Sage the Bad Naturalist jumped into such a debunking experiment with both feet, and then got entangled in them. She spent an entire year trying to replicate a dubious TikTok, which turned into an embarrassing adventure in how not to do science. But negative results are still results, and the goal of science is always to learn something. She bravely admits all the things she did wrong, because scientists have to have humility to be accepted. What's funniest is how many things went wrong, and how they all piled up to the end. What she ended up with is an amusing and rather charming video on the dangers of throwing your heart (and time) into debunking something you saw on the internet. -via Metafilter




li

The <i>S.S. Relief</i>--A Floating Outhouse in California

Altas Obscura tells us about the S.S. Relief--the formal name for an outhouse that floats in Lake Casitas near Ventura, California. The artificial lake is an important water reservoir for the thirsty people of southern California, so the Casitas Municipal Water District takes its cleanliness very seriously.

The lake is popular among boaters and fishermen. After a few hours out on the water, people need to relieve themselves. They can then paddle up to the S.S. Relief, which is a 2-seater outhouse that floats on the surface of the water. The waste is contained on the barge, so there's no contamination of the lake's purity.




li

How Harlan Ellison Claimed <i>The Terminator</i>

Prolific science fiction author Harlan Ellison wrote two episodes of the TV series The Outer Limits, "Soldier" and "Demon with a Glass Head." They both ran during the show's second season in 1964. In 1984, Ellison heard that James Cameron was working on a film that seemed quite similar to the plot of "Soldier," which you can watch in full. Hemdale Productions wouldn't let him see the script. When he saw The Terminator, Ellison was ready to sue.

The lawsuit never came about, because Hemdale Productions settled the case, for money, screen credit in subsequent releases of the film, and a gag order. To this day, people argue over whether The Terminator was at all plagiarized and if so, how much. Read what Ellison had to say about the case at the time and the reaction from James Cameron at Den of Geek. You've probably already seen The Terminator, and it's up to you to watch The Outer Limits episode if you want to form your own opinion.  





li

Key to Life FAIL





li

Girl Texts Guy Insult in an Attempt to Flirt, and Ends up Getting Stonewalled after Some Serious Awkwardness

It all starts with the anything-but-smooth introduction...










li

35 Funny Texting FAILs Full of Cringe to Lighten Your Mood




li

Our ancestor Lucy may have used tools more than 3 million years ago

An analysis looking at the hand bones of australopithecines, apes and humans reveals that tool use likely evolved before the Homo genus arose.




li

03 – The Internet Musician – Five Things You Must Believe To Go Indie

Show notes for Episode #3: Subscribe to the Internet Musician Podcast with iTunes: Also in this episode, I discuss the five things you must believe cultivate your DIY music attitude, including: 1. The business has been lying to you. Major label artists are not getting rich off of record sales. Radio is fake. Don’t belive […]



  • Podcast
  • DIY music attitude
  • internet musician podcast
  • music marketing on the internet

li

06 – The Internet Musician – Music Licensing for Indie Artists

Show Notes for Episode 6: Following my recent appearance on the Film and TV Music Licensing Panel at the MidAtlantic Music Conference here in Charlotte, NC, I definitely have music licensing on my mind.  It’s always been a passion of mind…one of those areas of music marketing that I’ve researched exhaustively for years.  It’s also […]




li

Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine

Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). The tech giant described the development as the "first real-world vulnerability" uncovered using the artificial intelligence (AI) agent. "We believe this is the first public example of an AI agent finding




li

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)

As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain.  Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s




li

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka




li

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to "Android/data," "Android/obb," and "Android/sandbox" directories, and their respective




li

Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices

Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager. RISK:STATION is an "




li

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. "An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed




li

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59




li

Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute




li

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers' Amazon Web Services (AWS) credentials. The package in question is "fabrice," which typosquats a popular Python library known as "fabric," which is designed to execute shell commands remotely over




li

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management




li

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an entity in the region. "During this attack, the threat actor used as a lure the upcoming World Expo, which will be held in 2025 in Osaka, Japan," ESET said in its APT Activity Report for the period April to




li

CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that




li

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The "intriguing" campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. "What makes the CRON#




li

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available




li

Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective

Let’s face it—traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it's over. Now, imagine cybersecurity training that’s as unforgettable as your favorite show. Remember how "Hamilton" made history come alive, or how "The Office" taught us CPR (Staying Alive beat, anyone?)?




li

HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities

Hewlett Packard Enterprise (HPE) has released security updates to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The flaws affect Access Points running Instant AOS-8 and AOS-10 - AOS-10.4.x.x: 10.4.1.4 and below Instant AOS-8.12.x.x: 8.12.0.2 and below Instant AOS-8.10.x.x:




li

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia are being targeted with the GootLoader malware. "In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: 'Are Bengal Cats legal in Australia?,'" Sophos researchers Trang Tang, Hikaru Koike,




li

Life Begins

One of my strongest memories of my childhood is a fridge magnet. It was a small white cube…




li

Building community offline

I was overwhelmed by the response to my last post, and so grateful for the reminder that there is still connection to be found online, I just need to push through my own self-consciousness to find it. And I have many good models for this behavior, people who are quick with a kind and supportive word, people who do not shy away from nuance.

Today I spent the day offline in the company of people like this, a small group of friends that gathers once a month to share our love of stationery: pens, ink, paper, notebooks, planners, postal mail, and the like. We sit around a big table and journal together while chatting, snacking, and drinking lattes carefully crafted by FunkyPlaid. The middle of the table soon fills with stickers, stamps, inks, and washi tapes that we’ve brought to share with each other.

As I look around the table at these treasured people, I think about how much work goes into building community. Healthy communities take intention, upkeep, energy, and shared values. This gathering happens every month because we invest all of this into making it happen. As hosts, FunkyPlaid and I make sure people feel cared for with food and drink in a clean and welcoming space. As guests, everyone brings what they want to share, and expresses interest in what they are interested in (and refrains from expressing disdain for what they aren’t).

It’s a lot of work, joyful work. And this work results in a day each month to anticipate, and memories to hold close the rest of the month. I hope never to take this community for granted.




li

Law enforcement operation takes down 22,000 malicious IP addresses worldwide




li

AI in radio: A Polish interviewer fired




li

FBI says hackers are sending fraudulent police data requests ot tech giants to steal people's private information




li

Australia plans social media ban for under-16s




li

1700 letters from the tax office: Daylight exit messed up




li

WNBA is totally annoying, here’s how to fix it for Caitlin Clark’s arrival

Professional women’s basketball is a cesspool of mediocrity full of women gatekeeping so the sport can’t change. Fortunately, incoming rookie Caitlin Clark is worth more than the entire WNBA due to her sponsorships. This means that unlike other players, Clark doesn’t work for the WNBA she works for her sponsors and her fans. Also, Clark […]

The post WNBA is totally annoying, here’s how to fix it for Caitlin Clark’s arrival appeared first on Penelope Trunk Careers.




li

What explains the outsized success of autistic applicants to college

Z went to a Duke recruiting weekend where accepted kids can get a feel for the university. He hung out with some kids who decided to go to Harvard and Stanford, and a bunch of kids who decided on Duke. What was similar about all of them? They talked openly about having autism. At lunch […]

The post What explains the outsized success of autistic applicants to college appeared first on Penelope Trunk Careers.