Toggle light / dark theme

Austin-based Silicon Labs has sold its infrastructure and automotive business for $2.75 billion to California-based semiconductor maker Skyworks Solutions. Plans for the all-cash deal was initially announced in April.

Silicon Labs primarily designs semiconductors and other silicon devices. CEO Tyson Tuttle said the deal will allow the company to focus on its growing Internet of Things business. Internet of Things, or IoT as it is known in industry shorthand, refers to a range of non-computing devices —from kitchen devices to security systems — that connect to the Internet.

Silcon Labs’ IoT business already serves tens of thousands of customers and works in thousands of applications, but the deal narrows Silicon Labs focus exclusively to that technology.

We hand out cash freely to some people, while we plague others with fraudulent debt notices that may cripple financially, with dire ultimate consequences.

There is a case to be made for a universal basic income (UBI) — an unconditional payment to everyone that ensures the basics of life are catered for. It may give people security to leave a bad situation, or freedom to pursue a new future. No conditions means no bureaucracy, which improves productivity and efficiency, and the universal nature of UBI means even conservatives can get on board.

But how to afford such a payment? Surely giving away free money would blow the budget?

Money is fungible, so while some payments are labelled as welfare and other line items may be called discounts, its is only the bottom line* of the balance sheet that matters. Looking solely at the bottom line, we may be far closer to an Australian UBI than you think.

Consider low income individuals — we already have a safety net in Australia to provide the poorest in the community with some minimum standard of living. We give them money to ensure the basics are met — a payment already included in any commonwealth budget.

Brain–computer interfaces (BCIs) provide bidirectional communication between the brain and output devices that translate user intent into function. Among the different brain imaging techniques used to operate BCIs, electroencephalography (EEG) constitutes the preferred method of choice, owing to its relative low cost, ease of use, high temporal resolution, and noninvasiveness. In recent years, significant progress in wearable technologies and computational intelligence has greatly enhanced the performance and capabilities of EEG-based BCIs (eBCIs) and propelled their migration out of the laboratory and into real-world environments. This rapid translation constitutes a paradigm shift in human–machine interaction that will deeply transform different industries in the near future, including healthcare and wellbeing, entertainment, security, education, and marketing. In this contribution, the state-of-the-art in wearable biosensing is reviewed, focusing on the development of novel electrode interfaces for long term and noninvasive EEG monitoring. Commercially available EEG platforms are surveyed, and a comparative analysis is presented based on the benefits and limitations they provide for eBCI development. Emerging applications in neuroscientific research and future trends related to the widespread implementation of eBCIs for medical and nonmedical uses are discussed. Finally, a commentary on the ethical, social, and legal concerns associated with this increasingly ubiquitous technology is provided, as well as general recommendations to address key issues related to mainstream consumer adoption.

Update now: The ream of bugs includes some remotely exploitable code execution flaws. Still to come: a fix for what makes iPhones easy prey for Pegasus spyware.

IPhone users, drop what you’re doing and update now: Apple has issued a warning about a ream of code-execution vulnerabilities – some of which are remotely exploitable – and experts are emphatically recommending an ASAP update to version 14.7 of iOS and iPadOS.

Unfortunately, you aren’t getting a fix for the flaw that makes your iPhones easy prey for Pegasus spyware. As headlines have focused on all week, a zero-click zero-day in Apple’s iMessage feature is being exploited by NSO Group’s notorious Pegasus mobile spyware: A spyware blitz enabled by a bug that has given the security community pause about the security of Apple’s closed ecosystem.

The chip world’s most important machines are made near corn fields in the Netherlands. The U.S. is trying to block China from buying them.


The one-of-a-kind, 180-ton machines are used by companies including Intel Corp., South Korea’s Samsung Electronics Co. and leading Apple Inc. supplier Taiwan Semiconductor Manufacturing Co. to make the chips in everything from cutting-edge smartphones and 5G cellular equipment to computers used for artificial intelligence.

China wants the $150-million machines for domestic chip makers, so smartphone giant Huawei Technologies Co. and other Chinese tech companies can be less reliant on foreign suppliers. But ASML hasn’t sent a single one because the Netherlands—under pressure from the U.S.—is withholding an export license to China.

The Biden administration has asked the government to restrict sales because of national-security concerns, according to U.S. officials. The stance is a holdover from the Trump White House, which first identified the strategic value of the machine and reached out to Dutch officials.

As pervasive as they are in everyday uses, like encryption and security, randomly generated digital numbers are seldom truly random.

So far, only bulky, relatively slow quantum random generators (QRNGs) can achieve levels of randomness on par with the basic laws of quantum physics, but researchers are looking to make these devices faster and more portable.

In Applied Physics Letters, scientists from China present the fastest real-time QRNG to date to make the devices quicker and more portable. The device combines a state-of-the-art photonic integrated with optimized real-time postprocessing for extracting randomness from quantum entropy source of vacuum states.

WTF?! On Thursday the Security Service of Ukraine (SSU) reported that they had shut down a cryptomining operation in the city of Vinnytsia, seizing over 500 GPUs and 50 processors — and a bunch of Playstation 4s. Consoles built on 2013-era technology might not be great at mining, but they don’t need to be when you have 3800 of them.

Although the market for GPUs is starting to improve, and dedicated ASICs might be on the way to relieve demand, it seems that one group of enterprising cryptocurrency miners have turned to last-gen console hardware to get things done.

From the photos provided by the SSU, it looks like these consoles are of the PS4 Slim variety, the 2016 refresh of the original console from three years prior. Mostly obsolete for newer games, it’s not at all surprising that so many could be sourced en masse so easily.

Planetary scientists estimate that each year, about 500 meteorites survive the fiery trip through Earth’s atmosphere and fall to our planet’s surface. Most are quite small, and less than 2% of them are ever recovered. While the majority of rocks from space may not be recoverable due to ending up in oceans or remote, inaccessible areas, other meteorite falls are just not witnessed or known about.

But new technology has upped the number known falls in recent years. Doppler radar has detected meteorite falls, as well as all-sky camera networks specifically on the lookout for meteors. Additionally, increased use of dashcams and security cameras have allowed for more serendipitous sightings and data on fireballs and potential meteorite falls.

A team of researchers is now taking advantage of additional technology advances by testing out drones and machine learning for automated searches for small meteorites. The drones are programmed to fly a grid search pattern in a projected “strewn field” for a recent meteorite fall, taking systematic pictures of the ground over a large survey area. Artificial intelligence is then used to search through the pictures to identify potential meteorites.

Security researchers accidentally revealed a huge flaw.


Microsoft is warning Windows users about an unpatched critical flaw in the Windows Print Spooler service. The vulnerability, dubbed PrintNightmare, was uncovered earlier this week after security researchers accidentally published a proof-of-concept (PoC) exploit. While Microsoft hasn’t rated the vulnerability, it allows attackers to remotely execute code with system-level privileges, which is as critical and problematic as you can get in Windows.

Researchers at Sangfor published the PoC, in what appears to have been a mistake, or a miscommunication between the researchers and Microsoft. The test code was quickly deleted, but not before it had already been forked on GitHub.

Sangfor researchers had been planning to detail multiple 0-day vulnerabilities in the Windows Print Spooler service at the annual Black Hat security conference later this month. It appears the researchers thought Microsoft had patched this particular vulnerability, after the company published patches for a separate Windows Print Spooler flaw.