Toggle light / dark theme

Mercury is a most unusual planet. The smallest planet in the solar system, and the closest planet to the sun, it is in a 3:2 spin resonance, slowly turning and experiencing scorching heat up to 430 degrees Celsius, and the night side frigid, down to-170 degrees Celsius. Due to its much larger iron-rich core compared to Earth, it has the second-highest average density in the solar system, just 1.5 percent below Earth’s. Despite its proximity to the sun, the surface of Mercury was, surprisingly, found to be rich in volatile elements such as sodium and sulfur.

Notably, the planet’s separation into an iron-rich core and rocky mantle (the geological region between the core and the crust) suggests Mercury had a early in its formation. Like any liquid, this ocean would have evaporated, but in the case of Mercury, the temperatures were likely to have been so high that the vapor was not composed of water, but rock. In a new study published in The Planetary Science Journal, Noah Jäggi and colleagues modeled how the evaporation of the surface of this magma ocean would form an atmosphere and determined whether losses from the atmosphere could alter Mercury’s composition, addressing an open question of why moderately like sodium have accumulated on Mercury’s surface. Their results were surprising, Jäggi, a graduate student at the University of Bern, told Phys.org.

Early planetary magma oceans aren’t unusual, explained Lindy Elkins-Tanton, director of the School of Earth and Space Exploration at Arizona State University. “We think all rocky planets have one or more—maybe several—magma oceans as they form. The impacts of accretion toward the end of planet formation are just that energetic; they will melt the planets to some depth.”

Cybersecurity agencies from Australia, Canada, New Zealand, the U.S., and the U.K. on Wednesday released a joint advisory in response to widespread exploitation of multiple vulnerabilities in Apache’s Log4j software library by nefarious adversaries.

“These vulnerabilities, especially Log4Shell, are severe,” the intelligence agencies said in the new guidance. “Sophisticated cyber threat actors are actively scanning networks to potentially exploit Log4Shell, CVE-2021–45046, and CVE-2021–45105 in vulnerable systems. These vulnerabilities are likely to be exploited over an extended period.”

It should be noted that in 2020, rug pulls accounted for just 1 per cent of the under $5 billion in total illicit revenue.


Earlier, in November, millions of dollars vanished in a matter of minutes after investors piled into a new cryptocurrency inspired by “Squid Game,” the popular Netflix survival series, only to watch its value plunge to nearly zero in a few short hours. Then Squid went on a roller-coaster ride. In a 10-minute span later on Monday, the token’s value grew from $628.33 to $2,856.65, according to CoinMarketCap, a crypto data tracking website. Then, five minutes later, it traded at $0.0007.

Meanwhile, US Federal Bureau of Investigation (FBI) had issued a warning in November, against cybercriminals that are using Bitcoin ATMs and QR codes to defraud unsuspecting individuals. The FBI in a recently released Public Service Announcement (PSA), said that it has witnessed an increase in scammers directing victims to use physical cryptocurrency ATMs and digital QR codes to complete payment transactions.

Researchers at an Abu Dhabi university revealed details about a set of vulnerabilities in the information transfer mechanism that underlies modern telephone networks. According to the report, threat actors can exploit these flaws to deploy denial of service (DoS) and Man-in-The-Middle (MiTM) attacks using a few pieces of hardware.

Experts Evangelos Bitsikas and Christina Pöpper mention that these failures can occur in all kinds of scenarios as long as some general conditions are met. In addition, the problems lie in all generations of network infrastructure, from 2G to 5G.

Handover is the fundamental mechanism in any modern cellular network implementation, and is described as the process of transferring a subscriber during a call or data transfer session from one base station to another. Handover plays a critical role in establishing cellular communications, especially when the user is on the move.

Microsoft is urging customers to patch two Active Directory domain controller bugs after a PoC tool was publicly released on Dec. 12.

A proof-of-concept tool has been published that leverages two Windows Active Directory bugs fixed last month that, when chained, can allow easy Windows domain takeover.

In a Monday alert, Microsoft urged organizations to immediately patch the pair of bugs, tracked as CVE-2021–42287 and CVE-2021–42278, both of which were fixed in its November 2021 Patch Tuesday release.

It doesn’t have to be this way. Unhealthy ageing is a human tragedy, and if governments and health authorities shift their focus from lifespan to healthspan, longevity technology can remedy it. Looking and feeling younger for longer is not the preserve of beauty brands or Silicon Valley billionaires.


The average human lifespan has increased by several decades in the past century, but our healthspan – the years we are in good health – has stayed the same. The solution is to treat unhealthy ageing like any other illness, that is, as a technical problem that can be overcome.