Toggle light / dark theme

Going forward, Northrop Grumman projects that starting in 2025 they will begin refueling satellites in orbit and removing orbital debris from nearby “high value” satellites, Anderson said.


Satellites could live longer lives thanks to new technology being tested by Northrop Grumman.

On Monday (April 12), Northrop Grumman Corporation and SpaceLogistics LLC (a subsidiary of Northrop Grumman) announced that their satellite servicing spacecraft, called Mission Extension Vehicle 2 (MEV-2), successfully docked to the commercial communications satellite Intelsat 10–02 (IS-10–02).

Altman suggests taxing capital rather than labour. And, these taxes can be used to distribute ownership and wealth to citizens. Altman said his idea is nothing new but is more critical than ever as AI applications outclass their contemporaries. “If everyone owns a slice of American value creation, everyone will want America to do better,” wrote Altman.

“We should therefore focus on taxing capital rather than labor, and we should use these taxes as an opportunity to directly distribute ownership and wealth to citizens.”

Pinning careers and hopes to Moore’s law does sound like utopia, and even Altman admits it. He also believes that the AI revolution will compensate for the disruption by generating new jobs. Jobs, which we haven’t heard of yet (think: urban rodentologist). That’s why the OpenAI co-founder stresses establishing a system that will result in a society that is “less divisive” and enables everyone to participate in its gains. According to him, this technology revolution is an eventuality, and nothing can stop it. The revolution will be further accelerated as machines that make machines get smarter. For example, OpenAI’s GPT-3 was used to generate machine learning code, a million-dollar startup idea in itself. One application can put many developer jobs at risk.

Domino’s and Nuro teamed up for autonomous pizza delivery in Houston. Don’t get your hopes up, though, for a driverless drop-off: Many restrictions apply, and only a handful of hungry people can opt in right now.

Beginning this week, select customers who place a prepaid website order from the lone participating pizza shop in Woodland Heights can opt to have their food delivered by Nuro’s R2 robot. Those lucky patrons receive text alerts highlighting R2’s location, and can track the vehicle via GPS on the order confirmation page. Domino’s also provides a unique personal identification number required to open the bot’s door and reveal that piping hot pizza.

“We’re excited to continue innovating the delivery experience for Domino’s customers by testing autonomous delivery with Nuro in Houston,” Dennis Maloney, Domino’s senior vice president and chief innovation officer, said in a statement. “There is still so much for our brand to learn about the autonomous delivery space.”

In real-world attacks, “a simple scenario… would have an attacker infiltrating a manufacturing network via an RCE on an exposed IoT device then causing a production line to stop by causing a DoS on an industrial controller,” Daniel dos Santos, research manager at Forescout Research Labs, said. “Similarly, the attacker could switch off the lights of a target company by leveraging a vulnerable building automation controller.”

Many of the Name: Wreck vulnerabilities stem from DNS implementations of a protocol feature called message compression. Message compression reduces the size of DNS messages, due to DNS response packets often including the same domain name. This compression mechanism has been problematic to implement on products for 20 years, said researchers, causing issues on DNS servers, enterprise devices and, more recently, TCP/IP stacks. Forescout researchers disclosed three flaws relating to message compression during previous research into TCP/IP vulnerabilities (particularly the Ripple20 and AMNESIA:33 sets of flaws). Consequently, they hunted for other similar types of flaws in other protocol stacks.

As part of the ensuing Name: Wreck research, researchers found DNS message compression vulnerabilities in four popular TCP/IP stacks, including FreeBSD (version 12.1), IPnet (version VxWorks 6.6), NetX (version 6.0.1) and Nucleus Net (version 4.3). The most critical flaws exist in FreeBSD, popular IT software used by high-performance servers in millions of IT networks, including major websites such as Netflix and Yahoo; and in Siemens’ Nucleus NET firmware, which has been used for decades by critical OT and Internet-of-Things (IoT) devices.

MIT Technology Review Insights, in association with AI cybersecurity company Darktrace, surveyed more than 300 C-level executives, directors, and managers worldwide to understand how they’re addressing the cyberthreats they’re up against—and how to use AI to help fight against them.


Cyberattacks continue to grow in prevalence and sophistication. With the ability to disrupt business operations, wipe out critical data, and cause reputational damage, they pose an existential threat to businesses, critical services, and infrastructure. Today’s new wave of attacks is outsmarting and outpacing humans, and even starting to incorporate artificial intelligence (AI). What’s known as “offensive AI” will enable cybercriminals to direct targeted attacks at unprecedented speed and scale while flying under the radar of traditional, rule-based detection tools.

Some of the world’s largest and most trusted organizations have already fallen victim to damaging cyberattacks, undermining their ability to safeguard critical data. With offensive AI on the horizon, organizations need to adopt new defenses to fight back: the battle of algorithms has begun.

On April 13, 2021, Astrobotic announced that the Falcon Heavy rocket will launch the Griffin lander carrying NASA’s Volatiles Investigating Polar Exploration Rover (VIPER) to the moon.

Credit: Space.com | footage & animations: SpaceX & Astrobotic | produced & edited by Steve Spaleta (http://www.twitter.com/stevespaleta)

The HiDRON stratospheric glider, a joint project between UAVOS and STRATODYNAMICS, has successfully carried out its regular test flight. UAVOS’ operators launched the stratospheric aircraft from a high-altitude balloon carrying a technology supported by NASA’s Flight Opportunities program successfully deploying an experimental payload to 24 km altitude and back.

Extensive testing was performed to test operation in high altitude flight regimes utilizing UAVOS’ autopilot system and payload test services. A launch routine was tested allowing a safe transition from free-fall to stable horizontal flight in thin air after being dropped from the balloon. UAVOS’ autopilot system has once again proven its superior long-range performance Beyond Visual Line of Sight (BVLOS) capabilities.

The payload was a combination of forward-sensing turbulence detection technologies developed by the University of Kentucky (UK) in Lexington and NASA’s Langley Research Centre in Hampton, Virginia. The flight test aimed to help researchers assess the performance of a wind probe from the UK along with an infrasonic microphone sensor. Together, the instruments are designed to aid forward-sensing turbulence detection for unmanned aerial vehicles, commercial aircraft, the urban air mobility market, and the on-demand drone delivery sector.

As the Tufts scientists were creating the physical xenobot organisms, researchers working in parallel at the University of Vermont used a supercomputer to run simulations to try and find ways of assembling these living robots in order to perform useful tasks.


Scientists at Tufts University have created a strange new hybrid biological/mechanical organism that’s made of living cells, but operates like a robot.

3 Key Cybersecurity Trends To Know For 2021 (and on…)


Other mitigation efforts can be done by employing new technologies that monitor, alert, and analyze activities in the network. Emerging technologies such as artificial intelligence and machine learning tools can help provide visibility and predictive analytics. It is also good to have diversification and multiple sourcing for suppliers in the event of a breach. Preparation and redundancy are advantageous in crisis scenarios. But like most issues in cybersecurity, it comes down to people, vigilant processes, and technologies coupled with risk factors constantly being reviewed.

Of course, there are many other compelling trends and threats to the cybersecurity ecosystem. More to cover in future articles. I have highlighted the more immediate trends of the expanding cyber-attack surface remote work, IoT supply chain, ransomware as a cyber weapon of choice and threats to critical infrastructure via ICS, OT/IT cyber-threat convergence. The most important tasks based on analyzing trends is to be have a mitigation strategy, be vigilant, try to fill gaps, and learn from lessons of the recent cyber-breaches.