If the cold war with China intensifies, more companies with alleged ties to the Chinese government could be prohibited from doing business with American firms.
Summer is the perfect time to catch up on all the things you've been meaning to do—like get your to-be-read (TBR) pile down to a manageable size (if that's even possible). As the longer days with better weather beg you to venture outside and crack open your current read, we at Ars considered our recent favorite reads to compile this makeshift summer 2019 reading list.
These titles may not be what most would consider "summer reads." Scant few white-sand beaches and picture-perfect resorts fill these pages—but that doesn't make them any less escape-worthy. Whether they be space operas or true crime sagas, we consider a "summer" read to be a story that you can fully immerse yourself in, leaving work and other worries behind even just for a little while.
Regardless of whether you prefer reading physical books, e-books, or audiobooks, these recommendations will keep you wanting to read all summer long. Apologies in advance for adding to your already extensive TBR—but we think these books are worth it.
If you want to not only read more, but read better, an e-reader may be for you. Yes, it has become easy to find material to read and to get it on any of the numerous devices we have in our electronic arsenals—smartphones, tablets, computers, and the like. But even in a world full of versatile devices, e-readers are still favorites among dedicated readers open to getting their hands on e-books and digital publications in many ways. Ultimately, it may be freedom through limitation: E-readers help you focus on the reading rather than the distractions that are oh so easily accessible through other electronics.
But that's just one perk to having a dedicated reading device that either replaces or supplements your physical library. While e-reader technology hasn't radically changed much in the past few years, companies have updated their most popular e-readers recently to make them even more useful and competitive. One e-reader also doesn't look very different from the next, so it can be difficult to tell them apart—but trust the dedicated readers of Ars, there are notable differences within this product category.
Luckily, to help you decipher the world of e-readers ahead of any beaches, porches, or general down time that may await you this summer, Ars has been testing and tinkering. Today, these are the best devices for all kinds of readers.
It has been nine days since Microsoft patched the high-severity vulnerability known as BlueKeep, and yet the dire advisories about its potential to sow worldwide disruptions keep coming.
Until recently, there was little independent corroboration that exploits could spread virally from computer to computer in a way not seen since the WannaCry and NotPetya worms shut down computers worldwide in 2017. Some researchers felt Microsoft has been unusually tight-lipped with partners about this vulnerability, possibly out of concern that any details, despite everyone’s best efforts, might hasten the spread of working exploit code.
Until recently, researchers had to take Microsoft's word the vulnerability was severe. Then five researchers from security firm McAfee reported last Tuesday that they were able to exploit the vulnerability and gain remote code execution without any end-user interaction. The post affirmed that CVE-2019-0708, as the vulnerability is indexed, is every bit as critical as Microsoft said it was.
From January, new DJI drones will be able to detect nearby planes and helicopters.
The two titles break local gambling laws that prohibit giving players random rewards in "loot boxes".
Update: One of the two exploits published on Wednesday has now been confirmed to exploit a Windows vulnerability that Microsoft patched in this month's Update Tuesday release cycle. The flaw involving the Windows Error Reporting service was previously described as CVE-2019-0863, Gal De Leon, the researcher Microsoft credited with discovering the vulnerability, said on Twitter. Researchers with "micropatching" service 0patch have confirmed that the other exploit published on Wednesday, an IE 11 sandbox bypass, does indeed work on a fully patched Windows 10 system.
The headline of this post has been changed to reflect this new information. What follows is the story as it appeared earlier, with the exception of the last paragraph, which has also been changed to reflect the new information.
A serial publisher of Microsoft zeroday vulnerabilities has dropped exploit code for three more unpatched flaws, marking the seventh time the unknown person has done so in the past year.