
Former Microsoft CEO Ballmer wealth surpassed Gates, he only did one thing
On July 1, former Microsoft CEO and President Steve Ballmer surpassed Microsoft co-founder Bill Gates for the first time on the Bloomberg list of the world's richest people to become the sixth richest person in the world. According to the data, as of the same day, Ballmer's net worth reached $157.2 billion, while Gates's wealth was $156.7 billion, falling to seventh place. The latest figures, as of July 6, show that Ballmer's wealth has grown further to $161 billion, and Gates' wealth is $159 billion. This is the first time Ballmer's net worth has surpassed Gates', and it is also the rare time in history that an employee's net worth has surpassed that of a company founder. Unlike Musk, Jeff Bezos and others, Ballmer's wealth was not accumulated through entrepreneurial success as a business founder, but simply because he chose to hold Microsoft "indefinitely." As Fortune previously reported, Ballmer is the only individual with a net worth of more than $100 billion as an employee rather than a founder.

Hedge fund Elliott challenges court verdict it lost against LME on nickel
LONDON, July 9 (Reuters) - U.S.-based hedge fund Elliott Associates on Tuesday urged a London court to overturn a verdict supporting the London Metal Exchange's (LME) cancellation of nickel trades partly because the exchange failed to disclose documents. The LME annulled $12 billion in nickel trades in March 2022 when prices shot to records above $100,000 a metric ton in a few hours of chaotic trade. Elliott and market maker Jane Street Global Trading brought a case demanding a combined $472 million in compensation, alleging at a trial in June last year that the 146-year-old exchange had acted unlawfully. London's High Court ruled last November that the LME had the right to cancel the trades because of exceptional circumstances, and was not obligated to consult market players prior to its decision. Lawyers for Elliott told London's Court of Appeal that the LME belatedly released documents in May detailing its "Kill Switch" and "Trade Halt" internal procedures. It also newly disclosed an internal report that Elliott said detailed potential conflicts of interest at the exchange. "It was troubling that one gets disclosure out of the blue in the Court of Appeal for the first time," Elliott lawyer Monica Carss-Frisk told the court. Jane Street Global did not appeal the ruling. "If we had had them (documents) in the proceedings before the divisional court, we may well have sought permission to cross examine." LME lawyers said the new documents were not relevant. "The disclosed documents do not affect the reasoning of the divisional court or the merits of the arguments on appeal," the exchange said in documents prepared for the appeal hearing. "Elliott's appeal is largely a repetition of the arguments which were advanced, and rightly rejected." The LME said it had both the power and a duty to unwind the trades because a record $20 billion in margin calls could have led to at least seven clearing members defaulting, systemic risk and a potential "death spiral". Elliott said the ruling diluted protection provided by the Human Rights Act and also wrongly concluded the LME had the power to cancel the trades.

Google extends Linux kernel support to 4 years
According to AndroidAuthority, the Linux kernel used by Android devices is mostly derived from Google's Android Universal Kernel (ACK) branch, which is created from the Android mainline kernel branch when new LTS versions are released upstream. For example, when kernel version 6.6 is announced as the latest LTS release, an ACK branch for Android15-6.6 appears shortly after, with the "android15" in the name referring to the Android version of the kernel (in this case, Android 15). Google maintains its own set of LTS kernel branches for three main reasons. First, Google can integrate upstream features that have not yet been released into the ACK branch by backporting or picking, so as to meet the specific needs of Android. Second, Google can include some features that are being developed upstream in the ACK branch ahead of time, making it available for Android devices as early as possible. Finally, Google can add some vendor or original equipment manufacturer (OEM) features for other Android partners to use. Once created, Google continues to update the ACK branch to include not only bug fixes for Android specific code, but also to integrate the LTS merge content of the upstream kernel branch. For example, the Linux kernel vulnerability disclosed in the July 2024 Android security bulletin will be fixed through these updates. However, it is not easy to distinguish a bug fix from other bug fixes, as a patch that fixes a bug may also accidentally plug a security vulnerability that the submitter did not know about or chose not to disclose. Google does its best to recognize this, but it inevitably misses the mark, resulting in bug fixes for the upstream Linux kernel being released months before Android devices. As a result, Google has been urging Android vendors to regularly update the LTS kernel to avoid being caught off guard by unexpectedly disclosed security vulnerabilities. Clearly, the LTS version of the Linux kernel is critical to the security of Android devices, helping Google and vendors deal with known and unknown security vulnerabilities. The longer the support period, the more timely security updates Google and vendors can provide to devices.

Adult Film Star Jesse Jane's Cause of Death Revealed
New details about Jesse Jane’s death have emerged. More than six months after the former adult film star was found dead alongside her boyfriend Brett Hasenmueller in her Moore, Oklahoma, home from a suspected overdose, authorities confirmed what led to the tragedy. Jane and Hasenmueller reportedly died of an accidental fentanyl and cocaine overdose according to TMZ, citing the Oklahoma City Medical Examiner’s Office. E! News has reached out to the Examiner’s Office for comment but had not yet heard back. In late January, local outlet KFOR reported that Moore Police found Jane and Hasemueller’s bodies while performing a wellness check after the couple had not been heard from in several days. Moore PD's Lt. Francisco Franco told The New York Times at the time that it was believed Jane died from a drug overdose, but that both deaths remained under investigation. Jane, who was 43 at the time of her passing, acted in a number of adult films starting in 2003 before transitioning to other projects, including an appearance in Baywatch: Hawaiian Wedding and 2004's Starsky and Hutch, as well as season two of Entourage. Pretty Pastel Please, YouTuber, Instagram By 2007, Jane had officially retired from the adult film industry, pivoting into making her own line of sex toys. At the time of her death, BSG Public Relations President Brian Gross shared in a statement to E! News, "Jesse Jane was a vivacious person who had an absolute and ultimate love for life. During her time in the adult industry, of which I was able to spend wonderful moments with her, she was an incredible professional who cheered everyone on and brought sunshine to every film set she worked on." "There is not one person in the adult industry who didn't spend time with her, whether onset or in a social setting, that she didn't make smile, laugh or both. She would light up a room as soon as she walked in," he continued, "I will personally miss her very much for the reasons above. Her smile was everything."

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.