Camila Domonoske

The remotely operated underwater research vessel known as Boaty McBoatface is preparing for its first research mission — an expedition into "some of the deepest and coldest abyssal ocean waters on earth."

Boaty McBoatface, of course, was the moniker that emerged triumphant in an online poll meant to name the newest research ship in the U.K.'s Natural Environment Research Council fleet. But the council opted to overrule the will of the people, and named the ship the Royal Research Ship Sir David Attenborough instead.

Wisconsin creamed the competition.

America's Dairyland took home the first, second and third-place prizes at the U.S. Championship Cheese Contest this week — with a black-pepper-flavored hard cheese from Antigo, Wisc., at the top.

Second place went to an aged cheddar from Weyauwega, and third place to a gouda from Thorp.

A record 2,303 dairy products — included butter, yogurt and cheese — were submitted to the contest, according to the organizers.

Two of the armed occupiers who took over a wildlife refuge last year have been convicted on felony conspiracy charges, member station Oregon Public Broadcasting reports.

Two other participants in the occupation of the Malheur National Wildlife Refuge in Oregon were found guilty on lesser felonies.

Updated at 2:10 p.m. ET

WikiLeaks will be sharing alleged CIA hacking techniques with major technology companies such as Apple and Google to allow them to develop fixes for vulnerabilities in their phones and other electronic devices, according to Julian Assange.

In a lengthy address from Ecuador's Embassy in London, where he remains holed up since 2012, the WikiLeaks founder said the group would work with manufacturers to "disarm" purported CIA hacking tools. When the fixes are in place, he said, WikiLeaks would publish the code for those tools online.

WikiLeaks is billing its latest document dump as the largest leak of CIA material in the history of the spy agency, and it describes cutting-edge ways to hack into phones, computers and even televisions connected to the Internet.

The thousands of documents, many of which are highly technical, are said to be internal CIA guides on how to create and use cyber-spying tools — from turning smart TVs into bugs to designing customized USB drives to extract information from computers. The CIA has refused to comment on their authenticity.

Pages