On Wednesday, Apple revealed that their iPhones, iPads and Macs have serious vulnerabilities which could give hackers complete control of these devices. The explanation of the vulnerability given by Apple suggests that the attacker could obtain ‘full admin access’ to…
Category: Technical Articles
Technical papers written in the field of wireless sensor networks
Janet Jackson’s Song Can Crash Windows XP Laptops
Microsoft software engineer Raymond Chen in a blog post on Wednesday, recounted that he had heard from a colleague in Windows XP product support that a Janet Jackson song could crash some Windows XP-era laptops. The blog post stated that…
Security Researcher Hacks Starlink’s User Terminal
For the past four years, Elon Musk’s Starlink has been launching over 3,000 small satellites into space. This satellite network provides internet connection to remote locations on Earth, especially since the Russian-Ukraine conflict. There are plans to launch more satellites,…
Amazon One Palm Payment Technology Expands to More Whole Foods Stores
Recent reports have revealed that Amazon’s ‘One’ palm scanner payment technology will be launching at over 60 Whole Food stores in the state of California. Stores in Los Angeles, Santa, Cruz, Malibu, Santa Monica, Orange County, Montana Avenue, the San…
New Program Can Trace Encrypted WhatsApp Messages
Mayank Varia, cryptographer and computer expert, may have found the solution to allow the sending of secure, confidential and untraceable messages, but still with a way to track threatening messages. Varia is an expert on the societal effect of programs…
Smart Microrobots use Artificial Intelligence to Learn how to Swim
Researchers from the University of Hong Kong, New Jersey Institute of Technology, and Santa Clara University have successfully taught microrobots to swim through deep reinforcement learning, an incredible development in microswimming capability. Artificial microswimmers capable of navigating the world like…
North Korean Hackers Use Smart Hack to Read Your Gmail
Researchers have discovered new malware that North Korean hackers have been using to read and download emails and attachments from the accounts of infected users. Referred to as SHARPEXT by the researchers from Volexity, the security firm, the malware uses…
Instagram Reveals New Age Verification Policies
Instagram announced that from Thursday, it would start testing new tools for age verifications if accounts under the age of 18 tried to change their age to over 18. However, users can still input the wrong birth date when setting…
Analysis Shows Over 75% of the World’s Most Popular Websites Allow Weak Passwords
A new review has revealed that over three-quarters of the world’s most popular websites allow users choose the most common passwords such as ‘P@$$w0rd’ and ‘abc123456’. Over 50% of the 120 top-ranked websites allow 40 of the most easily guessed…
Microsoft to Stop Selling Emotion-Reading Tech, and Restricts Facial Recognition Access
On Tuesday, Microsoft announced that it would stop selling technology which could pinpoint emotion based on a facial image. They also said they would stop providing access to facial recognition technology. This action is a consequence of the efforts of…