Light-Based Solutions Revolutionize Computing
There is a recent explosion in demand for computer processing power worldwide following the AI boom, and the traditional methods of fitting ever-smaller transistors...
New Malicious “AI Worm” Threatens Generative AI Tools
Many companies are integrating generative AI tools into their products to reduce the human workload and make hard tasks easier, which is both transformative...
Ukraine Kamikaze Drones Destroy Russia’s Black Sea Fleet Warship
Ukraine has allegedly destroyed the Russian warship “Sergei Kotov” in the Black Sea using kamikaze drones. This comes less than two years since Russia’s...
Underwater Data Cables Cut Following Houthi Threat
It is speculated that Yemen’s Houthi rebels cut three cables under the Red Sea that provide global internet and telecommunications, though it is still...
Raytheon Reveals New Advanced Variant of Deadly AMRAAM Missile
Raytheon successfully tests its updated Advanced Medium-Range Air-to-Air Missile-Extended Range (AMRAAM-ER) missile variant and has showcased its increased capabilities.
According to Interesting Engineering, AMRAAM is an...
No Search Warrant, No IP Address
Canada’s Supreme Court rules that the Canadian police won’t be able to access an IP address without a search warrant.
This case was brought to...
China Plans CCTV Moon Surveillance System
China is planning to develop a Moon surveillance system to protect its Lunar assets, which will reportedly have millions of sensors and cameras for...
AI and Disinformation: Problems and Solutions
Whether we like it or not, our opinions and narratives are constantly being shaped by social media, and in the age of AI this...
Beating AI Bias Through Diversifying its Data
AI is revolutionizing many industries, including healthcare. However, it is only as good as its data, and biased data can lead to serious outcomes,...
Lightning Never Strikes Twice? Ransomware Attackers Seen Regularly Repeating Previous Attacks
Cybersecurity company Cybereason reveals that the actual price of a ransomware attack on a business includes much more than the ransom itself.
When choosing whether...
Revolutionary High-Resolution Satellites Raise Privacy Concerns
Startup company Albedo is setting out to collect and provide the highest resolution optical and thermal imagery from the sky. The images will have...
China is Boosting its Cyber Defenses in Fear of Cyberattacks and...
China reportedly intends to improve the data security of its industrial sector in order to effectively contain any “major risks,” a process that is...
The Rise of Romance Crypto-Scamming
Malicious romance cybercriminal steals close to a quarter million dollars from a victim in a months-long online scam.
This type of online scam is also...
Revolutionary Solar Technology Produces Heat and Clean Energy
A group of international researchers developed a new type of solar module that can produce both electricity and heat from the sun – with...
Same Hardware – Double the Speed?
A new approach developed by researchers at the University of California can double the processing power of existing devices without any addition of hardware,...
New Type of Cyberattack Uses Wireless Charger to Set Your Smartphone...
Security experts from the University of Florida worked with CertiK and found a certain class of cyberattacks that could cause a smartphone to catch...
AI Is Bad for The Environment – But Can It Also...
Advanced AI tools and systems are beginning to be heavily criticized for the immense amounts of energy they use, but experts claim these tools...
The Navy’s New Lizard-Like Robots
The new tools of the US Navy are AI-powered lizard-like robots developed by Gecko Robotics.
The company explains that these wall climbing robots are used...
A Cyberattack Every 39 Seconds – The Dangers of the ‘Remember...
The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
The Growing Need for Satellite Cybersecurity
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges.
The satellites orbiting Earth are crucial for...
WiFi Vulnerability Threatens Android Users
Hackers can now create clones of WiFi hotspots and intercept data, as well as enable unauthorized access to protected home Wi-Fi networks and expose...
Hackers Can Use the Sound of Swiping to Steal Your Fingerprints
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...












































