Now Charge Your Smartphone With Energy From Plants Through E Kaia Portable Smartphone Charger

E-Kaia, a portable smartphone charger harnesses energy from plants for charging the smartphoneAn engineering trio has created a novel smartphone charger “E-Kaia” that takes energy from plants for charging the smartphone. It was in 2009, when these girls came up with an innovative idea of creating a smartphone charger that would work without electric power supply. At that time the girls were still in university at Duoc UC in Valparaíso and the Andres Bello National University, Chile....

December 10, 2022 · 3 min · 496 words · Roger Broege

Nvidia Announces The Geforce Rtx 2060 2070 2080 Super Graphics Cards

Just like the original RTX 20 series, these new graphics chips too are based on the Turing architecture as their predecessors and will include Ray-Tracing technology alongside Nvidia’s Deep Learning Super Sampling (DLSS). However, these now come with new GPU with additional CUDA cores, Tensor Cores, RT Cores, and faster clock speeds. “The ecosystem driving real-time ray tracing is immense — tens of millions of GPUs, industry standard APIs, leading game engines and an all-star roster of game franchises,” said Matt Wuebbling, head of GeForce Marketing for Nvidia....

December 10, 2022 · 2 min · 352 words · Nancy Iannotti

Official Twitter Account Of The Australian Electoral Commission Aec Got Hacked Techworm

December 10, 2022 · 0 min · 0 words · Annette Thomas

Old Version Of Microsoft S Windows Core Polaris Leaked Online

For those unaware, back in 2018, Microsoft was secretly working on a modular operating system for Windows codenamed “Windows Core OS” through which it initially created two flavors of Windows – Polaris for traditional laptops and Andromeda for foldable mobile devices. Windows Core OS was designed so that it could be run across different platforms and form-factors, such as phones, 2-in-1s, dual-screen PCs, and collaboration devices. However, Microsoft cancelled the launch of these versions of the OS in favor of a new SKU of Windows Core OS called “Windows 10X” (previously known as Windows Lite/Santorini)....

December 10, 2022 · 2 min · 394 words · Dominique Young

Oracle Announces Java Se 9 And Java Ee 8 Techworm

JDK 9 is a production-ready implementation of the Java SE 9 Platform Specification, which was recently approved along with Java EE 8 in the Java Community Process (JCP). On the other hand, with updates to eight major specifications, Java EE 8 looks to streamline and simplify the Java EE platform for the cloud and micro services. Java SE 9 The star feature of Java SE 9 is the Java Platform Module System, also known as Project Jigsaw, whose goal is to help developers reliably assemble and maintain sophisticated applications....

December 10, 2022 · 4 min · 722 words · Amber Bowen

Pentagon To Reward Hackers For Finding Security Problems In Defense Sites Techworm

Participants need to register to take part in the program and must be US citizens. The application page says, “If you have information related to security vulnerabilities in the online services listed in scope below, we want to hear from you.” U.S. officials have stressed that they are not going to include any kind of sensitive “mission-facing” computer systems throughout the program. Further, all hackers must undergo a background check and meet other qualifications....

December 10, 2022 · 3 min · 486 words · Jennifer Woods

Plex Adds Web Shows Online To Watch For Free

The name of this free service is Plex Web Shows. It is currently in beta version and contains high-quality episodes from a range of publishers like The New Yorker, Conde Nast, FailArmy, NerdWire etc. Talking about the website interface then it seems to be very neat and clean. People are loving it as it not only offers tv shows online for free but also has many handy features in it....

December 10, 2022 · 1 min · 200 words · Alexander Featherstone

Poodle Vulnerability Rises Again This Time In Tls

Poodle 2.0 vulnerability affects cryptography ciphers less than TLS 1.2What is PoodleWhat is new PoodleThreat Mitigation Qualys says that the Poodle vulnerability has resurfaced again, this time in the Transaction Layer Security (TLS). The new vulnerability which has been designated CVC-2014-8730, the threat vector exploits the same class of problem as old vulnerability. That is making an error in handling the padding and allowing the attacker to steal steal “secure” HTTP cookies, authorization tokens and other data from the victim....

December 10, 2022 · 3 min · 518 words · Irene Mitchell

Powerful Opera Crypto Browser Released For Ios

Opera Crypto Browser is now available on iOS After arriving on Android, Windows, and Mac; Opera Crypto Browser has now arrived across iOS as well. This will give iPad and iPhone users an unparalleled experience with an assortment of features built-in to the browser. The app is based on crypto and Web 3 technologies. The developers have joined hands with Nervous, Solana, Polygon, Handshake, Unstoppable Domains, Celo, and ENS to make the browser a truly collaborative reflection....

December 10, 2022 · 1 min · 205 words · David Yates

Redhack Hacks Into Turkey S Electric Distribution Company Website Delete Bills Worth 1 5 Trillion Turkish Lira

RedHack hack into Turkey’s Electric Distribution company website, delete bills worth 1.5 trillion Turkish Lira.Who are RedHackVideo https://twitter.com/RedHack_EN/status/533247883815178240 This is serious loss for the Turkish electricity distribution company if the claims made by the RedHack hackers are found to be true and the Turkish Electric Distribution company authorities do not have any backup to the website having the bill and liabilities details. Who are RedHack Redhack (K?z?l Hackerlar, K?z?l Hackerlar Birli?...

December 10, 2022 · 2 min · 240 words · Troy Carter

Remove Icloud Symbol Next To Apps On Iphone Ipad

Well, in this article we will share everything you need to know about the white iCloud symbol next to the apps on iPhones and iPads followed by an easy solution to get rid of or remove the cloud icon below the apps on iPhones. What Does The iCloud Symbol To Apps on iPhone Mean? The white iCloud symbol appears next to an app when it has been offloaded from your iPhone....

December 10, 2022 · 3 min · 598 words · Johnny Smith

Researcher Discovers Zero Day Flaws In Dolphin And Mercury Browsers For Android

One of the browsers is Dolphin for Android. This browser is mildly popular among Android users with around 5 million downloads. A self confessed Java nerd, @rotlogix has discovered a zero-day in Dolphin browser which can be exploited by hackers to remotely execute files. The flaw in Dolphin lies in the way it download and applies themes. An attacker with the ability to control the network traffic for users of the Dolphin Browser for Android, can modify the functionality of downloading and applying new themes for the browser....

December 10, 2022 · 2 min · 348 words · Whitney Sandage

Researcher Tears Apart A Android Password Manager App

Many services offer such password management Apps for Android. Bughardy targeted one of those however he has chosen not to name it till the App publisher releases a patch fixing the vulnerability he discovered. He says on his blog post, “Hello everyone, in this post I would like to analyze an Android application which purpose is to manage and generate passwords securely.” Bughardy says the App he chose claimes to offer DES encryption on its Google Play listing....

December 10, 2022 · 3 min · 432 words · James Mcbride

Researchers Hack A Computer Using Dna Techworm

Researchers at the University of Washington claims to have successfully injected a malware program into a DNA sample and use it to hack into a computer that analyzes the sequence of that DNA. In other words, so that when a gene sequencer analyzes it the resulting data becomes a program that corrupts gene-sequencing software and takes control of the underlying computer. The team also explained its work in a more readable essay on its website that provides suggestions to tighten computer security and privacy protections in DNA synthesis, sequencing, and processing....

December 10, 2022 · 3 min · 470 words · Charles Miller

Samsung Galaxy Note 8 Reportedly Code Named Baikal Techworm

He had recently stated that “I will bring back a better, safer and very innovative Note 8” and this decision comes from the want to offer owners of Galaxy Note 4 and Note 5 a Note product to upgrade. Now, according to a recent rumor provided by an industry insider on Twitter suggests that work has already begun on the new Note. It was accompanied by an image which you can see below....

December 10, 2022 · 1 min · 162 words · Richard Postal

Scientists Catch Black Hole Swallowing Star And Burping A Bit Of It Back Out Techworm

The scientists have tracked a star about as big as our sun as it pulled from its normal path and into that of a supermassive black hole before being eaten up. Then they saw a high-speed flare get thrust out, escaping from the rim of the black hole. In addition to catching evidence of the star’s destruction – an inevitable death caused by the massive, inescapable gravitational pull of a dense supermassive black hole – the scientists saw a hot flare of matter escape from the scene of the crime....

December 10, 2022 · 3 min · 536 words · Dorothy Ho

Silicon Valley Asked To Build A Terrorist Spotting Algorithm By The U S Government Techworm

The policymakers during the terrorism summit between members of the government and the heads of Silicon Valley’s biggest technology companies came up with an idea that before the terrorists act with a computerized system, it may be possible to catch them, according to Fusion. The algorithmic method would be proposed to possibly flag online radical activity and give law enforcement a go ahead on activity that may be thought as terrorism....

December 10, 2022 · 4 min · 753 words · James Choat

Silk Road 2 Hacked Due To Transaction Bug In System 4000 Bitcoins Stolen Techworm

Mt.Gox confirms that they have made their average bitcoin wallet secure against these type of Attacks. Hackers used Silk Road’s automatic transaction verification system to order from each other and then request refund for unshiped goods. Hackers were able to use the transaction Bug because Silk Road used only transaction ID for confirmation of transfer process of bitcoins. They run an automated refund system for all their vendors and six vendors misused the exploit....

December 10, 2022 · 2 min · 241 words · Clinton Dabbs

Six Bulldozers Battle Each Other On The Streets Of China In The Craziest Fight Ever Techworm

In China, construction workers settle their differences with heavy machinery. In a video that has to be seen to be believed, the six bulldozers that are involved in a demolition derby is sparked by a workplace argument. Also, seen are normal cars on the street driving around that are trying to avoid the ridiculousness with the giant bulldozers trying to ram the hell out of each other. In addition, two bulldozers were left flipped over in the street after the brawl that sent cars and pedestrians fleeing....

December 10, 2022 · 1 min · 122 words · Joan Hewitt

Sony Warns Its Users Not To Take Waterproof Xperias Underwater

Many of the recent waterproof Xperia smartphones and tablets come with the IP68-certification. This 6 translates into a dust-tight device, while the second digit – the 8 – means submersion into deeper than 1 meter clean water for 30 minutes or more. Before the Sony Xperia Z5 lineup, many of the Xperia phones were advertised with press photos showing taking selfies or group photos underwater with fully submerged devices, which indirectly suggested that you can actually do those things....

December 10, 2022 · 3 min · 560 words · Ester Marks