Category: Top Stories

spot_imgspot_img

The Download: Trolling text scammers, and China’s social media censorship

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. The people using humor to troll their spam texts The...

China’s influencer crackdown, and covid’s origins

No one had foreseen just how fast three of China’s most powerful influencers would fall. On June 3, Austin Li, a 30-year-old live-streamer with over 60 million followers, abruptly cut off...

Liver transplant patient surgery storage

“In the US, 70% of are not used. Whether we can rescue that 70%, I don’t know,” Clavien says. “But it’s exciting to try and rescue the organs that aren’t used,...

Nanhai District in Foshan launched a promotion campaign on innovation and entrepreneurship environment

On May 27, 2022 Promotion Conference on the Innovation and Entrepreneurship Environment of Nanhai District, Foshan was officially launched in the Nanhai Talent Center. It was hosted by Foshan Nanhai Top Talent...

5G private networks enable business everywhere

The manufacturing industry is exploring 5G technology at an accelerated pace, largely to enable AI-driven use cases such as closed-loop manufacturing, adaptive manufacturing, predictive analytics for maintenance, and extended reality (XR)-based...

Russia hacked an American satellite company one hour before the Ukraine invasion

Guerrero-Saade, who has been at the forefront of research into AcidRain, says that where previous malware used by the Russians was narrowly targeted, AcidRaid is more of an all-purpose weapon. ...

Shanghai’s lockdown tests China’s online grocery apps

But things started to take a downturn last year. Despite the hype and money, these companies struggled to make a profit as lockdowns eased and people simply went back to shopping...

These hackers just showed how easy it is to target critical infrastructure

“OPC UA is used everywhere in the industrial world as a connector between systems,” says Keuper. “It’s such a central component of typical industrial networks, and we can bypass authentication normally required...
Follow us
0FansLike
0FollowersFollow
0SubscribersSubscribe
Instagram
Most Popular