Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: used Clear Filter

An ambitious vision of a city built from lava

Venice, Italy CNN — Erupting from fiery volcanoes, lava has historically been an uncontrollable force that destroys buildings and neighborhoods in its wake. But what if that force could instead be redirected and harnessed to create whole cities? An ambitious project from Icelandic firm s.ap arkitektar, presented at this year’s Venice Architecture Biennale (running until November 23), proposes just that. Whereas lava naturally cools on the landscape to become volcanic rock such as basalt, “Lava

Introduction to Indian English

Content In less than 200 years since its formal introduction as part of a nascent and westernized education system, English has grown to be the medium through which the people of India communicate with the world, and often with one another. In large parts of a country with several major languages, it vies with Hindi—the most commonly used Indian language—as the spoken language of choice. There is a range of ability from a mere smattering of words, to some amount of rudimentary communication, to

Plants monitor the integrity of their barrier by sensing gas diffusion

Plant materials and growth conditions Col-0 was used as the wild type unless stated otherwise. ein2-1, etr1-3, ate1-2;ate2-1, prt6-5, proWOX4-erYFP, proPXY:GUS, proPXY:erVenus and 35S:EIN3-GFP have been described previously10,13,27,37,38,39,40. ate1-2;ate2-1 mutants were reciprocally backcrossed into Col-0 for three generations and transfer DNA insertions were confirmed by genotyping to obtain double-homozygous mutants. Seeds were sown on half-strength MS (Duchefa) plates supplemented with 0.0

On Mexico’s Caribbean Coast, There’s Lobster for the Tourists and Microplastics for Everyone Else

The fishermen of Puerto Morelos, on Mexico’s Caribbean coast, risk their lives every time they head out to sea to fish or dive for lobsters. Their bounty is dependent on luck, as the weather often makes it impossible to go out, while on other days the hooks they cast come back empty. These workers set out every day to find the best lobsters possible for the affluent vacationers who come to the region, while they and their families, cut off from many of the benefits of tourism development, get by

The Palette of the Medieval North

The selection of fragments contained many of those pigments already noted in the extensive analytical work conducted elsewhere in Europe7,8,9,10,11,12,13,14, such as azurite, red lead, vermilion, orpiment, and copper-based greens. Even though these fragment pages might appear rather simple in terms of their colour scheme, the analysis has shown a greater variation and complexity than first meets the eye. This observation will be further elaborated below where findings are listed by colour. A sum

Topics: copper fr red used xrf

Bay Area commuters get free rides Tuesday morning due to Clipper card outage

Commuters in and around San Francisco rode into work for free on Tuesday morning due to an outage in the Clipper card system, which is used to handle payments for train, bus and ferry rides. "ATTENTION: The Clipper system is experiencing an outage on all operators this morning," the Bay Area Clipper account wrote in a post on X. "Please be prepared to pay your fare with another form of payment if required by your transit agency." Many buses were waving commuters on without asking for payment,

El Chapo drug cartel reportedly tracked and killed informants by hacking an FBI phone

The Mexican Sinaloa cartel hired a hacker to track and surveil the FBI, then used that information to intimidate and even kill witnesses against drug lord Joaquín "El Chapo" Guzmán, according to a Justice Department report spotted by Ars Technica. The hacker used relatively sophisticated data collection techniques and weaknesses in the FBI's cybersecurity to identify the witnesses, the report states. According to the highly redacted report, which is based in part on testimony from an "individua

How and Where to Buy Used Camera Gear to Save Money

Beware! Buying used camera gear is addictive. Photography can be an expensive hobby and finding out how easy it is to get great gear at a reasonable price only leads to buying even more gear at a "reasonable" price. Trust me, I've done it a lot. Finding the lens or camera you want at a lower price is great, but even better is finding older, discontinued models that can give that retro look with no editing required. While eBay is the obvious answer for finding anything used, that's only one opti

The original LZEXE (A.K.A. Kosinski) compressor source code has been released

Last year, I discovered that the Kosinski compression format is actually LZEXE, which was used for compressing DOS executables back in the 90s and the late 80s. Its developer catalogues three versions on his website: v0.90, v0.91, and v0.91e. While only binaries of v0.91 and v0.91e can be found on the website, v0.90 can be found mirrored on various other websites. I got in touch with LZEXE’s developer, Fabrice Bellard, and he was able to release LZEXE’s source code, untouched since 1990! It i

Topics: code data source used v0

The Original LZEXE (A.K.A. Kosinski) Compressor Source Code Has Been Released

Last year, I discovered that the Kosinski compression format is actually LZEXE, which was used for compressing DOS executables back in the 90s and the late 80s. Its developer catalogues three versions on his website: v0.90, v0.91, and v0.91e. While only binaries of v0.91 and v0.91e can be found on the website, v0.90 can be found mirrored on various other websites. I got in touch with LZEXE’s developer, Fabrice Bellard, and he was able to release LZEXE’s source code, untouched since 1990! It i

Topics: code data source used v0

Tinder to require new users in California to use facial recognition tech to verify their profiles

In Brief Tinder is requiring new users in California to use facial recognition technology to verify their profiles, Axios reported on Monday. The new “Face Check” feature aims to reduce impersonation on the dating app and ensure that people aren’t being connected to bots or fake accounts. Face Check requires users to take a short video selfie when they’re signing up for the app. The scan confirms the person is real, checks if their face matches their profile photos, and also detects if the sam

Topics: check face id tinder used

A short history of web bots and bot detection techniques

Did you know your favorite website can detect when you’re browsing it in public transport and when you scroll it laying in your bed? Today we’ll learn how they can do it and how this info is used to fight bots. I gave this talk at Google Developer Student Club Žilina, and CodeBeer in Bratislava last year. To be honest, I had already forgotten about it, but recently I found it in my notes, and damn, this stuff is interesting! So after a bit of editing and updates, here it is as an article. A sm

This Prehistoric Trick Shows How Ice Age People Harvested Teeth for Jewelry

When piecing together the cultural practices of ancient humans, traditional archaeologists rely on clues from artifacts such as tools, bones, and pottery. Experimental archaeologists, however, go a step further—recreating past behaviors to experience how people once lived. That’s precisely what a team of researchers recently did to investigate how Stone Age communities in northeastern Europe extracted animal teeth to produce accessories. Led by Aija Macāne, a visiting scholar in the Department

New Process Uses Microbes to Create Valuable Materials from Urine

Researchers from the Lawrence Berkeley National Laboratory (Berkeley Lab), UC Irvine, and the University of Illinois Urbana-Champaign (UIUC), have used biology to convert human urine into a valuable product. The team genetically modified yeast to take the elements present in urine and create hydroxyapatite – a calcium and phosphorus-based mineral naturally produced by humans and other animals to build bones and teeth. Commercially manufactured hydroxyapatite is used in surgery and dentistry to

ChatGPT Use Is Rising But a Surprising Number of Americans Still Haven't Heard of It

About a third of American adults say they've used the generative AI tool ChatGPT, while one in five say they've never heard of it, according to new survey results released this week by the Pew Research Center. The 34% who said they have used the gen AI tool from OpenAI include 58% of adults under 30, the largest share among any age cohort. The share of ChatGPT users drops with age: 41% of those 30 to 49, 25% of those 50 to 64 and 10% of those 65 and older. There is also a correlation with educa

Bogong moths use a stellar compass for long-distance navigation at night

Capture and care of moths Bogong moths (A. infusa) of both sexes were caught in the wild during their autumn and spring migrations (2019 and 2018) using a LepiLED insect light (www.gunnarbrehm.de), or a vertical beam search light (model GT175, Ammon Luminaire Company), placed in front of a white sheet suspended between two trees. Almost all of the animals were caught near the Mount Selwyn Snowfields (southeast New South Wales, Australia: 35.914° S, 148.444° E; elevation, 1,600 m), which is appr

Topics: fig moth moths sky used

Multiple Studies Now Suggest That AI Will Make Us Morons

For the second time in two weeks, a study has been published that suggests that people who use AI may display less cognitive ability than those who don’t rely on it. The studies have bolstered critics’ accusations that AI makes you stupid. The most recent study was conducted by the University of Pennsylvania’s Wharton School and looked at a sample size of over 4,500 participants. The study, which looked at the cognitive differences between people who used LLMs like ChatGPT to do research and th

Man pleads guilty to hacking networks to pitch security services

A Kansas City man has pleaded guilty to hacking multiple organizations to advertise his cybersecurity services, the U.S. Department of Justice announced on Wednesday. 32-year-old Nicholas Michael Kloster was indicted last year for hacking into the networks of three organizations in 2024, including a health club and a Missouri nonprofit corporation. According to court documents, Kloster accessed the systems of a health club that operates multiple gyms in Missouri after breaching a restricted ar

Does your generative AI protect your privacy? New study ranks them best to worst

TU IS/Getty Most generative AI companies rely on user data to train their chatbots. For that, they may turn to public or private data. Some services are less invasive and more flexible at scooping up data from their users. Others, not so much. A new report from data removal service Incogni looks at the best and the worst of AI when it comes to respecting your personal data and privacy. For its report "Gen AI and LLM Data Privacy Ranking 2025," Incogni examined nine popular generative AI servic

Generative AI and privacy are best frenemies - a new study ranks the best and worst offenders

TU IS/Getty Most generative AI companies rely on user data to train their chatbots. For that, they may turn to public or private data. Some services are less invasive and more flexible at scooping up data from their users. Others, not so much. A new report from data removal service Incogni looks at the best and the worst of AI when it comes to respecting your personal data and privacy. For its report "Gen AI and LLM Data Privacy Ranking 2025," Incogni examined nine popular generative AI servic

OpenSERDES – Open Hardware Serializer/Deserializer (SerDes) in Verilog (2020)

OpenSERDES Serializer/Deserializer (SerDes) is the most important functional block used in high speed communication. SerDes converts parallel data into a serial (one bit) stream of data that is transmitted over a high-speed connection, such as LVDS, to a receiver that converts the serial stream back to the original, parallel data. A global CLOCK signal is present to sequence the serialization and deserialization of data from one block to another. Technology: Skywater OpenPDK 130nm Tools Use

OpenSERDES – Open Hardware Serializer/Deserializer (SerDes) in Verilog

OpenSERDES Serializer/Deserializer (SerDes) is the most important functional block used in high speed communication. SerDes converts parallel data into a serial (one bit) stream of data that is transmitted over a high-speed connection, such as LVDS, to a receiver that converts the serial stream back to the original, parallel data. A global CLOCK signal is present to sequence the serialization and deserialization of data from one block to another. Technology: Skywater OpenPDK 130nm Tools Use

eBay and Vestiaire Collective Want an Exemption from Trump’s Tariffs

Last month, Suzanne Smith-Darley felt fantastic. She had just bought a used Chanel handbag from a Japanese seller on eBay for $800—a steal compared to the original asking price of $1,400. About a week later an email arrived that crushed her: DHL was demanding a $142 fee for US tariffs before it would deliver the well-worn medallion tote to Smith-Darley’s Atlanta doorstep. “It goes to Japan, has a whole life, and it could be in the trash literally,” she says. “I’m willing to pick it out of the tr

Infineon security microcontroller flaw enabled extraction of TPM secret keys

A few months ago, security researcher Thomas Roche presented his fundamental research on secure elements used in the YubiKey 5. The security element is the Infineon SLE78, which contains a proprietary implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). Using side-channel attacks and a great deal of smart research, the author discovered a vulnerability in Infineon Technologies' cryptographic library and, as a result, was able to extract the ECDSA secret key from the secure

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was first observed last year in May leveraging compromised VPN credentials to access victims’ networks. Post-compromise, they used “pass-the-hash” attacks to gain admin privileges, disabled Windows Defender, and encrypted all files, including virtual machine storage. Later, the threat group was observed