Month: March 2022

An Atlas V rocket blasted off from Florida on Tuesday carrying to orbit the next big satellite designed by the National Oceanic and Atmospheric Administration (NOAA) to provide round-the-clock tracking of weather, wildfires and climate change over Earth’s western hemisphere. The GOES-T spacecraft is the third in the latest series of advanced geostationary satellites, credited
0 Comments
Cisco this week shipped patches to address a new round of critical security vulnerabilities affecting Expressway Series and Cisco TelePresence Video Communication Server (VCS) that could be exploited by an attacker to gain elevated privileges and execute arbitrary code. The two flaws – tracked as CVE-2022-20754 and CVE-2022-20755 (CVSS scores: 9.0) – relate to an
0 Comments
Beats is launching a limited-edition model of its discontinued Beats Pill+ in collaboration with American fashion house Stüssy. The launch comes quite soon after Apple discontinued Beats Pill+ in January this year. The new Pill Plus will keep the original design. The speaker will be available for purchase globally on March 4 and the audio
0 Comments
There was a lot of excitement when astronomers from the Chile-based European Southern Observatory (ESO) claimed to have discovered the closest black hole to Earth, just 1,000 light-years away, in the HR 6819 system. But others had disputed the findings. Now, it appears those who doubted the findings were correct. Research by an international team
0 Comments
TicWatch GTH Pro by Mobvoi has been launched. The smartwatch has been developed by Mobvoi in collaboration with CardieX, a global health technology company. The latest wearable from Mobvoi comes without Google’s Wear OS, but offers plenty of health-focused fitness features. The TicWatch comes at a pocket-friendly price and supports multiple workout modes. The TicWatch
0 Comments
A group of academics from the North Carolina State University and Dokuz Eylul University have demonstrated what they say is the “first side-channel attack” on homomorphic encryption that could be exploited to leak data as the encryption process is underway. “Basically, by monitoring power consumption in a device that is encoding data for homomorphic encryption,
0 Comments