Month: June 2022

Nuclear reactors have a well-earned reputation for being massive construction projects that frequently run into cost overruns. Plus, once they are eventually constructed, monitoring and maintaining them takes a staff of dozens of trained experts. But Yasir Arafat believes nuclear power doesn’t have to be this way. Arafat is the technical lead of the microreactor
0 Comments
Chief executives from Alphabet, Amazon, and Microsoft on Wednesday called on Congress to pass legislation aimed at boosting US economic competitiveness against China, including in chip manufacturing. Those executives and more than 100 others signed a letter urging the US House of Representatives and Senate, which each have passed different versions of the legislation, to reach an
0 Comments
A newly discovered security vulnerability in modern Intel and AMD processors could let remote attackers steal encryption keys via a power side channel attack. Dubbed Hertzbleed by a group of researchers from the University of Texas, University of Illinois Urbana-Champaign, and the University of Washington, the issue is rooted in dynamic voltage and frequency scaling
0 Comments
WhatsApp is reportedly rolling out automatic albums feature on Windows beta. This functionality, which is already available on WhatsApp beta for Android and iOS, would let users classify consecutive photos and videos sent over the chat window. When users send or receive more than three photos or videos consecutively, WhatsApp automatically groups them into an
0 Comments
US chipmaker Qualcomm on Wednesday won its fight against a EUR-997-million (roughly Rs. 8,170 crore) fine imposed by EU antitrust regulators four years ago for paying Apple to use only its chips and blocking out rivals such as Intel. The European Commission in its 2018 decision said the anti-competitive practice took place from 2011 to 2016,
0 Comments
A new Golang-based peer-to-peer (P2P) botnet has been spotted actively targeting Linux servers in the education sector since its emergence in March 2022. Dubbed Panchan by Akamai Security Research, the malware “utilizes its built-in concurrency features to maximize spreadability and execute malware modules” and “harvests SSH keys to perform lateral movement.” The feature-packed botnet, which
0 Comments