Category: Tech

Huawei Linked to EU Parliament Bribery Scandal: Five Charged

2025-03-19
Huawei Linked to EU Parliament Bribery Scandal: Five Charged

Belgian prosecutors announced on Tuesday that five individuals have been charged in connection with a bribery investigation at the European Parliament allegedly linked to China's Huawei. Five were detained last week; four have been arrested and charged with active corruption and involvement in a criminal organization, while a fifth faces money laundering charges and has been conditionally released. Prosecutors did not disclose names but said new searches took place Monday at European Parliament offices. The alleged corruption, prosecutors say, occurred "very discreetly" since 2021 under the guise of commercial lobbying, involving payments for political stances or excessive gifts like food, travel, and football tickets. Huawei responded, stating it takes the allegations seriously and maintains a zero-tolerance policy towards corruption.

Tesla's Troubles: Rising Chinese Competition and Challenges in India

2025-03-19
Tesla's Troubles: Rising Chinese Competition and Challenges in India

Tesla is facing a tough year. Sales have fallen year-on-year in the US, China, and several European countries, and its stock price has plummeted. Political factors and the rise of Chinese competitors are contributing to the slump. In China, BYD has become the world's leading EV manufacturer, posing a significant challenge to Tesla. Tesla's expansion into emerging markets like India faces stiff competition from local giants like Tata Motors, and its high prices and limited product options are unlikely to attract buyers. Experts suggest that Tesla needs India more than India needs Tesla. The focus for Tesla should be on addressing existing market issues rather than expanding blindly.

Google's uBlock Origin Ban Leaves Users Vulnerable to Malicious Ads

2025-03-19
Google's uBlock Origin Ban Leaves Users Vulnerable to Malicious Ads

Google's recent disabling of the popular ad-blocker uBlock Origin on Chrome has raised serious security concerns. The author recounts a personal story of a relative falling victim to malware after unknowingly disabling uBlock Origin, highlighting the vulnerability of less tech-savvy users. While alternatives exist, they may not be as effective and switching browsers isn't always feasible. The author urges Google to provide a more user-friendly solution instead of leaving users exposed to potentially harmful ads.

Zombie Mastermind: How Wasps Turn Caterpillars into Bodyguards

2025-03-19
Zombie Mastermind: How Wasps Turn Caterpillars into Bodyguards

Glyptapanteles wasps employ a horrifying life cycle: females inject up to 80 eggs into caterpillars. The larvae feed, then collectively emerge, leaving the caterpillar alive but manipulated. The larvae control the caterpillar, turning it into a bodyguard protecting their cocoons until it starves to death. Research by ecologist Arne Janssen at the University of Amsterdam shows this manipulation drastically improves the wasps' survival rates. This isn't simple parasitism; it's a brutal, efficient survival strategy showcasing nature's darker wonders.

USPTO-Funded Study: Background for the Unleashing American Innovators Act

2025-03-19
USPTO-Funded Study: Background for the Unleashing American Innovators Act

This study was funded by the USPTO and independently prepared as background material for the USPTO’s report to Congress, as mandated by the Unleashing American Innovators Act of 2022. The authors acknowledge helpful comments and discussions with Lauren Ailes and Brett Lockard, as well as USPTO employees and participants at NBER and European Commission events. The views expressed are solely those of the authors and do not necessarily reflect the views of the National Bureau of Economic Research.

Level Up Your Digital Hygiene: A Practical Guide to Online Security

2025-03-19
Level Up Your Digital Hygiene: A Practical Guide to Online Security

This comprehensive guide outlines practical steps to enhance your digital security, covering everything from essential password managers and hardware security keys to more advanced techniques like disk encryption, VPNs, and network monitoring. The author stresses the importance of avoiding 'smart' devices, utilizing privacy-focused browsers and search engines, and protecting personal information. They share their preferred tools and strategies, including 1Password, YubiKey, Signal, and Brave browser, aiming to empower readers to build a more secure digital life and mitigate risks of data breaches and cyberattacks.

Is Abandoning the Internet the Next Big Thing?

2025-03-19

The author compares the current internet to a dangerous slum, filled with spam, malware, and constant attacks. Using personal anecdotes and website statistics, he illustrates the dark side: overwhelming spam, persistent DDoS attacks, and rampant malware. He argues the internet's average IQ is declining and may worsen. While not ready to abandon the internet himself, he's considering it, noting others have already quietly left.

Sony's New RGB LED Backlight Tech: A Mini LED Killer?

2025-03-19
Sony's New RGB LED Backlight Tech: A Mini LED Killer?

Sony announced a new TV display technology using individual RGB LEDs for backlighting. Called "General RGB LED Backlight Technology," it combines the high brightness of Mini LED with the high contrast of OLED. A prototype shown at Sony's Tokyo headquarters boasted 4000 cd/m² brightness and superior color gamut. Compared to Sony's existing Mini LED and QD-OLED TVs, the RGB LED prototype excelled in color reproduction and viewing angles, though some blooming was still present. While not entirely novel, Sony believes its expertise in backlighting and image processing will yield a reliable and stable product, offering a compelling alternative for large-screen, high-brightness TVs.

Tech

Dragon Capsule Docks with ISS: A Smooth Operation

2025-03-19
Dragon Capsule Docks with ISS: A Smooth Operation

SpaceX's Dragon capsule, en route to the International Space Station (ISS), performed a series of precise burns to gradually approach the station. This was followed by final docking maneuvers, including pressurization of the vestibule, hatch opening, and crew ingress. The entire process demonstrated the impressive precision of modern aerospace technology.

Estonia: A Digital Identity Pioneer

2025-03-19
Estonia: A Digital Identity Pioneer

Estonia's e-ID system, operational for over 20 years, is the cornerstone of its e-governance. All Estonian citizens, regardless of location, possess a state-issued digital identity used for daily transactions, from paying bills and voting online to signing contracts and accessing healthcare. This success has influenced EU policy, driving interoperability across Europe. Estonia now champions the adoption of digital wallets, enhancing security and convenience, while sharing its expertise globally.

Bio-Based Plastic Production: A Breakthrough Using Engineered E. coli

2025-03-19
Bio-Based Plastic Production: A Breakthrough Using Engineered E. coli

Researchers genetically engineered E. coli to produce biodegradable polymers. The process allows for control over the ratio of amino acids and other chemicals in the polymer and boosts yield through enzyme addition. While not perfect—impurities and lower production rates remain—the work highlights the potential of bio-based manufacturing for sustainable plastic alternatives.

NASA Astronauts Safely Return After Unexpectedly Extended Space Mission

2025-03-18
NASA Astronauts Safely Return After Unexpectedly Extended Space Mission

NASA astronauts Suni Williams and Butch Wilmore, whose planned short space mission stretched to over nine months due to a Boeing Starliner malfunction, have safely returned to Earth. They landed with two other astronauts aboard a SpaceX Crew Dragon capsule after an extended stay aboard the International Space Station. The situation garnered significant attention, with SpaceX CEO Elon Musk claiming he offered a plan to return Williams and Wilmore sooner, but it was rejected. NASA denies receiving such a proposal. Despite speculation of the astronauts being 'abandoned', NASA maintains the decision was made to save costs and ensure continuous staffing of the space station. The astronauts themselves stated they were prepared for the extended mission and utilized the time for research and station maintenance.

Phoronix Founder Michael Larabel: 20 Years of Linux Hardware Benchmarking

2025-03-18

Michael Larabel, principal author of Phoronix.com, founded the site in 2004, focusing on enhancing the Linux hardware experience. He's penned over 20,000 articles covering Linux hardware support, performance, graphics drivers, and more. He also leads development of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. A true veteran of the open-source world, his contributions have been invaluable to the Linux community.

Tech

Microsoft's Controversial Topological Qubit Claim: Insufficient Evidence Sparks Debate

2025-03-18
Microsoft's Controversial Topological Qubit Claim: Insufficient Evidence Sparks Debate

Microsoft recently announced advancements in its topological qubit research, claiming to have created the first topological qubits. This claim has sparked significant controversy within the scientific community. While Microsoft researchers presented data at the APS meeting, many physicists remain skeptical about the sufficiency of the evidence. Noise in the experimental data and the lack of a clear bimodal signal make the conclusions unconvincing. Although Microsoft expresses confidence in its technology, further research and more conclusive evidence are needed to fully convince the broader scientific community.

Netherlands Parliament Votes to Curb Reliance on US Tech Firms

2025-03-18
Netherlands Parliament Votes to Curb Reliance on US Tech Firms

The Dutch parliament passed motions urging the government to reduce dependence on US software companies, aiming to create a domestically controlled cloud platform. This follows concerns about changing US-Netherlands relations and anxieties over US tech giants' control of data. The motions also call for a reassessment of Amazon Web Services' role and preferential treatment for European firms in public tenders. While viable European alternatives remain scarce, this marks a crucial first step towards reducing reliance on US tech, prompting greater transparency regarding risks associated with using US cloud services.

Musk's 'Department of Government Efficiency': A Farce or Real Reform?

2025-03-18
Musk's 'Department of Government Efficiency': A Farce or Real Reform?

Elon Musk's so-called Department of Government Efficiency (DOGE) has spent the first six weeks of the Trump administration disrupting the federal government. Under the guise of auditing to stop fraud, waste, and abuse, DOGE has accessed sensitive data and payment systems across various agencies. However, two experienced federal auditors claim DOGE's actions are far from a real audit, with many of their 'findings' revealed as errors. Real audits follow GAGAS standards, a five-phase process including planning, evidence gathering, evaluation, reporting, and follow-up. DOGE seems to have completely bypassed these processes. While government waste does exist, DOGE's actions appear more like a farce than genuine reform.

The Axolotl's Fight for Survival: A Mexican Tragedy

2025-03-18
The Axolotl's Fight for Survival: A Mexican Tragedy

Scientists are struggling to find the critically endangered axolotl in the canals of Xochimilco, Mexico City. This unique amphibian, renowned for its incredible regenerative abilities, is one of the world's most studied animals. However, habitat destruction, deteriorating water quality, and climate change have decimated its population. While easily bred in captivity and popular as pets and research subjects, its survival in the wild hangs by a thread. Efforts to restore its habitat face funding and political hurdles. The axolotl's plight reflects the impact of human activity on biodiversity and highlights the urgency of conservation efforts.

Court Affirms: AI-Generated Art Can't Be Copyrighted

2025-03-18
Court Affirms: AI-Generated Art Can't Be Copyrighted

A federal appeals court in Washington, D.C., has upheld the U.S. Copyright Office's decision that AI-generated artwork without human input cannot be copyrighted. The ruling rejects Stephen Thaler's claim that his AI system, DABUS, independently created a copyrightable image. The court affirmed that human authorship is a fundamental requirement for copyright protection under U.S. law. This decision follows similar rulings and reflects the ongoing struggle to define copyright in the rapidly evolving field of generative AI. Thaler plans to appeal, while the Copyright Office maintains the court's decision is correct.

Tech

Trump FTC Erases Years of AI and Privacy Guidance Blogs

2025-03-18
Trump FTC Erases Years of AI and Privacy Guidance Blogs

The Trump administration's Federal Trade Commission (FTC) has purged four years' worth of business guidance blogs, including crucial information on AI and consumer privacy related to landmark lawsuits against companies like Amazon and Microsoft. This move raises concerns about government transparency and corporate compliance, particularly as new chair Andrew Ferguson aims to ease regulations on tech firms. Deleted blogs offered FTC advice on avoiding consumer protection violations, ethical AI development, and children's data privacy. This action is seen as benefiting tech companies by eliminating precedents for regulatory compliance.

VW's Budget EV, ID. EVERY1, to Launch with Rivian Software

2025-03-18
VW's Budget EV, ID. EVERY1, to Launch with Rivian Software

Volkswagen unveiled the ID. EVERY1, an ultra-cheap electric vehicle set to launch in 2027 with a starting price of €20,000. Significantly, the ID. EVERY1 will be the first VW vehicle to utilize Rivian's software and architecture, a result of a $5.8 billion joint venture between the two companies. This collaboration aims to reduce development costs and enhance VW's competitiveness in the EV market, while providing Rivian with crucial funding and business diversification. The ID. EVERY1 represents VW's push into a wider market segment, with a goal of becoming the world's leading high-volume electric vehicle manufacturer by 2030.

Tech

Tesla Insurance Costs Skyrocket Amidst Wave of Vandalism and Backlash

2025-03-18
Tesla Insurance Costs Skyrocket Amidst Wave of Vandalism and Backlash

Tesla insurance premiums are surging due to the company's declining reputation and a rise in vandalism targeting its vehicles. Insurers, relying on actuarial models, are predicting higher claim payouts for Tesla EVs. Elon Musk's personal brand is inextricably linked to the cars, fueling public anger and leading to protests and acts of vandalism, including arson, graffiti, and theft. This has prompted insurers to increase rates significantly, especially for models like the Model X and Model S Plaid. A similar situation unfolded in 2023 with Kia and Hyundai vehicles, whose easy theft led to soaring insurance costs. Adding fuel to the fire, a website called "DOGEQUEST" allegedly publishes personal information of Tesla owners, exacerbating the crisis.

Tech vandalism

Amazon Kills Local Alexa Processing: Privacy Concerns Rise with AI Push

2025-03-18
Amazon Kills Local Alexa Processing: Privacy Concerns Rise with AI Push

Starting March 28, 2025, Amazon will eliminate the local voice processing option for some Echo devices, sending all voice requests to the cloud for analysis. Amazon claims this is necessary for new generative AI features, but the move has sparked privacy concerns. While users previously could choose not to send voice recordings, transcripts were still sent to Amazon's cloud even with this option enabled. This change forces users to choose between privacy and full Alexa functionality, as disabling recording storage disables many personalized features. Amazon assures users this doesn't compromise privacy, but its past record, including using voice data for targeted ads and security breaches, raises doubts.

Tech

North Korea's Crypto Laundering Scheme: A Billions-Dollar Headache

2025-03-18
North Korea's Crypto Laundering Scheme: A Billions-Dollar Headache

North Korea's hacking spree has netted billions in cryptocurrency, but converting this loot into fiat currency presents a massive challenge. Unable to use major exchanges due to KYC regulations, they rely on a global network of over-the-counter brokers, particularly in under-regulated regions like China. The sheer volume of funds, however, creates a significant bottleneck, leaving vast sums of crypto trapped in wallets – a modern-day equivalent of Escobar's cash storage problem. While employing mixers and other tools to obfuscate transactions, North Korea faces persistent pressure from nations like the US, who employ various methods to track and seize these illicit funds. This includes using provisions in the USA PATRIOT Act to subpoena Chinese banks, a strategy requiring significant political capital.

Eight-Year Espionage Campaign Leveraging Unpatched Windows Shortcut Vulnerability

2025-03-18
Eight-Year Espionage Campaign Leveraging Unpatched Windows Shortcut Vulnerability

Trend Micro discovered an eight-year-old espionage campaign exploiting a vulnerability in Windows .LNK shortcut files. Attackers embed malicious code by obscuring commands within megabytes of whitespace in the command-line arguments. Despite Trend Micro reporting this to Microsoft last September, Microsoft considers it a low-priority UI issue, not a security vulnerability, and refuses to patch it. This vulnerability has been used in attacks targeting governments, private sectors, and financial institutions, with 46% of attacks originating from North Korea. Trend Micro decided to publicly disclose the vulnerability, as even local code execution, combined with other exploits, easily compromises systems. Microsoft stated they will consider addressing this in a future feature release, advising users to exercise caution when downloading files from unknown sources.

PlanetScale Exposes the Real Failure Rate of EBS: It's Not Binary, It's Constant Degradation

2025-03-18
PlanetScale Exposes the Real Failure Rate of EBS: It's Not Binary, It's Constant Degradation

Based on its massive use of Amazon EBS, PlanetScale reveals the true failure rate is far higher than AWS documentation suggests. The article highlights that EBS 'slowness' is far more common than outright failure, with frequent performance fluctuations even when meeting AWS's performance guarantees, causing application outages. This degradation isn't random; it's inherent to the system's complexity. PlanetScale mitigates issues through monitoring and automated EBS volume replacement, ultimately leading to PlanetScale Metal to avoid network storage performance issues.

Hungary's Plan to Use Facial Recognition Against Pride Events Violates EU AI Act

2025-03-18
Hungary's Plan to Use Facial Recognition Against Pride Events Violates EU AI Act

Viktor Orbán's plan to use facial recognition to suppress pride events in Hungary violates the EU's AI Act. The Act largely prohibits real-time facial recognition for policing, with exceptions for national security or terrorism. Orbán's proposed amendment to the Child Protection Act bans pride events and allows police to use facial recognition to identify attendees. Dr. Laura Caroli, who negotiated the EU AI rules, confirms this use is explicitly prohibited. Even claiming national security wouldn't justify it. The ban, effective February 2nd, has drawn fierce criticism. MEP Daniel Freund called it reminiscent of Russia or China, urging the EU to halt funding to Orbán's regime. The Hungarian Helsinki Committee highlights violations of data protection rights. While enforcement rests with Hungarian authorities, other member states can oppose such measures. The practical application of the AI Act will take time, leaving room for such abuses in the interim.

Wired Magazine Drops Paywall for FOIA-Based Reporting

2025-03-18
Wired Magazine Drops Paywall for FOIA-Based Reporting

Facing challenges of dwindling government transparency and financial struggles in the news industry, Wired magazine has taken a bold step: making all articles based on public records obtained via the Freedom of Information Act (FOIA) freely accessible. This move prioritizes public access to information, even if it means reduced subscription revenue. The article argues that while high-quality investigative reporting is expensive, sustained public support will ultimately offset this loss and help break down the barriers of news paywalls.

UK Probes Data Brokers' National Security Risks

2025-03-18
UK Probes Data Brokers' National Security Risks

The UK government is seeking expert input on the data brokerage industry and its potential national security risks to inform new data-sharing legislation. The inquiry specifically invites organizations using and supplying data to brokers, as well as brokers themselves, to participate. The government aims to understand brokers' operations, security practices, and clientele to shape policy. Data brokers, facing increasing criticism for collecting and selling personal data, are a target for both marketers and cybercriminals. This investigation seeks to balance the convenience of data sharing with national security concerns, differentiating between data brokers and data intermediaries.

Google Acquires Cloud Security Firm Wiz for $32B

2025-03-18
Google Acquires Cloud Security Firm Wiz for $32B

Alphabet Inc. announced it will acquire Wiz, a leading cloud security platform, for $32 billion in an all-cash deal. This acquisition accelerates Google Cloud's strategy in two key areas: enhanced cloud security and multi-cloud capabilities in the AI era. Wiz offers an easy-to-use platform connecting to major cloud providers and code environments, preventing cybersecurity incidents. The combined expertise of Google Cloud's AI capabilities and Wiz's innovative technology will improve cloud security, reduce customer costs, and boost multi-cloud adoption.

Tech

Blockchain Misuse: Hype or Innovation?

2025-03-18
Blockchain Misuse: Hype or Innovation?

This article critically analyzes the current state of blockchain applications in areas such as supply chain management, object authenticity verification, statement authenticity guarantee, voting, proof of authorship, and land registry. The author points out that many seemingly logical blockchain solutions ignore the core issue of 'blockchain is not the Internet of Things (IoT)', leading to difficulties in guaranteeing data authenticity. The article argues that in many scenarios, distributed databases or digital signatures can solve the problem without the complexity and resource consumption of blockchain. The author believes that currently, only in the area of value transfer does blockchain (such as Bitcoin) demonstrate true value, while the application prospects of smart contracts remain unclear.

1 2 120 121 122 124 126 127 128 194 195