Advertisements


GitHub Will Require All Code Contributors To Use 2FA

GitHub, the code hosting platform used by tens of millions of software developers around the world, announced today that all users who upload code to the site will need to enable one or more forms of two-factor authentication (2FA) by the end of 2023.....»»

Category: topSource:  slashdotMay 4th, 2022

Tavares says EV "sweet spot" is $25K, criticizes labor strikes as "destructive"

Stellantis CEO Carlos Tavares, who has warned that the middle class will be priced out of the EV market if automakers can't absorb the additional production costs they require, said the sweet spot for affordable EVs is "around $25,000.".....»»

Category: topSource:  autonewsRelated NewsJul 27th, 2023

E-bike battery fires prompt call for better regulation

A charity says batteries for e-bikes should require third-party approval before being sold in the UK......»»

Category: hdrSource:  bbcRelated NewsJul 27th, 2023

E-bike battery fires spark call to regulate like fireworks

A charity says batteries for e-bikes should require third-party approval before being sold in the UK......»»

Category: hdrSource:  bbcRelated NewsJul 27th, 2023

New Apple Vision Pro details emerge from visionOS beta 2

Apple released a new version of visionOS for developer testing, and while no one has access to the hardware, code sleuths were still able to learn more about Apple Vision Pro.Apple Vision ProCode can reveal a lot about an operating system even if its.....»»

Category: appleSource:  appleinsiderRelated NewsJul 27th, 2023

iOS 17 code hints at Action button in iPhone 15 Pro models

Code from the fourth developer beta of iOS 17 seemingly hints at an Action button in the iPhone 15 Pro models, providing support to some speculations and rumors.A render of the rumored buttons changed with iPhone 15A series of leaks and rumors have s.....»»

Category: appleSource:  appleinsiderRelated NewsJul 26th, 2023

MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)

A privilege escalation vulnerability (CVE-2023-30799) could allow attackers to commandeer up to 900,000 MikroTik routers, says VulnCheck researcher Jacob Baines. While exploting it does require authentication, acquiring credentials to access the rout.....»»

Category: securitySource:  netsecurityRelated NewsJul 26th, 2023

New study sheds light on awareness and preferences for bioplastics in Japan

Non-biodegradable plastics are major contributors to land and marine pollution, destroying habitats and causing harm to both flora and fauna. Hence, the switch to bioplastics is imperative to ensure sustainability. The success of environmental initia.....»»

Category: topSource:  physorgRelated NewsJul 25th, 2023

Physics informed supervised learning framework could make computational imaging faster

Computational imaging techniques are growing more popular, but the large number of measurements they require often lead to slow speeds or damage to biological samples. A newly developed physics-informed variational autoencoder (P-VAE) framework could.....»»

Category: topSource:  physorgRelated NewsJul 25th, 2023

Machine learning enables discovery of DNA-stabilized silver nanoclusters

DNA can do more than pass genetic code from one generation to the next. For nearly 20 years, scientists have known of the molecule's ability to stabilize nanometer-sized clusters of silver atoms. Some of these structures glow visibly in red and green.....»»

Category: topSource:  physorgRelated NewsJul 25th, 2023

SeqCode provides a path to name uncultivated prokaryotes

Most prokaryotes have never been isolated in pure culture and cannot be named under the International Code of Nomenclature of Prokaryotes (ICNP). However, many studies have described uncultured bacteria and archaea though metagenome-assembled genome.....»»

Category: topSource:  physorgRelated NewsJul 24th, 2023

GitHub announces public beta of Copilot Chat IDE integration

According to GitHub, developers can effortlessly tackle complex coding tasks through simple prompts using Copilot Chat. According to GitHub, developers can effortlessly tackle complex coding tasks through simple prompts using Copilot Chat.Read Mo.....»»

Category: topSource:  venturebeatRelated NewsJul 24th, 2023

Generative AI and Web3: Hyped nonsense or a match made in tech heaven

Generative AI and Web3 will be like peanut butter and jelly on fresh bread — but with code, infrastructure, and asset portability. Generative AI and Web3 will be like peanut butter and jelly on fresh bread — but with code, infrastructure, and.....»»

Category: topSource:  venturebeatRelated NewsJul 24th, 2023

North Korean hackers targeted tech companies through JumpCloud and GitHub

North Korean state-sponsored hackers have been linked to two recent cyberattack campaigns: one involving a spear-phishing attack on JumpCloud and the other targeting tech employees on GitHub through a social engineering campaign. The JumpCloud intrus.....»»

Category: securitySource:  netsecurityRelated NewsJul 21st, 2023

Apple says it would remove iMessage and FaceTime in the UK rather than break end-to-end encryption

Facing possible legislation that would require messaging services to offer backdoors in end-to-end encryption, Apple is saying it would rather remove apps like iMessage and FaceTime entirely from the UK market (via BBC News). The new Online Safety B.....»»

Category: gadgetSource:  9to5macRelated NewsJul 20th, 2023

LokiBot malware infecting PCs via Microsoft Word — protect yourself now

Thanks to a report in TheHackerNews, we know that Microsoft Word documents are being used to exploit known remote code execution flaws. The flaws are used as phishing lures to sneak the LokiBot malware onto compromised c.....»»

Category: topSource:  theglobeandmailRelated NewsJul 19th, 2023

Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns

The exploited code-execution flaws are the kind coveted by ransomware and nation-state hackers. Enlarge (credit: Getty Images) Organizations big and small are once again scrambling to patch critical vulnerabilities that.....»»

Category: topSource:  arstechnicaRelated NewsJul 18th, 2023

Aggregation-induced catalysis: Asymmetric catalysis with chiral aggregates

Asymmetric synthesis and catalysis have been actively pursued in chemical and materials sciences for some time. Increasing numbers of drugs and pesticides contain chiral structural units in their structures since drug actions require conformational m.....»»

Category: topSource:  physorgRelated NewsJul 18th, 2023

Apple Pay: Morocco now live, with CIH Bank the first on board

Apple researcher Aaron spotted backend code showing that Apple Pay Morocco has been activated, and CIH Bank has announced that it is now supporting the service. Morocco is only the second African country to see Apple Pay rolled out, after South Afri.....»»

Category: topSource:  marketingvoxRelated NewsJul 18th, 2023

Researchers use liquid crystals that mimic beetle shell coloration units to create a more secure type of QR code

A research group led by Dr. Jialei He of Nagoya University's Graduate School of Engineering has developed a method for processing cholesteric liquid crystals (CLCs) into micrometer-sized spherical particles......»»

Category: topSource:  theglobeandmailRelated NewsJul 14th, 2023

How to help forests fight climate change: Report

Forests across the United States are major contributors to the fight against climate change, annually removing damaging excess carbon from the atmosphere equivalent to approximately 13 percent of overall U.S. greenhouse gas emissions. According to a.....»»

Category: topSource:  pcmagRelated NewsJul 14th, 2023