It is still summer and mosquitoes are making us green bristles. If you count yourself among those exasperated by the well-known buzz, then you might be interested in the invention of an Israeli company: a laser system that detects the presence of these intruders. In the battle between man and mosquito, […]
Technology
Samsung Shifting Focus on QD-OLED Technology over LCD
After many years of waiting, the screen industry seems ready to give up LCD technology, with Samsung giant shifting to Quantum Dot (QD) – OLED technologies, superior in terms of image quality, and power consumption. Samsung has been using Quantum Dot technology for the LCD TV product range for a […]
Google Study: At Least 1.5% of Passwords Are Already Compromised
Earlier this year, Google introduced a Chrome extension called Password Checkup, which notifies users if one or more of their online accounts are associated with recently compromised computer attacks. Unlike a password manager, the Password Checkup extension only checks if the login data is used for possibly hacked accounts, offering […]
Mobile Telephony: UbiquitiLink to Implement GSM Broadcast Relays on Earth’s Orbit
No matter how well-developed the mobile telephone networks are, coverage in mountainous areas and remote locations will always be deficient with the placement of land relays to cover every possible location at prohibitive costs. For such situations, satellite phone services have been around for many years and they work, but […]
Social Networks Regulation: A Worldwide Problem
Following scandals related to spreading fake news, live broadcasts of suicide bombings or terrorist attacks, social networks are forced to change their approach, according to an analysis by the Financial Times. Almost ten years ago, an Italian court sentenced three Google executives to six months in prison for failing to […]
Online Security: The Most Vulnerable, Easy-to-Guess Passwords
The most vulnerable passwords to hackers are those inspired by famous artists and bands, such as “Blink182”, “Metallica”, “Slipknot”, “Eminem” and “50cent”, according to a report by the UK National Cyber Security Center. Risky options include those that contain names and those made up of numbers only, according to Reuters. […]