Graphene Infused Rubber Bands Are 200 Times Stronger Than Steel Techworm

Graphene The graphite that you see at the end of a pencil tip is made up of multiple layers of carbon atoms. When that layer is reduced to be just one atom thick – we get graphene. Though scientists knew about graphene, extracting it from graphite and using it has always been challenging, which is what makes this announcement exciting. Graphene’s signature property is its durability which is said to be 200 times stronger than steel....

December 19, 2022 · 2 min · 405 words · Richard Kramer

Hacker Controls Drone By Google Glass By Only Using Head Movements Techworm

Video: Bliane Bublitz, controlling a Parrot AR drone, only by slight head movements

December 19, 2022 · 1 min · 13 words · Ryan Nelson

Hackers Breach Gaming Giant Ea Steal Game Source Code And Tools

For those unaware, Electronic Arts develops and publishes games of established franchises, including Battlefield, Need for Speed, The Sims, Medal of Honor series, Titanfall, as well as the EA Sports titles FIFA, Madden NFL, and NBA Live. The incident which was first reported by Vice, claims that the hackers have stolen 780GB of data from EA servers, which includes the source code of the popular soccer game “FIFA 21” as well as code for its matchmaking server....

December 19, 2022 · 2 min · 358 words · Deborah Wright

Hackers Can Hack Android Smartphones Using Covert Data Channels Using Voice Channel

The primary network that smartphones are connected to is the cellular network; however, very little effort has been put in to find out the possible security issues that could endanger this network and its end users. A new possible threat that could occur in the cellular network is introduced in this research. The research analyzes the ability to use the cellular network voice channel to leak information from the smartphones applications....

December 19, 2022 · 2 min · 261 words · Arturo Slaughter

Hackers Target Chinese Govt Over Coronavirus Response

According to FireEye, a hacking group “APT32” also known as “Ocean Lotus” believed to be operating on behalf of the Vietnamese government, was involved in a spear-phishing campaign targeting members of China’s Ministry of Emergency Management and the Wuhan government, epicenter of the coronavirus pandemic. “These attacks speak to the virus being an intelligence priority – everyone is throwing everything they’ve got at it, and APT32 is what Vietnam has,” FireEye said in a blog post....

December 19, 2022 · 2 min · 417 words · Bernadine Phillips

Hds To Movie Streaming Site Shuts Down Permanent

According to a message posted on the site, the site’s operators said that they are shutting down the website for good. “HDS-TO is permanently closed,” it read, translated from French. “Thank you for your understanding and goodbye.” Also Read- 15 Best Free Movie Download Websites HDS.to is ranked among the 30 most-visited sites in Belgium, for instance, and had a substantial user base in France, Canada, and Switzerland too. After the shutdown notice, there were rumors floating that the site was still accessible with a VPN (Virtual Private Network)....

December 19, 2022 · 2 min · 273 words · Dennis Hutcheson

Here Is How Hackers Bypass Google S Two Factor Authentication Techworm

Some people can be tricked into disclosing their two-factor authentication code to criminals, as there is a new sly trick that makes them think that are in fact protecting their accounts while doing so. Two-factor authentication (referred 2FA) is an important safety measure current mainstream of online services, from banks to Google, Facebook, and government agencies who have gradually adopted the security measures. In the two-factor authentication to protect the account needs to log operation when you need to enter a verification code to send SMS text messages, or even enter the correct password will be blocked by the system....

December 19, 2022 · 2 min · 307 words · Walter Larsen

Homeland Security Team Remotely Hacked A Boeing 757 In A Controlled Experiment Techworm

During a keynote speech at the CyberSat Summit 2017 in Virginia last week, Robert Hickey, the aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate, revealed the chilling details of the hack. “We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing a remote, non-cooperative, penetration,” said Hickey. “[Which] means I didn’t have anybody touching the airplane, I didn’t have an insider threat....

December 19, 2022 · 2 min · 318 words · Christopher Cook

Hospital Asked To Pay 100 000 As Penalty For Security Breach In 2012

Hospital asked to pay $100,000 as penalty for security breachLack of encryptionOther Cases Lack of encryption Attorney General Martha Coakley’s office said doctors at Beth Israel Deaconess failed to follow policies to protect patient information. The hospital also failed to notify patients about the breach, as required by law, for several months, Coakley said. The breach laid bare information pertaining to the patients medical history as well as Social Security numbers....

December 19, 2022 · 2 min · 304 words · Mary Sundahl

How To Block Websites On Chrome Browser Working 2018

The reason can be anything, but the point is How to block them?. Well, here in this article we have provided you with the ways to Block Websites On Chrome Browser. So keep reading it till the end. Here is how to block websites on Chrome Desktop Version (PC) Blocking websites is as easy as unblocking them. So follow the steps carefully. Here is how to block websites on Chrome Desktop Version (PC)Step 1Step 2Step 3Step 4How to Block Websites on Chrome Mobile Version (Android)How to Block Websites on Chrome Mobile Version (iOS)...

December 19, 2022 · 2 min · 295 words · Ruth Gore

How To Change Theme Wallpaper On Ps5

PlayStation 5 is a gaming beast whose power is often compared to gaming PCs. Packed with realistic graphics on a 4K resolution, the latest console from Sony doesn’t kid around. Apart from the gaming front, we have a bone to pick with Sony. Unlike the earlier versions, there is no option to modify the theme & background, and wallpaper on the PS5 due to its dynamic themes. The wallpaper of the current game you are playing appears as the background....

December 19, 2022 · 4 min · 684 words · Jo Harris

How To Order An Ethical Hack Online Website Security Goes Saas Techworm

December 19, 2022 · 0 min · 0 words · Kevin Edwards

How To Share Files From One Android Smartphone To Another Using Android Beam

Android Beam is a quick and simple way to share content with another Android device. Unlike Apple’s AirDrop you do need to bang phones, but you get a wider compatibility of devices since the feature is built into nearly all Android phones. It will even work for files or photos that are stored in the shade, as in not physically on your device. Assuming both devices have NFC and at least the sending device has Android Lollipop or higher, it’s quite easy to do....

December 19, 2022 · 2 min · 424 words · Donald Steed

How To Solve Unavailable Youtube Video

Worry not, because, in this article, we will show you how to fix those particular YouTube errors. And will introduce some video repair tools. Some common messages you may be experiencing are: This video is unavailable. This video is currently unavailable. An error occurred — please try again later. This video is not available in your country. The uploader has not made this video available in your country. this video is not available...

December 19, 2022 · 6 min · 1132 words · Theodore Bolin

How To Watch 3D Movies On Pc Using Vlc Media Player

If you are looking to know how to watch 3D movies on your PC/laptop using VLC Media Player then keep reading as this article will guide you step by step to do so. When it comes to selecting a media player for your PC and laptop, the majority of people would definitely choose the VLC media player over any of the other media players available. The reason being, VLC media player can play almost all the media file formats and it is indeed a proven fact....

December 19, 2022 · 2 min · 321 words · Gladys Rome

Hsbc Turkey Hacked And 2 7 Million Customer S Data Compromised

HSBC Turkey hacked and 2.7 million customer’s data compromisedThe bank says there is no financial risk to the customers The bank stated that it had notice the attack in the last week through its internal security control mechanism. The bank also said that, Only the linked account number was compromised. The content of the account was not compromised. It is not possible to commit fraud with the linked account number. This information is regularly shared by our customers with the 3rd parties when they make money transfers and EFT transactions....

December 19, 2022 · 2 min · 228 words · John Flaherty

Huawei Restores All Tencent Games On Its App Store After Legal Dispute

Apparently, Huawei was demanding a 50% cut of Tencent’s game sales on the app store. Since both the companies weren’t able to reach a deal on the revenue sharing, it led to the removal of Tencent online games from the app store. “Due to the failure of Huawei’s mobile game platform to renew its contract with our Mobile Game Promotion Project Agreement as scheduled, relevant products of Tencent Games were suddenly removed from the shelves early this morning,” Tencent had said in a statement on Friday after removing Tencent’s online games....

December 19, 2022 · 2 min · 258 words · Carmelita Foss

If You Thought Your Credit Card Purchases Were Anonymous You Were Wrong

Yves-Alexandre de Montjoye, a computer-security researcher at the Massachusetts Institute of Technology (MIT) in Cambridge, and his colleagues managed to identify one individual from a sea of ‘anonymized’ credit-card data. Their research, published on 29 January in Science, analysed credit-card transaction information, or ‘metadata’, from 1.1 million shoppers in countries that are members of the Organisation for Economic Co-operation and Development (OECD). de Montjoye explains that databases of credit card records, even stripped of personal information like card number, name and address, contain more than enough information to “re-identify” individuals....

December 19, 2022 · 2 min · 382 words · Stacie Franklin

Indian Girl Stands Up To Cyber Bullying Makes A Gutsy Facebook Post To Thwart Blackmailer Techworm

Taruna received an email from an unknown hacker, who claimed to have hacked into her accounts. The hacker threatened Taruna that he will leak her private photos and videos online unless she made another set of her nude photos and sent them to him. Instead of complying with the hackers threat, Taruna decided to go public. She made an all revealing Facebook post in which she posted screenshots of the email from her blackmailer who is a person named “Kevin John”....

December 19, 2022 · 1 min · 172 words · Susan Reyes

Instagram Is Working On A Voice Response Feature For Stories

The upcoming feature that might make it to Instagram is the ability to respond to Instagram stories via voice messages. Instagram Stories to get voice messages support According to developer Alessandro Paluzzi, Instagram is working upon a feature that allows users to respond to ephemeral type Instagram Stories using voice messages. Instagram Stories to get voice messages supportWhen can we see this functionality on Instagram? As of now, you can respond via GIFs, strikers, or text messages, however, the voice message feature remains unavailable when it comes to responding to the stories....

December 19, 2022 · 2 min · 282 words · Stephanie Gary