Toggle light / dark theme

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

In today’s enterprise, even just a split second in latency can impact performance and access to data — and, thus, the ability to manage and immediately act on it.

But the physics and costs of multicloud and hybrid cloud environments make near-instantaneous response times all but impossible.

Modern satellites are becoming a collection of mass-produced computers floating in space. By the end of the decade, thousands more will be out there. But with the increasing reliance on orbital technology comes a growing appetite for hacking it.

Data relayed via satellites is not immune to hacking. James Pavur, an Oxford PhD focusing on satellite systems security, has proven the above statement to be disturbingly evident. With his team, he used $300 worth of satellite TV equipment to intercept vast amounts of information distributed along the larger part of the Northern hemisphere.

“When you’re eavesdropping on satellite internet signals, you’re effectively seeing what someone’s ISP would see. You see every website that a customer browses to, or every email that they receive for every account that they own,” Pavur told CyberNews.

It’s rare that Western disinformation efforts are discovered and exposed. This week, the Stanford Internet Observatory and social media analysis firm Graphika detailed a five-year operation that was pushing pro-Western narratives. The research follows Twitter, Facebook, and Instagram as they remove a series of accounts from their platforms for “coordinated inauthentic behavior.” The propaganda accounts used memes, fake news websites, online petitions, and various hashtags in an attempt to push pro-Western views and were linked to both overt and covert influence operations. The accounts, some of which appear to use AI-generated profile pictures, targeted internet users in Russia, China, and Iran, among other countries. The researchers say the accounts “heavily criticized” Russia following its nvasion of Ukraine in February and also “promoted anti-extremism messaging.” Twitter said the activity it saw is likely to have originated in the US and the UK, while Meta said it was the US.

#WesternPropaganda


Plus: An Iranian hacking tool steals inboxes, LastPass gets hacked, and a deepfake scammer targets the crypto world.

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

To those that were part of the dot-com era tech scene, 2022 has a familiar energy. But now it’s all about the metaverse. And, just as they did in 1993 when the World Wide Web was launched into the public domain, many are asking themselves, “what is it, anyway?” What’s real, what’s hype and where are we headed?

The truth is, much like Internet 1.0 and all of its subsequent iterations, the metaverse is being defined as it’s being built. And contrary to what many believe, it’s more than just VR headsets and avatars. The metaverse is a place, an ecosystem, and above all else, an entirely new dimension. But to better understand this, it’s important to know how the metaverse is being developed.

One of the larger SpaceX disasters was eight months ago, a Falcon 9 was heavily damaged in rough high seas and there was a question of whether it would fly again. It was enough of a problem that SpaceX changed their landings to the Caribbean instead of the Atlantic Ocean during the winter to avoid high seas. (This reduced the amount of payload the rocket could support.)

Well, the rocket is going to fly again tomorrow as the 4th flight in a streak of at least 7 consecutive Starlink launches. SpaceX is launching faster and faster as their need for Starlink launches grows. They are hiring more technicians so they can launch faster from their 3 Falcon 9 launch towers.


SpaceX rolled a Falcon 9 rocket to its launch pad at Cape Canaveral and test-fired its engines Thursday, prepping for liftoff Saturday night carrying another group of Starlink internet satellites into orbit. The Falcon 9 booster has been repaired after a rough recovery in December knocked it out of SpaceX’s rocket reuse rotation.

The 229-foot-tall (70-meter) rocket fired up its nine Merlin 1D engines at 9:10 a.m. EDT (1310 GMT) Thursday on Space Launch Complex 40 at Cape Canaveral Space Force Station. The engines ignited for about seven seconds, ramping up to 1.7 million pounds of thrust as hold-down restraints kept the Falcon 9 firmly on the ground.

Increased demand for super tiny electronic sensors coming from healthcare, environmental services and the Internet of Things is prompting a search for equally tiny ways to power these sensors. A review of the state of ultracompact supercapacitors, or “micro-supercapacitors,” concludes there is still a lot of research to be done before these devices can deliver on their promise.

The review appeared in the journal Nano Research Energy.

The explosion of demand in recent years for miniaturized , such as health monitors, environmental sensors and wireless communications technologies has in turn driven demand for components for those devices that have ever smaller size and weight, with lower energy consumption, and all of this at cheaper prices.

The number of vulnerability disclosures impacting extended internet of things (XIoT) devices increased by 57% in the first half of 2022 compared to the previous six months, according to a new report by Team82, the research team of cyber-physical systems (CPS) security firm Claroty.

The research also found that vendor self-disclosures increased by 69%. This would be a first for the industry, which usually relies more for disclosures on independent research teams. According to Team82, the trend indicates that more operational technology (OT), IoT, and internet of medical things (IoMT) vendors are establishing vulnerability disclosure programs and dedicating more resources to them.

Additionally, fully or partially remediated firmware vulnerabilities increased by 79% over the same time period, a significant improvement considering the relative challenges in patching firmware versus software vulnerabilities.

“These results will have future implications in forensic medicine and genetic diagnosis.”

In 1999, François Brunelle, a Canadian artist, and photographer, began documenting look-alikes in a picture series “I’m not a look-alike!”

The project, undoubtedly, was a massive hit on social media and other parts of the internet, but it also drew the attention of scientists who study genetic relationships.