Menu

Blog

Page 4166

Mar 15, 2022

Wild New Paper Says ‘Quantum Gravity’ Could Emerge From a Holographic Universe

Posted by in categories: alien life, quantum physics

In the last decades of his life, Albert Einstein hoped to unite his description of gravity with existing models of electromagnetism under a single master theory.

It’s a quest that continues to vex theoretical physicists to this day. Two of our best models of reality – Einstein’s general theory of relativity and the laws of quantum mechanics – are as immiscible as oil and water.

Whatever a combination of the two looks like, it will almost certainly reveal foundations to the Universe quite unlike anything we can visualize.

Mar 15, 2022

Roscosmos: US astronaut to return to Earth with Russian spacecraft

Posted by in category: space

Russia’s space agency Roscosmos said it will bring a US astronaut back to Earth from the International Space Station at the end of this month, despite tensions between the two countries.

NASA astronaut Mark Vande Hei will return as planned on March 30 together with cosmonauts Anton Shkaplerov and Pyotr Dubrov in a Russian Soyuz space capsule, the agency said in Moscow on Monday.

“Roscosmos has never given partners any reason to doubt our reliability,” the agency said, adding that the safe operation of the space station is its top priority.

Mar 15, 2022

Exclusive: China captures powerful US NSA cyberspy tool

Posted by in categories: biotech/medical, cybercrime/malcode, internet

China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim’s computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users’ information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday.

According to the report, the Trojan horse, “NOPEN,” is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device’s information.

Through technical analysis, the center believes that the “NOPEN” Trojan horse is characterized by complex technology, comprehensive functions and strong concealment, which can fit a variety of processor architectures and operating systems. It can also collaborate with other cyber weapons and is a typical tool used for cyber espionage.

Mar 15, 2022

Panzerfaust 3: Germany’s Modern Anti-Tank Weapon That’s Still Wrecking Armor

Posted by in category: military

The lightweight and portable Panzerfaust 3 has been in the news as of late due to its use in the ongoing conflict between Russia and Ukraine. A newer version of the World War II-era Panzerfaust, it allows soldiers to penetrate all forms of tank armor, thanks to its use of shape-charged warheads.

—weapons don’t bring peace they only boost one’s stupidity. We shall all see how cheering for one side, instead of peace plays out. I don’t trust crooked governments, I don’t trust the media, I only trust peace and stability that few can provide.


It can penetrate all forms of tank armor, thanks to its warheads.

Mar 15, 2022

The Nordic way to stop bullying

Posted by in category: health

Bullying can make kid’s lives a misery and cause lifelong health problems – but scientists are discovering powerful ways to fight it.

Mar 15, 2022

‘Dirty Pipe’ Linux Flaw Affects a Wide Range of QNAP NAS Devices

Posted by in category: computing

A wide range of QNAP NAS devices are affected by dirty pipe linux.

Mar 15, 2022

New Linux Bug in Netfilter Firewall Module Lets Attackers Gain Root Access

Posted by in categories: computing, security

A newly disclosed security flaw in the Linux kernel could be leveraged by a local adversary to gain elevated privileges on vulnerable systems to execute arbitrary code, escape containers, or induce a kernel panic.

Tracked as CVE-2022–25636 (CVSS score: 7.8), the vulnerability impacts Linux kernel versions 5.4 through 5.6.10 and is a result of a heap out-of-bounds write in the netfilter subcomponent in the kernel. The issue was discovered by Nick Gregory, a senior threat researcher at Sophos.

Mar 15, 2022

Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords

Posted by in category: cybercrime/malcode

French video game company Ubisoft on Friday confirmed it was a victim of a “cyber security incident,” causing temporary disruptions to its games, systems, and services.

The Montreuil-headquartered firm said that an investigation into the breach was underway and that it has initiated a company-wide password reset as a precautionary measure.

“Also, we can confirm that all our games and services are functioning normally and that at this time there is no evidence any player personal information was accessed or exposed as a by-product of this incident,” the company said in a statement.

Mar 15, 2022

Motorcycle maker Kawasaki created a rideable electric goat — take a look

Posted by in categories: robotics/AI, transportation

Videos from the world’s largest robot trade show in Tokyo last week show Kawasaki’s four-legged robot, Bex, in action.

Mar 14, 2022

Researchers Reveal Robots’ Self-Assessment Methods

Posted by in category: robotics/AI

In today’s world, autonomous machines play a major role in our lives, yet it is still difficult to establish trust between humans and machines. Aside from concerns about unexpected disruptions, robots do not yet communicate exactly the way humans do. Researchers have revealed that independent computer systems are able to increase trust in robots, increase collaboration, and streamline task execution.

Humans tend to rely more on robots that provide self-assessment while performing their tasks, according to the study. Communication is essential for establishing trust in a human working environment. Humans and autonomous machines may have a gap of understanding, which can result in a robot performing an action incorrectly, and even misuse or exploitation of the robot’s capabilities.

In a study conducted by researchers from Draper and the University of Colorado Boulder in the USA, researchers examined how autonomous robots using probability models are capable of calculating and expressing self-assessment skills, forming a kind of machine-self-confidence. The models were developed to predict their behavior and provide a perspective on their mission before the event occurs.