Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

MIT’s Tiny New Device Could Save Diabetics From Deadly Blood Sugar Crashes

The new implant contains a reservoir of glucagon that sits beneath the skin and can be activated in an emergency, with no need for injections. For individuals with Type 1 diabetes, the risk of hypoglycemia, dangerously low blood sugar, is a constant concern. When glucose levels drop too far, the

Did a Cosmic Collision Dam the Grand Canyon? A 56,000-Year-Old Mystery

A remarkable coincidence occurred 56,000 years ago, when the impact that created Meteor Crater triggered both a landslide-dammed lake and a paleolake formation in the Grand Canyon. Earth’s ancient past often reads like a mystery novel, and a recent study published in Geology reveals one of its mo

NASA Just Discovered Where These Mysterious Space X-Rays Really Come From

Astronomers have just solved a long-standing mystery about a rare, rapidly spinning neutron star known as PSR J1023+0038. Using NASA’s IXPE telescope and a fleet of observatories, scientists discovered that the system’s intense X-rays don’t come from its glowing accretion disk as previously belie

3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics

A new attack campaign has compromised more than 3,500 websites worldwide with JavaScript cryptocurrency miners, marking the return of browser-based cryptojacking attacks once popularized by the likes of CoinHive.

Although the service has since shuttered after browser makers took steps to ban miner-related apps and add-ons, researchers from the c/side said they found evidence of a stealthy miner packed within obfuscated JavaScript that assesses the computational power of a device and spawns background Web Workers to execute mining tasks in parallel without raising any alarm.

More importantly, the activity has been found to leverage WebSockets to fetch mining tasks from an external server, so as to dynamically adjust the mining intensity based on the device capabilities and accordingly throttle resource consumption to maintain stealth.