Chinese NFT platforms don’t want you to trade NFTs anymore

However, there’s always been a sense of uncertainty in the industry: as with all young tech creations that don’t fit into traditional regulatory frameworks, the countdown started early for when the Chinese government would step in. Since 2017, China has maintained a hard stance against crypto unparalleled around the world. The Chinese financial and cyber […]

Hackers hammer SpringShell vulnerability in attempt to install cryptominers

Getty Images reader comments 0 with 0 posters participating Share this story Malicious hackers have been hammering servers with attacks that exploit the recently discovered SpringShell vulnerability in an attempt to install cryptomining malware, researchers said. SpringShell came to light late last month when a researcher demonstrated how it could be used to remotely execute […]

The Download: Language-preserving AI, and hackers showed it’s frighteningly easy to breach critical infrastructure

The must-reads I’ve combed the internet to find you today’s most fun/important/scary/fascinating stories about technology. 1 We need to prepare for the war in Ukraine to last indefinitely It’s been eight weeks since the invasion, with no sign of a conclusion to the conflict. (Foreign Affairs)+ Ukraine is concerned that Chinese-made drones are sabotaging its […]

Spilling Silicon Valley’s secrets, one tweet at a time

Wong has built a reputation for always being right. Journalists cite her work in articles, crediting her scoops. “Initially, people would question, ‘Who is she? How does she have this information?’” she says. “But I built trust over time. You have to prove your information is valid.”  It’s gotten to the point where companies create […]

A new vision of artificial intelligence for the people

But few people had enough mastery of the language to manually transcribe the audio. Inspired by voice assistants like Siri, Mahelona began looking into natural-language processing. “Teaching the computer to speak Māori became absolutely necessary,” Jones says. But Te Hiku faced a chicken-and-egg problem. To build a te reo speech recognition model, it needed an […]

How engineered microbes could cut aviation emissions

Cemvita’s fuel could approach being carbon neutral because the microbes are consuming carbon dioxide, says Moji Karimi, Cemvita’s CEO. The fuel would still produce emissions when burned, but they would be partially offset by the carbon that was captured to make it. As for the light the microbes require, Cemvita will likely be using artificial […]

Griffin on Tech: More ambition please: the verdict on the digital strategy draft

Peter Griffin, Editor. 22 April 2022, 11:14 am As a vision statement for New Zealand’s place in the digital world, the Government’s draft digital strategy has been given a mixed scorecard at best. The Ministry of Business, Innovation and Employment just published the feedback on the draft and it aligns very closely with what I’ve been hearing […]

Critical bug could have let hackers commandeer millions of Android devices

Getty Images reader comments 9 with 7 posters participating Share this story Security researchers said they uncovered a vulnerability that could have allowed hackers to commandeer millions of Android devices equipped with mobile chipsets made by Qualcomm and MediaTek. The vulnerability resided in ALAC—short for Apple Lossless Audio Codec and also known as Apple Lossless—which […]

These hackers showed just how easy it is to target critical infrastructure

“OPC UA is used everywhere in the industrial world as a connector between systems,” says Keuper. “It’s such a central component of typical industrial networks, and we can bypass authentication normally required to read or change anything. That’s why people found it to be the most important and interesting. It took just a couple of […]

Wealthy cybercriminals are using zero-day hacks more than ever

“Ransomware groups have been able to recruit new talent and to use the resources from their ransomware operations and from the insane amounts of revenue they’re pulling in in order to focus on what was once the domain of state-sponsored [hacking] groups,” says James Sadowski, a researcher with Mandiant. Zero-days are typically bought and sold […]