Dubai: The world’s first self-driving transport pod was tested in Dubai. Those alone can be used alone or used likeRead more
A widespread ransomware attack which is affecting several IT organizations in multiple countries. This ransomware attack called Wanna (also knownRead more
Security: Protection Against Spectre and Meltdown
Microsoft is aware of new vulnerabilities in hardware processors. These are a newly discovered class of vulnerabilities. Based on a common chip architecture, when originally designed, was created to speed up computers. The technical name is “speculative execution side-channel vulnerabilities”. You can learn more about these vulnerabilities at Google Project Zero.
Two-wheeler companies have also firmly launched and showcased their new models. Companies have tried to give a lot of premium look and style to most scooters. Also, more hi-tech features are being provided in these scooters than before.Read more
A cryptocurrency is a digital asset designed to work as a medium of exchange that uses cryptography to secure its transactions, to control the creation of additional units, and to verify the transfer of assets. Cryptocurrencies are classified as a subset of digital currencies and are also classified as a subset of alternative currencies and virtual currencies.Read more