Economy
-
Apple, Atari, and Commodore, oh my! Explore a deluxe home vintage computer den
Enlarge / A view of Brian Green’s home computer lab, full of vintage treasures. (credit: Brian Green) In a world…
Read More » -
North Korean hackers target security researchers with a new backdoor
Enlarge (credit: Getty Images) Threat actors connected to the North Korean government have been targeting security researchers in a hacking…
Read More » -
cURL, the omnipresent data tool, is getting a 25th birthday party this month
Enlarge / Curling, like the cURL project, requires precision and is underappreciated. When you first start messing with the command…
Read More » -
Malware infecting widely used security appliance survives firmware updates
Enlarge (credit: Getty Images) Threat actors with a connection to the Chinese government are infecting a widely used security appliance…
Read More » -
Discord hops the generative AI train with ChatGPT-style tools
Enlarge (credit: Discord) Joining a recent parade of companies adopting generative AI technology, Discord announced on Thursday that it is…
Read More » -
Go ahead and unplug this door device before reading. You’ll thank us later.
Enlarge / The Akuvox E11 (credit: Akuvox) The Akuvox E11 is billed as a video door phone, but it’s actually…
Read More » -
Wikipedia + AI = truth? DuckDuckGo hopes so with new answerbot
Enlarge / An AI-generated image of a cyborg duck. (credit: Ars Technica) Not to be left out of the rush…
Read More » -
Google’s PaLM-E is a generalist robot brain that takes commands
Enlarge / A robotic arm controlled by PaLM-E reaches for a bag of chips in a demonstration video. (credit: Google…
Read More » -
Microsoft makes Outlook for Mac free, no Office or Microsoft 365 required
Enlarge / The current Outlook for Mac email client. (credit: Microsoft) Microsoft is making the Outlook for Mac app free…
Read More » -
Threat actors are using advanced malware to backdoor business-grade routers
Enlarge (credit: Getty Images) Researchers have uncovered advanced malware that’s turning business-grade routers into attacker-controlled listening posts that can sniff…
Read More »