2The Morning Code Review: Programming in 2040 (opens in new tab)(dimillian.medium.com)2unkeen7mo ago0
4Find My network exploit lets hackers silently track any Bluetooth device (opens in new tab)(cec.gmu.edu)6unkeen1y ago0
5China's High-Tech Spherical Security Robot Enhances Policing in Crowded Streets [video] (opens in new tab)(youtube.com)1unkeen1y ago2
6Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts (opens in new tab)(github.com)2unkeen1y ago0
7Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts [pdf] (opens in new tab)(papers.mathyvanhoef.com)3unkeen1y ago0
8Elon Musk Uses Cybertruck Explosion to Show Tesla Can Remotely Unlock / Monitor (opens in new tab)(404media.co)12unkeen1y ago5
9'Obelisks': New class of life has been found in human digestive system (opens in new tab)(sciencealert.com)476unkeen1y ago134