Posts

Online data of all Brazilian citizens leaked

Image
Online data of all Brazilian citizens leaked Data on all Brazilian citizens have been leaked online. The Brazilian Consumer Protection Agency has instructed the government to immediately protect citizens' data. The institute has also directed to take necessary steps for data security immediately. The data leak occurred last week, with data on 223 million Brazilians leaked. In a country with a total population of 221 million, the question of how 223 million data can be leaked may arise in your mind. It is also mentioned that there is information about the person who died earlier in the incident. Besides, data of 104 million vehicles in the incident has also been made public. The data thus made public includes the name of the person, identity card number, marital status, name of the father, mother, and son, and daughter, complete information of the house, credit score, voter registration number, profession, and other details. The person's LinkedIn profile has also been leaked. It

Starting coding? Find out about Python

Image
Starting coding? Find out about Python Python is now a popular programming language, used across a wide range of artificial intelligence. In this age of digital transformation, the demand for manpower capable of designing applications is high. So today we are going to tell you about the important information needed for those who want to make a career from Python language such as salary, programming application, courses to be studied, developer's feelings. Python: Always popular TIOBE publishes its top popular programming languages ​​each month. It updates the ranking of long-trending languages ​​in the evolving landscape of programming languages. According to TIOBE's January rankings, Python was the top popular programming language of the year. This is the fourth time Python has received such an honor. In 2020, Python achieved a rate of 2.01 percent, compared to 1.99 percent and 1.66 percent of the other popular programming languages ​​C ++ and C, respectively. In TIOBE's F

Here's how to put one together for use with a quantum computer

Image
Here's how to put one together for use with a quantum computer Many of you may have heard of supercomputers. But have you ever heard of a quantum computer? If some have heard this word somewhere then you are lucky. Because you have the good fortune to listen to the modern technology of the modern age. Today we will tell you what a quantum computer is and how it works. To understand a quantum computer, first remove all the elements inside the computer such as a keyboard, mouse, motherboard, hard drive, RAM, graphics card. And look at the things that have helped make your computer a computer. Whether it's a computer or a mobile phone, the processor is what makes your device so smart today. The smallest element in that processor is the transistor, whose particles combine to form a single processor. The transistor acts as a switch to turn the current on and off. There are billions upon billions of such switches inside a computer. Once you get all those switches, you can perform all

What is quantum internet and how is data transferred from it?

Image
What is quantum internet and how is data transferred from it? Quantum Internet begins where the capacity of our normal computer or Internet is limited. For example, today's computers have a processor based on seven-nanometer lithography. After a while, it decreases to five, three to two. Then it is difficult to reduce the size. Because the size of the transistor inside the processor is about the size of an atom. Then our internet is transferred to the quantum world. Where our normal physics don't work. Quantum computers are born to meet the limitations of ordinary computers. It has high cybersecurity. Because it is transferred to the superposition. With the advent of a quantum internet, you don't have to use encryption like you do now. The speed of quantum internet is much faster than the normal internet we use. According to scientists, its data transfer rate is one GB per second. Quantum Internet was discovered by Chinese scientists. When two places with a distance of 40 k

Facebook is bringing a smartwatch under its own brand to challenge Apple

Image
Facebook is bringing a smartwatch under its own brand to challenge Apple Social media giant Facebook is going to bring a smartwatch. The information company has written the news saying that the company is going to bring a smartwatch with health and massage features. The company has not yet named the product. But it will support Google's Android operating system. As Facebook develops its own operating system, Google will no longer have to rely on second-generation smartwatches. Meanwhile, many may be interested in what the smartwatch that Facebook will bring. According to sources, the service of this smartwatch will be integrated with the apps of the company including Facebook, Facebook Messenger, Instagram, and WhatsApp. It is also said to support cellular connectivity, which allows you to send and read messages without a smartphone. In addition to the messaging feature, the smartwatch will also include a fitness feature. For this, smartwatches will be connected with the hardware a

When a bug is found, the hacker earns about Rs 175 million

Image
When a bug is found, the hacker earns about Rs 175 million A white-hat hacker (cybersecurity researcher) has received the biggest bug bounty award ever. On February 3, Armor Fi paid a white-hat hacker named Alexander Slindwine 1.5 million, or about  175 million, for finding a sensitive bug in his smart contract. Alexander discovered the bug before going to the insurance brokerage platform Armor Fi Live. If the bug had been left unchecked, it would have allowed a bad character with a dollar coverage to steal the entire Armor Fi underwriting contract. The company has since provided 1 million armor tokens to Alexander. At the time of the announcement of the Bounty Reward, one million tokens were worth 700,000. But as news of the new bug bounty and security patch spread, public confidence in the platform increased, pushing the price of the token by 1.58. At the same time, the total value of Alexander's token has reached 1.5 million dollars. Which has made this bounty the biggest bounty

WhatsApp's downward journey continues, Telegram became the number one app of January

Image
WhatsApp's downward journey continues, Telegram became the number one app of January With the issuance of new privacy terms and policies, the number of WhatsApp users has been declining. The company's new policy of sharing user data with Facebook has led users to look for alternatives to WhatsApp. Meanwhile, data analysis company Sensor Tower has released a new report. According to this, Telegram has risen to number one in the most downloaded app (non-gaming) in January. According to a report released by Censor Tower in December 2020, Telegram was ranked ninth on the list. However, in a period of one month, Telegram has become the first to surpass all. WhatsApp, which was previously in third place, has dropped two places to fifth. The ticket, which was number one till last month, is number two in January. Similarly, the signal is in third place. Instagram, which was previously in the fourth position, has reached the sixth position this time. According to the study report, Teleg

At the risk of all Google Chrome users' data, Google's request to update to the latest version immediately

Image
At the risk of all Google Chrome users' data, Google's request to update to the latest version immediately Cybersecurity researchers have found a major flaw in Google Chrome. Researchers have been working to make the actual transcript of this statement available online. In this bug, hackers can easily access the device by placing a remote code on the user's device through Chrome. The process is also straightforward, and once a hacker gains access to a device, he or she can take full control of the device. Google has released a new version to address the problem of hackers accessing the device. On January 24, Google became aware of this vulnerability. The company unveiled a new version on February 4 with a solution to the problem. As soon as the new version is released, the company asks Google Chrome users to update immediately. Google did not say how many users were affected. However, the company said that this weakness is a big problem for users and requested to update the

To combat abuse, Wikipedia has released a new code of conduct

Image
To combat abuse, Wikipedia has released a new code of conduct Wikipedia, also known as an online vocabulary, has released a new code of conduct to combat abuse and harassment. The company has issued a code of conduct to combat abuse while maintaining diversity, inclusion, and accessibility for its volunteers. The new code is based on other Wikipedia projects like Crowdsource. In which 15 hundred volunteers have helped. Easy, short and clear to the user, the code of conduct is 1600 words. Which is divided into two parts. One of which is the positive behavior expected from users, editors, and Wikipedia staff. In which there is mutual respect, creative editing, the language used when calling other volunteers. They are also encouraged to help each other in the project. The second is unacceptable behavior, which the company discourages. In which the use of insulting, sexually abusive, threatening language has been discouraged. Wikipedia mainly prohibits content that intimidates, offends, in

A computer chip will be placed in the human brain this year

Image
A computer chip will be placed in the human brain this year Alan Musk, the owner of a company like SpaceX and Tesla, said that a computer chip would be made and implanted in the human brain within a year. This means that the person's brain will now be directly connected to the computer through the chip. Alan Musk founded Neurolink in 2016. Joe is working on creating an ultra-high brain-machine interface. In Joe Rogan's podcast show, Alan Musk chips a human brain into a robot. According to him, this technology will be ready in 25 years as a complete brain interface. Alan Musk believes that to prevent artificial intelligence from dominating people, it is necessary to connect people's minds to computers. The musk will extract a piece from the human brain. Electrodes will be placed inside the brain through the robot and the device will be placed in the hole. The mask will leave a small scar on the upper part of the brain. Neurolink is involved in creating a 'thread' tha