Martian Meteorites Offer Clues to Red Planet’s Volcanic History

Of the over 74,000 known meteorites, only around 385 originate from Mars. Scientists have long been able to identify these Martian meteorites due to their unique composition and the presence of specific minerals. One such mineral is oxygen, which has a distinct isotopic signature on Mars. These meteorites provide valuable insights into Mars’ geological history, … Read more

Underground Water Reservoir Discovered on Mars

Data from NASA’s InSight lander has revealed evidence of an underground reservoir of water deep beneath the surface of Mars, according to new research. The study found that there may be enough water trapped in tiny cracks and pores of rock in the Martian crust to fill oceans on the planet’s surface. The data came … Read more

Qilin Ransomware Steals Chrome Credentials, Raises Concerns for Defenders

The Qilin ransomware group has been observed deploying a custom credential stealer to pilfer account credentials stored in Google Chrome browsers. This new tactic marks an alarming shift on the ransomware scene, as reported by Sophos X-Ops researchers. The attack began with Qilin gaining access to a network using compromised VPN credentials without multi-factor authentication … Read more

Curiosity Rover Discovers Pure Sulfur Rocks on Mars

NASA’s Curiosity rover has made a groundbreaking discovery on Mars, finding rocks made of pure sulfur in the Red Planet’s Gediz Vallis channel. The finding is a first for the Martian surface and provides new insights into the planet’s geological history. The rover discovered the yellow sulfur crystals on May 30 after driving over a … Read more

Hackers Steal Banking Creds from iOS, Android Users via PWA Apps

Hackers are using progressive web applications (PWAs) to impersonate banking apps and steal credentials from Android and iOS users. PWAs are cross-platform applications that can be installed directly from the browser, offering a native-like experience through features like push notifications, access to device hardware, and background data syncing. Threat actors use this technique in phishing … Read more

DNA-Based Technology for Secure Data Storage and Computing

Researchers from North Carolina State University (NC State) and Johns Hopkins University have developed a groundbreaking technology that utilizes DNA for data storage and computing, enabling capabilities such as storing, retrieving, computing, and rewriting data. The breakthrough is made possible by innovative polymer structures called dendricolloids, which enhance data density and preservation. This technology allows … Read more

New Bosons Hint at Physics Beyond Standard Model

Researchers have detected deviations in particle interactions that point to the existence of new bosons, fundamental particles that mediate forces in nature. The findings, published in Nature Reviews Physics, were made by a team led by Professors Andreas Crivellin and Bruce Mellado. The team observed anomalies in the decay of multi-lepton particles at the Large … Read more

McDonald’s Instagram hacked by crypto scammers for $700K

McDonald’s official Instagram account was hacked by cryptocurrency scammers who claimed they stole $700,000 in stolen money. The hackers changed the caption of the account, which has over 5.1 million followers, to promote a fake digital currency called “GRIMACE” on the Solana network. The scam involves creating a fake token and promoting it aggressively online … Read more