Wi-Fi Protected Access II (WPA 2) is a security protocol, developed by Wi-Fi Alliance in 2004. It was developed to secure wireless computer networks and is a common shorthand for IEEE 802.11i-2004 standard. Researchers then discovered a flaw in WPA and the flaw is that one can retrieve the keystream from short packets. To solve this problem, WPA2 came. But, is it still secure?
Read the article by Kaustavdeep Goswami to know more. Read here:
By: Kartik Chawla
How convenient is it to connect all your devices and use one from the other? But, wait, aren’t we forgetting something? The more we connect our devices to each other the more vulnerable they become to viruses and exploitation. How? Read on to find out.
By: Vidul Dhaulta
The future lies in the technology of Holographs. Movies like Iron Man always make us ponder on how far can we go and how much can we develop? To get a gen on it read on.
By: Yuvraj Khullar
Taking away thousand of lives within a few months of its origination, the Blue Whale Challange is hitting the News Highlights every day. Awareness regarding the same has become a must these days so that no more teenagers fall victim to this nasty game of life and death.
By: Nikita Duhan
A type-setting software built just for Research. Along with being easy to use it’s extremely efficient. Read more here.
By: Shinjana Misra
Kotlin is a JVM language that is remarkably similar to Swift. Kotlin is a statically-typed language, developed by JetBrains, whose syntax is more expressive and concise than that of Java. To know more read on.
By: Vasudha Jha
With the advancement in technology, programmers have enhanced the much talked about AI systems to such an extent that now they can even help us with Law. Isn’t it thought-provoking of how much farther we can go with the AI systems present today and the ones yet to come?
Global hotel chain InterContinental Hotels Group Plc said 1,200 of its franchised hotels in the United States, including Holiday Inn and Crowne Plaza, were victims of a three-month cyberattack that sought to steal customer payment card data.
The company declined to say how many payment cards were stolen in the attack, the latest in a hacking spree on prominent hospitality companies including Hyatt Hotels Corp, Hilton, and Starwood Hotels, now owned by Marriott International Inc.
Continue reading “Cyberattack hits 1,200 InterContinental hotels in US”
If you’ve seen any robot try to walk, you’ll know that they’re not very elegant. The reason is their cumbersome, inefficient gait, optimised to prevent them falling over, as opposed to being honed for speed.
By contrast, humans and animals are able to walk and run swiftly and smoothly, using the absolute minimum of energy. And roboticists want to know why. So Ph.D. student Geert Folkertsma at the University of Twente has built a robotic cheetah that he hopes can help optimise the robots of the future.
Continue reading “This electronic cheetah-bot can help us develop more efficient robots”
There’s mind-blowing technology, and then there’s brain-computer technologies.
Facebook’s “direct brain interface,” a creation of its secretive Building 8 division, could take tech-enhanced communication to the next level.
Continue reading “Facebook has a plan to let you type with your brain”