Author: ProHoster

Debian 12.3 release delayed due to issue causing Ext4 filesystem corruption

The developers of the Debian project have announced the suspension of publication of installation images for the Debian 12.3 update due to the discovery of a bug in the Linux kernel that leads to data corruption in the Ext4 file system. Users of already installed systems are advised to refrain from installing kernel package updates from the repository until the fix is ​​published. The problem appears in the stable branch of the Linux 6.1 kernel, which was […]

Scientists have created self-healing concrete with repair bacteria

An interdisciplinary team of scientists from Drexel University has introduced self-healing concrete. To do this, the solution is reinforced with fibers containing spores of special bacteria. The development can eliminate expensive repair work, which will also reduce the need for building materials, the production of which causes one of the heaviest damage to the environment. Image source: Drexel UniversitySource: 3dnews.ru

Experts are wary of the passive safety of the Tesla Cybertruck

Traffic safety experts have already raised concerns about the safety of electric pickup trucks and SUVs in general because they are fast, heavy vehicles, and the Tesla Cybertruck's rugged stainless steel shell has raised even greater concerns about its potential to injure pedestrians, cyclists and other cars. Image source: TeslaSource: 3dnews.ru

Apple has blocked Android messaging apps from working with iMessage users

The problem of cross-platform communications was to a certain extent solved by third-party applications for working with formats and information exchange protocols supported by Apple, but the company itself was clearly not satisfied with such compromises. This week, it blocked the operation of applications for the Android platform that allowed users to exchange messages with users of the proprietary messenger iMessage. Image source: Apple SupportSource: 3dnews.ru

Vulnerability in Bluetooth stacks of Linux, macOS, Android and iOS

Marc Newlin, who discovered the MouseJack vulnerability seven years ago, has disclosed a similar vulnerability (CVE-2023-45866) affecting the Bluetooth stacks of Android, Linux, macOS and iOS. This vulnerability allows keystroke spoofing by simulating the activity of a Bluetooth-connected input device. By gaining access to keyboard input, an attacker can perform various actions, such as executing commands on the system, […]

Global launch of Vivo X100 smartphones will take place on December 14

About a month has passed since Vivo introduced the flagship smartphones X100 and X100 Pro in China, the hardware of which was the powerful MediaTek Dimensity 9300 processor. However, both devices appeared only in the home market and are still not available outside of China. Apparently this will change next week. Image source: VivoSource: […]

Indian solar observatory Aditya-L1 sends first batch of images of the Sun

The Indian space agency ISRO shared the first images of the Sun taken by the Aditya-L1 space observatory. The images were taken with an ultraviolet telescope using 11 filters, presenting our star in its fullest light. Previously, such complete visual information has never been contained in one package of observations, ISRO said, and this will give a more complete understanding of the processes on the Sun and in its […]

The universe is losing its grip: ancient stars created such heavy elements that do not exist in nature today

A team of astronomers led by a specialist from the University of Michigan studied 42 old stars in the Milky Way and came to an amazing conclusion. At the very dawn of time, stars could create elements much heavier than anything that had ever been found naturally on Earth or in the Universe in general. This will force a new look at the evolution of stars and the Universe. […]

Keystroke substitution vulnerability in Linux, macOS, Android, and iOS Bluetooth stacks

Marc Newlin, who discovered the MouseJack vulnerability seven years ago, has disclosed information about a similar vulnerability (CVE-2023-45866) affecting the Bluetooth stacks of Android, Linux, macOS and iOS, and allowing keystroke substitution by simulating input device activity connected via Bluetooth. With access to keyboard input, an attacker can perform actions such as running commands on the system, installing applications, and […]