Hackable Cisco Phones, a Locust Invasion, and More News

栏目: IT技术 · 发布时间: 4年前

内容简介:Hackers are pervading and locusts are raiding, but first: a cartoon aboutdeepfake news.Here's the news you need to know, in two minutes or less.Want to receive this two-minute roundup as an email every weekday?Sign up here!

Hackers are pervading and locusts are raiding, but first: a cartoon aboutdeepfake news.

Here's the news you need to know, in two minutes or less.

Want to receive this two-minute roundup as an email every weekday?Sign up here!

Today’s News

Cisco flaws puts millions of workplace devices at risk

If, in the course of your workday, you use stuff like desk phones, web cameras, and network switches, you've probably used a Cisco product. Researchers have recently discovered security flaws in those products that affect millions of devices and could be exploited to penetrate deep into corporate networks : Attackers could collect sensitive information, turn the devices into eyes and ears inside an organization, or shut the devices down altogether.

The terrifying science behind the locust plagues in Africa

New estimates show that the locust population in East Africa—already numbered in the hundreds of billions—could increase 500-fold by June, causing massive food shortages across the continent. Researchers say that a swarm covering one square kilometer can eat as much food in a day as 35,000 humans , and when locusts get together another scary thing happens: Their bodies transform from tan into a striking yellow and black, and they start eating toxic plants—and becoming toxic themselves.

Fast Fact: 75 Percent

That's the portion of Nike's Vapormax shoe that's made from recycled manufacturing waste. The company introduced its gear for the 2020 Tokyo Olympics today, showing off neat colors and technology made from sustainable materials.

WIRED Recommends: Best Sunrise Alarms

Yesterday, we told you about thebest mattress to sleep on. But you can't stay in bed forever: Grab one of these sunrise alarm clocks to make the waking-up process as easy and natural as possible.

News You Can Use

Miss the president's State of the Union address last night?Watch it right here.

This daily roundup is available as a newsletter. You can sign upright here to make sure you get the news delivered fresh to your inbox every weekday!


以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

垃圾收集

垃圾收集

琼斯 / 谢之易 / 人民邮电出版社 / 2004-4-1 / 45.00元

书围绕着动态内存自动回收的话题,介绍了垃圾收集机制,详细分析了各种算法和相关技术。 本书共12章。第1章首先介绍计算机存储器管理的演化和自动内存回收的需求,并引入了本书所使用的术语和记法。第2章介绍了3种“经典”的垃圾收集技术:引用计数(reference counting)、标记-清扫(mark-sweep)和节点复制(copying)。 随后的4章更详细地讨论了上述这些垃圾收集方式......一起来看看 《垃圾收集》 这本书的介绍吧!

随机密码生成器
随机密码生成器

多种字符组合密码

URL 编码/解码
URL 编码/解码

URL 编码/解码

RGB CMYK 转换工具
RGB CMYK 转换工具

RGB CMYK 互转工具