Author: user
Satellite images reveal that dozens of dams across the country, including the largest in Texas, may be at risk of collapse due to shifting ground beneath them. Inspections typically do not take these movements into account, suggesting that many of the country’s dams are in worse shape than previously realized.This new discovery raises the prospect that thousands of dams that we do not monitor closely due to high costs and lack of personnel may be damaged and at risk of failure. But how big is the problem, and is it worth using satellite data to provide early warning?Satellites offer an…
Billionaire tech mogul Reid Hoffman is appealing to Silicon Valley tech moguls not only to condemn the killing of two Americans at the hands of Border Patrol agents, but also to stop placating President Trump. “We in Silicon Valley cannot bow our knees to Trump,” Hoffman wrote in a post for X and an opinion column for the San Francisco Standard. “We cannot bow down and hope the crisis fades. Hope without action is no strategy. It is an invitation for Trump to trample everything in sight, including our own business and national security interests.” There was some backlash against…
Neanderthals intentionally collected and placed skulls of horned animals in caves in what is now Spain, suggesting that these extinct human relatives had complex cultural practices more than 43,000 years ago, a new study has found.Des Cubierta Cave in the central Iberian Peninsula was first discovered in 2009. In 2023, researchers announced the rare discovery of a complete set of 35 large mammal skulls inside the cave. Most of the jaw bones were missing, but all of the skulls belonged to some species with horns or horns, such as steppe bison or aurochs. More than 1,400 stone tools were unearthed…
This one. The clock is running low. With demand surging and early stock nearly gone, tonight is your last chance to secure record low prices for TechCrunch Disrupt 2026 and secure a Plus 1 pass at 50% off while limited passes remain. If Disrupt is on your must-attend list, now is the time to take action. Save up to $680 on passes and get a Plus 1 for half price before this offer ends. This pricing ends tonight, January 30th at 11:59pm PT, or the moment the last Plus One Pass is sold out. There is no extension. There are…
Cybersecurity researchers have discovered a malicious Google Chrome extension with the ability to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be a tool for browsing Amazon without sponsored content. It was uploaded to the Chrome Web Store on January 19, 2026 by a publisher named ’10Xprofit’. “This extension blocks ads as advertised, but its main functionality is hidden: it automatically inserts the developer’s affiliate tag (10xprofit-20) into all Amazon product links, replacing existing affiliate codes from content creators,” said Kush Pandya,…
Adam Life-Sized Humanoid Robot Charleston Dance Version 2.0 – YouTube watch on The humanoid robot, named Adam-U Ultra, showed impressive agility and grace, performing a complex and highly energetic routine without stumbling, slipping or missing a beat.A new video released by Chinese robotics company PNDbotics shows a bot, based on the company’s original Adam robot unveiled late last year, performing a series of complex steps. The dancing is surprisingly subtle and human, with intricate arm, hip, and leg movements that blend perfectly with the accompanying music.According to PNDbotics representatives, such complex movements are possible thanks to the model’s 41 independently…
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, targeted vulnerable Internet Information Services (IIS) servers across Asia, with a particular focus on targets in Thailand and Vietnam. The scale of the campaign is unknown at this time. “UAT-8099 uses a web shell and PowerShell to run scripts and deploy the GotoHTTP tool, allowing attackers remote access to vulnerable IIS servers,” security researcher Joey Chen said in a breakdown of the campaign on Thursday. UAT-8099 was first documented…
Snow moon will ‘engulf’ one of the brightest stars in the sky this weekend: where and when to see it
Stargazers across eastern North America will see something truly unusual in the night sky this weekend: an extremely bright star hiding behind a full “snow moon.”After full Sunday (February 1), the bright moon will move over Regulus, the brightest star in the constellation Leo, and briefly disappear from the night sky on Monday night (February 2). This rare phenomenon, called a lunar eclipse, will be visible to the naked eye from much of the United States and Canada, so skywatchers are looking forward to it.This is the latest in a series of Regulus lunar eclipses that began last year and…
For decades, biologists have been grappling with a fundamental mystery of life: how cells can copy their DNA without getting confused during cell division. Every day, trillions of cells in the human body divide, each replicating its entire genetic blueprint with incredible precision. If this process runs unchecked, cells will quickly run out of resources and errors will accumulate, causing disease and death. Researchers now believe they have identified an important built-in safety mechanism that tightly controls DNA replication and, by extension, cell division. Why does DNA replication require precise timing? Cell division is not a single movement, but a…
Badges, Bytes and Intimidation January 30, 2026 Cybercrime / Threat Intelligence Behind the scenes of law enforcement in cyber: What do we know about the cybercriminals we have arrested? What brought them to us, where did they come from, and what role did they play at the crime scene? Introduction: One look at the decentralized fight against cybercrime The sophistication and diversification of cybercrime is forcing law enforcement agencies around the world to respond through increasingly coordinated and publicized actions. However, despite the visibility of these activities, to our knowledge, a comprehensive overview of how law enforcement agencies respond to…