Author: user
Iridium metal complexes are an unconventional but promising new antibiotic, a new study has found.The compound is one of more than 600 produced in a study published in Nature Communications in December. The researchers used robots to synthesize compounds, combining building blocks of metal and organic molecules to generate a huge chemical library in just one week.This streamlined approach could also generate five other potential antibiotics, dramatically accelerating both drug discovery and parallel fields of chemical research, lead study author Angelo Fry, an inorganic chemist at the University of York in the UK, told Live Science. you may like As…
Automated investment platform Betterment admitted last week that hackers broke into some of its systems and accessed non-public personal information of many of its customers. In an email sent Monday and seen by TechCrunch, Betterment said hackers gained access to some company systems on Jan. 9 through a social engineering attack that involved a “third-party platform” the company uses for marketing and operations. The company said its customers’ names, email addresses and zip codes, phone numbers and dates of birth were compromised in the attack. As reported by The Verge, this access allowed the hackers to send fraudulent notifications to…
It’s official. Apple has chosen to work with long-time partner Google to power AI capabilities such as Siri. “After careful evaluation, we determined that Google’s technology provides the most capable foundation for Apple Foundation Models, and we are excited about the innovative new experiences this will unlock for our users,” Apple and Google said in a statement. The partnership confirms previous reports about a deal with Google. Neither Apple nor Google have confirmed the price, but previous reports suggest Apple could be paying Google around $1 billion for access to its AI technology. The deal also comes after Apple spent…
January 12, 2026Ravi LakshmananVulnerability/Workflow Automation Threat actors have been observed uploading a set of eight packages to the npm registry masquerading as integrations targeting the n8n workflow automation platform to steal developers’ OAuth credentials. One such package, named ‘n8n-nodes-hfgjf-irtuinvcm-lasdqewriit’, mimics the Google Ads integration, prompting users to link their ad accounts in a seemingly legitimate form and siphon it to a server under the attacker’s control. “This attack represents another expansion of supply chain threats,” Endor Labs said in a report released last week. “Unlike traditional npm malware, which often targets developer credentials, this campaign exploited a workflow automation platform…
For more than two years, an app called ClothOff has been terrorizing young women online, and it’s been extremely difficult to stop. The app has been removed from two major app stores and banned from most social platforms, but is still available on the web and through Telegram bots. In October, Yale Law School’s clinic filed a lawsuit demanding that the app be permanently removed, its owners remove all images, and operations cease completely. But just finding the defendant was difficult. “This organization is incorporated in the British Virgin Islands,” explains Professor John Langford, co-lead solicitor on the case, “but…
The 83rd Golden Globe Awards was a standout night for streaming platforms. Netflix led the pack with seven wins, followed by Apple TV and HBO Max with three awards each and Hulu with one. Among Netflix’s highlights, the hit series “Adolescence” won four awards, including Best Limited Series. The show also won Best Actor in a Miniseries (Stephen Graham), Best Supporting Actor (Owen Cooper), and Best Supporting Actress (Erin Doherty). Netflix’s most-watched title, KPop Demon Hunters, won Best Animated Feature and Best Original Song. Netflix’s Golden Globe sweep comes just as the company is gearing up for its biggest move…
2026 may be less than two weeks away, but a new comet is already leading the way to becoming this year’s “Great Comet.” The much-anticipated ice ball may be visible to the naked eye and is scheduled to make its closest approach to us within four months from now.Scientists discovered the incoming comet, named C/2025 R3 (PanSTARRS), on September 8, 2025, in images captured by the Panoramic Survey Telescope and Rapid Response System (Pan-STARRS), a 5.9-foot (1.8-meter) reflecting telescope atop Hawaii’s Haleakala volcano. It is currently about 216 million miles (348 million kilometers) from Earth, about halfway between the orbits…
Luminar has reached a deal to sell its lidar business to a company called Quantum Computing Inc. for just $22 million unless it gets a better offer by Monday’s deadline of 5 p.m. CT. The lidar maker filed for Chapter 11 bankruptcy protection in December and has already announced plans to sell its semiconductor subsidiary to Quantum Computing for $110 million. The transaction must be approved by a bankruptcy judge in the Southern District of Texas before it can close. Luminar founder and former CEO Austin Russell expressed interest in making a bid for the LIDAR assets and attempted to…
Astronomers at the University of Cambridge have identified one of the oldest known dead galaxies, shedding new light on how some giant galaxies in the young Universe suddenly stop forming stars. Using observations from the James Webb Space Telescope (JWST) and the Atacama Large Millimeter Array (ALMA), researchers have discovered that growing supermassive black holes can slowly starve galaxies rather than completely destroying them. Giant galaxy in the early universe Classified as GS-10578 and nicknamed Pablo’s Galaxy, this galaxy existed just 3 billion years after the Big Bang. Despite being so early in the history of the universe, it is…
Jan 12, 2026Ravie LakshmananHacking News / Cybersecurity This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry points once basic safeguards were ignored. Attackers didn’t need novel tricks. They used what was already exposed and moved in without resistance. Scale amplified the damage. A single weak configuration rippled out to millions. A repeatable flaw worked again and again. Phishing crept into apps people rely on daily, while malware blended into routine system behavior. Different victims, same playbook: look normal, move quickly, spread before alarms go off. For…