July 5, 2023

Meta competes with Twitter by using the competing microblogging service Threads.

 In more than a hundred nations, Threads is available for free download through the Google Play Store and the Apple App Store.



The business claims its new microblogging service, called Meta, is Instagram's "text-based conversation app." Meta debuted the service on Thursday. Threads is viewed as a direct competitor to Twitter, which has undergone significant changes since Elon Musk acquired the company and has witnessed a large influx of people moving to alternatives like Bluesky and Mastodon.


In more than a hundred nations, Threads is available for free download through the Google Play Store and the Apple App Store. Users may send brief messages on the text-based social messaging app, and other users can like, share, and comment on them. Posts may contain up to 500 characters, links, images, and videos that are no longer than five minutes.


Everything you need to know about the newest Twitter competitor, Instagram Threads


Because the app is based on the Instagram network, users may easily reuse their Instagram login. It automatically follows the Instagram users you already follow. You may also personalise your Threads profile on Meta.

Meta said earlier this year that it was developing a text-based platform. Bluesky, Mastodon, and Twitter are supported by Meta's Threads. Users may share text, images, and videos with their followers on all of those networks. The social media behemoth claimed that Threads was created "with tools to enable positive, productive conversations," and users would have control over who mentions them or replies to them within the programme.

Why is there a 'gravity hole' in the Indian Ocean, exactly?

The enigmatic "gravity hole" in the Indian Ocean may have an explanation, according to researchers from the Indian Institute of Science.



Although it is simple to picture the Earth as a flawless sphere with constant gravity, that is far from the truth. Contrary to popular belief, our world bulges near the equator and is flat at the poles. Its gravity isn't constant throughout, either. For instance, researchers have finally discovered why there is a significant "gravity hole" in the Indian Ocean.


It may be easy to imagine the Earth as a perfect sphere with constant gravity, but that is far from the reality. Contrary to common assumption, our earth is flat at the poles and bulges at the equator. Even its gravity fluctuates over time. For instance, scientists have now determined the cause of the large "gravity hole" in the Indian Ocean.


The Indian Ocean Geoid Low (IOGL) was first identified in 1948 by Dutch geophysicist Felix Andries Vening Meinesz during a study of the ocean. Since then, it has been supported by more ship-based research and satellite-based observations. However, scientists haven't really been able to establish definitively why it occurs. Up till this point.


July 4, 2023

USB drive explosives refocus attention on protecting businesses' back doors from "phygital attacks."

 A physical attack might create havoc and result in severe injuries if you're not careful. Veteran of the US Army Will Plummer highlights the dangers of physical attacks and how businesses may protect themselves.



Lenin Artieda, an Ecuadorian journalist, thought March 20 of this year was just another Monday. But normalcy wouldn't last for very long. He received a parcel addressed to him with a little USB drive inside. He unwrapped the disc and connected it into his computer without giving it a second thought. The gadget blew up, hurting the journalist. 


Authorities in Ecuador launched a terrorist probe as a result of the event. At least five more similar envelopes were mailed to Ecuadorian media outlets around the same time, proving that this was not an isolated event. These unnerving episodes of explosive USB drives targeting journalists in Ecuador have created a new vista in the global danger landscape: physical attacks. This is because the physical and digital worlds are fast converging. 


When a gadget, such a USB stick or small computer, is used to start a cyberattack and uses a physical point of entry, the assault is said to be "phygital." "In this case, a digital device was used to mask a physical threat, but it could have just as easily been the target of a cyberattack," says Will Plummer, a 25-year US Army veteran who serves as the Chief Security Officer for RaySecur, a company that develops next-generation mail screening technology. 

USB drive explosives refocus attention on protecting businesses' back doors from "phygital attacks."

 A physical attack might create havoc and result in severe injuries if you're not careful. Veteran of the US Army Will Plummer highlights the dangers of physical attacks and how businesses may protect themselves.



Lenin Artieda, an Ecuadorian journalist, thought March 20 of this year was just another Monday. But normalcy wouldn't last for very long. He received a parcel addressed to him with a little USB drive inside. He unwrapped the disc and connected it into his computer without giving it a second thought. The gadget blew up, hurting the journalist. 


Authorities in Ecuador launched a terrorist probe as a result of the event. At least five more similar envelopes were mailed to Ecuadorian media outlets around the same time, proving that this was not an isolated event. These unnerving episodes of explosive USB drives targeting journalists in Ecuador have created a new vista in the global danger landscape: physical attacks. This is because the physical and digital worlds are fast converging. 


When a gadget, such a USB stick or small computer, is used to start a cyberattack and uses a physical point of entry, the assault is said to be "phygital." "In this case, a digital device was used to mask a physical threat, but it could have just as easily been the target of a cyberattack," says Will Plummer, a 25-year US Army veteran who serves as the Chief Security Officer for RaySecur, a company that develops next-generation mail screening technology. When a gadget, such a USB stick or small computer, is used to start a cyberattack and uses a physical point of entry, the assault is said to be "phygital." "In this case, a digital device was used to mask a physical threat, but it could have just as easily been the target of a cyberattack," says Will Plummer, a 25-year US Army veteran who serves as the Chief Security Officer for RaySecur, a company that develops next-generation mail screening technology. vvvvvvv


July 3, 2023

TweetDeck access requires users to be verified, according to Twitter

The change was made shortly after Musk announced that both verified and unverified users will only be able to view a certain amount of posts each day "to address extreme levels of data scraping & system manipulation."



TweetDeck will soon require users to be verified on Twitter, the social media platform announced in a post on Monday.


The corporation stated that the adjustment will become effective in 30 days.


In a tweet describing an updated TweetDeck with additional capabilities, Twitter made the news. It was not known if Twitter will charge customers for both the new and old TweetDeck versions. Requests for comment from Twitter did not immediately receive a response.

A financial boost for Twitter, which has struggled to maintain advertising income under the control of billionaire Elon Musk, might result from charging for TweetDeck, which was previously free and is extensively used by companies and news organisations to efficiently monitor content.


The change was made shortly after Musk announced that both verified and unverified users will only be able to view a certain amount of posts each day "to address extreme levels of data scraping & system manipulation."


His statement drew a ferocious outcry from Twitter users, and advertising experts said it would hurt the new CEO Linda Yaccarino, who took over the position last month.

\