Mas@jlai.lu to Technology@lemmy.worldEnglish · 20 hours agoeSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacksplus-squarethehackernews.comexternal-linkmessage-square1linkfedilinkarrow-up138arrow-down11
arrow-up137arrow-down1external-linkeSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacksplus-squarethehackernews.comMas@jlai.lu to Technology@lemmy.worldEnglish · 20 hours agomessage-square1linkfedilink
Mas@jlai.lu to Technology@lemmy.worldEnglish · 2 days agoChinese Scientists Create Cyborg Bees That Can Be Controlled Like Drones for Undercover Military Missionsplus-squarefuturism.comexternal-linkmessage-square26linkfedilinkarrow-up1189arrow-down17
arrow-up1182arrow-down1external-linkChinese Scientists Create Cyborg Bees That Can Be Controlled Like Drones for Undercover Military Missionsplus-squarefuturism.comMas@jlai.lu to Technology@lemmy.worldEnglish · 2 days agomessage-square26linkfedilink
Mas@jlai.lu to Technology@beehaw.org · 2 days agoChinese Scientists Create Cyborg Bees That Can Be Controlled Like Drones for Undercover Military Missionsplus-squarefuturism.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Scientists Create Cyborg Bees That Can Be Controlled Like Drones for Undercover Military Missionsplus-squarefuturism.comMas@jlai.lu to Technology@beehaw.org · 2 days agomessage-square0linkfedilink