<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>MASHABLE &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/mashable/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Wed, 12 May 2021 06:20:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Humanity makes great strides in neural technology</title>
		<link>https://en.spress.net/humanity-makes-great-strides-in-neural-technology/</link>
		
		<dc:creator><![CDATA[Sang Trần]]></dc:creator>
		<pubDate>Wed, 12 May 2021 06:20:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Algorithm]]></category>
		<category><![CDATA[brain]]></category>
		<category><![CDATA[Brown University]]></category>
		<category><![CDATA[Click the mouse]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[Cortical]]></category>
		<category><![CDATA[Electrode]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Great]]></category>
		<category><![CDATA[Group of words]]></category>
		<category><![CDATA[Humanity]]></category>
		<category><![CDATA[John Simeral]]></category>
		<category><![CDATA[Mankind]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[Nerve]]></category>
		<category><![CDATA[neural]]></category>
		<category><![CDATA[Neuralink startup]]></category>
		<category><![CDATA[Paralysis]]></category>
		<category><![CDATA[People with disabilities]]></category>
		<category><![CDATA[Relays]]></category>
		<category><![CDATA[Rhode Island]]></category>
		<category><![CDATA[Step forward]]></category>
		<category><![CDATA[strides]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">https://en.spress.net/humanity-makes-great-strides-in-neural-technology/</guid>

					<description><![CDATA[Scientists have created a wireless, operable link between the human brain and the computer, a potential breakthrough for the paralyzed and disabled. A team from Brown University in Rhode Island, USA, has developed a system called BrainGate that allows users to wirelessly connect to a computer through a simple transmitter on top. In their paper [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Scientists have created a wireless, operable link between the human brain and the computer, a potential breakthrough for the paralyzed and disabled.</strong><br />
<span id="more-13300"></span> A team from Brown University in Rhode Island, USA, has developed a system called BrainGate that allows users to wirelessly connect to a computer through a simple transmitter on top.</p>
<p> In their paper in the journal IEEE Trans Transaction on Biomedical Engineering, the team presented the results of trials on two men with spinal cord injury aged 35 and 63. The system works by connecting a signal generator on the user&#8217;s head to an electrode relay in the cortex, through the connection port like wired systems. From there, the tester can move, click and type on the computer keyboard with his or her brain. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_119_38798491/2f61fe98e0da098450cb.jpg" width="625" height="856"> <em> Transmitter connects to a relay located in the brain cortex, helping people to use wireless computers. Photo: BrainGate. </em> In the test, both candidates were able to achieve typing speed and click accuracy on par with a wired system. At the same time, they can use the system continuously for up to 24 hours at home. &#8220;The signals are recorded and transmitted with the same fidelity as a wired system, meaning we can use the same decoding algorithms that we have,&#8221; said John Simeral, who leads the team. used with conventional wired equipment ”. &#8220;The only difference is that we are no longer physically tied to the devices, which opens up new possibilities for future research,&#8221; Simeral added. &#8220;With this system, we are able to look at brain activity at home, over the long term, in a way that was previously almost impossible,&#8221; said Leigh Hochberg, another team member. This gives us more opportunities to create algorithms that allow people with paralysis to move and work. &#8221; According to the <em> Mashable, </em> The aforementioned study is a significant step forward in the field of neural communication, in which the human brain is directly connected to the computer. Recently, big names in the tech world like Facebook and Elon Musk have also expressed interest in this area. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_119_38798491/031025e93babd2f58bba.jpg" width="625" height="352"> <em> Simple device is placed on top of research candidate. Photo: Radiofiji. </em> In 2020, Elon Musk&#8217;s startup Neuralink introduced a pig named Gertrude, with a computer chip implanted in the brain. Or, as before, in 2021, the company also succeeds in implanting a chip into the monkey brain so that the animal can play video games. However, Brown University&#8217;s first human study demonstrates that the technology can be used wirelessly, and it wouldn&#8217;t be surprising if we find wearable devices that allow people with disabilities to communicate with them. continue and work better in the future.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13300</post-id>	</item>
		<item>
		<title>IOS users should immediately turn off AirDrop</title>
		<link>https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</link>
		
		<dc:creator><![CDATA[Nguyễn Hiếu]]></dc:creator>
		<pubDate>Thu, 06 May 2021 07:45:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accuracy]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Hashing]]></category>
		<category><![CDATA[Ignored]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[USB C]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</guid>

					<description><![CDATA[User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch. According to the Mashable The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch.</strong><br />
<span id="more-11904"></span> According to the <em> Mashable</em> The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the Technical University of Darmstadt, have warned Apple about this dangerous vulnerability since May. 2019 but the company still ignored it. About 1.5 billion devices are still unpatched.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/6f599621b063593d0072.jpg" width="625" height="351"> <em> Hackers can obtain sensitive user&#8217;s information through the vulnerability in AirDrop. Photo: TU Darmstadt. </em> &#8220;An attacker could obtain a user&#8217;s phone number and email through AirDrop,&#8221; the team said. &#8220;They just need to use a device with Wi-Fi capable, reach the target at close range to start the mining process by opening the sharing feature on iOS or macOS device.&#8221; According to the <em> 9to5mac</em> There are two steps in the mechanism of AirDrop action leading to this critical vulnerability. First, in order to provide users with the option &#8220;Contacts Only&#8221; in the AirDrop sharing feature, Apple devices silently collect information on devices within the connection range. To see if the &#8220;other party&#8221; is in the contacts list, AirDrop uses a mutual authentication mechanism, comparing the user&#8217;s phone number and email address with the entries in the address book. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/07bce1c4c7862ed87797.jpg" width="625" height="351"> <em> The device authentication step in the directory can be exploited to get information. Photo: Monica Chin. </em> In the next step, data is exchanged for both parties. Despite encryption, Apple uses a relatively weak hashing mechanism. Security experts can decompile the hash using a simple technique like a brute-force attack. The team addressed the AirDrop vulnerability with a more secure approach, they named PrivateDrop. However, Apple did not move after being warned of the risk of personal information leaks and privacy breaches. In the immediate future, experts from the Technical University of Darmstadt advise users to protect themselves by disabling AirDrop discovery in the system settings and not opening the share menu. The detailed results of the study will be presented at the USENIX security Symposium taking place in August. <em> <strong> Why does iPhone not have USB-C port?</strong> </em> <em> In the past 5 years, USB-C has become the suitable connector for a wide variety of devices such as Android phones, laptops and tablets. However, Apple still doesn&#8217;t make iPhones with USB-C ports.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11904</post-id>	</item>
		<item>
		<title>Can I use AirTag to spy on others?</title>
		<link>https://en.spress.net/can-i-use-airtag-to-spy-on-others/</link>
		
		<dc:creator><![CDATA[Song Tử]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 10:17:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[AirTag]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bluetooth]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Find My]]></category>
		<category><![CDATA[Find My network]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IPad Pro M1]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Items]]></category>
		<category><![CDATA[Leave your hand]]></category>
		<category><![CDATA[Loaded]]></category>
		<category><![CDATA[Locate]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[NFC]]></category>
		<category><![CDATA[spring]]></category>
		<category><![CDATA[Spring Loaded]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Wave covering area]]></category>
		<guid isPermaLink="false">https://en.spress.net/can-i-use-airtag-to-spy-on-others/</guid>

					<description><![CDATA[As a finding accessory, the AirTag is designed by Apple to prevent it from being used to spy on others. Launched in the Spring Loaded event taking place at 0:00 on April 21 (Vietnam time), AirTag is a card that helps locate objects. Those who often forget their backpacks, keys, wallets &#8230; can attach AirTag [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>As a finding accessory, the AirTag is designed by Apple to prevent it from being used to spy on others.</strong><br />
<span id="more-8364"></span> Launched in the Spring Loaded event taking place at 0:00 on April 21 (Vietnam time), AirTag is a card that helps locate objects. Those who often forget their backpacks, keys, wallets &#8230; can attach AirTag to find them more easily.</p>
<p> Combined with the Find My app on iPhone, iPad and the global iOS device network (Find My network), AirTag users can locate the device even when the device is out of Bluetooth coverage. “If the AirTag gets lost and out of Bluetooth coverage, the Find My device network can locate it… Using billions of Apple products around the globe, they will catch the lost Bluetooth emitted by the AirTag the owner&#8217;s device location anonymously and privately &#8220;, Apple shares about the AirTag&#8217;s location feature. As such, AirTag does not have GPS. This means the device cannot notify the real-time location to the user. Besides, GPS allows independent operation, no need for range of connection like AirTag. Having range of connectivity means that AirTag may be out of network coverage. If the device is out of Bluetooth coverage and is not near any iPhone, the AirTag will not be able to display the exact location. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_119_38594858/4e67ced4eb9602c85b87.jpg" width="625" height="416"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_119_38594858/f74e7afd5fbfb6e1efae.jpg" width="625" height="351"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_119_38594858/a9f10c28296ac034997b.jpg" width="625" height="351"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_119_38594858/55f3dd40f802115c4813.jpg" width="625" height="833"> <em> In Vietnam, AirTag is priced at VND 790,000. Photo: Apple.</em> In addition, Apple claims the location is not saved in AirTag, data transmitted to the Find My app is also end-to-end encrypted. After being launched by Apple, many people said the Find My network was a loophole, making AirTag can be abused to track other people. However according to the page <em> Mashable</em> Apple has designed a special feature on AirTag to help prevent this. Specifically, Apple describes that iOS devices can detect lost AirTag from its owner. Also plays a notification if an AirTag moves with them from one place to another. If the tracked person is not using an iOS device, the AirTag itself will play an alert bell while on the move to get attention (if it is lost from the owner for a long time). If detecting strange AirTag, users can turn it off by touching iPhone or NFC-enabled device and then following the instructions. However, Apple has not yet said what the ringing will be from AirTag. The time it takes for AirTag to ring the bell since leaving the owner&#8217;s hand has not been revealed. Therefore, using AirTag to spy on others is still worrying experts. <em> <strong> Apple launches new purple iPhone and improved iPad Pro M1</strong> </em> <em> During the Spring Loaded event taking place at 0:00 on April 21 (Vietnam time), Apple introduced a series of products including iPhone 12 purple version, new design iMac, AirTag card, iPad Pro M1.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8364</post-id>	</item>
		<item>
		<title>Tim Cook transformed into a super thief during the Apple launch event</title>
		<link>https://en.spress.net/tim-cook-transformed-into-a-super-thief-during-the-apple-launch-event/</link>
		
		<dc:creator><![CDATA[Phúc Thịnh]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 06:26:31 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Park]]></category>
		<category><![CDATA[chip]]></category>
		<category><![CDATA[Cook]]></category>
		<category><![CDATA[Embody]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[IMac M1]]></category>
		<category><![CDATA[IPad Pro]]></category>
		<category><![CDATA[IPad Pro 2021]]></category>
		<category><![CDATA[IPad Pro M1]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[Liquid Retina XDR]]></category>
		<category><![CDATA[Loaded]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[Mission]]></category>
		<category><![CDATA[Spring Loaded]]></category>
		<category><![CDATA[Super]]></category>
		<category><![CDATA[The Information]]></category>
		<category><![CDATA[thief]]></category>
		<category><![CDATA[Thieves]]></category>
		<category><![CDATA[Tim]]></category>
		<category><![CDATA[Tim Cook]]></category>
		<category><![CDATA[Tracking]]></category>
		<category><![CDATA[transformed]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://en.spress.net/tim-cook-transformed-into-a-super-thief-during-the-apple-launch-event/</guid>

					<description><![CDATA[The action video introducing iPad Pro 2021 makes CEO Tim Cook a meme character on the Internet. &#8216;Mission impossible&#8217; by Tim Cook The video introduces the M1 Pro 2021&#8217;s M1 processor, impressing with the Mission Impossible movie-like action scene. The thief revealed at the end of the video is CEO Tim Cook. In the video [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The action video introducing iPad Pro 2021 makes CEO Tim Cook a meme character on the Internet.</strong><br />
<span id="more-8252"></span> </p>
<p> <em> <strong> &#8216;Mission impossible&#8217; by Tim Cook</strong> </em> <em> The video introduces the M1 Pro 2021&#8217;s M1 processor, impressing with the Mission Impossible movie-like action scene. The thief revealed at the end of the video is CEO Tim Cook.</em> In the video of the iPad Pro 2021 launch, CEO Tim Cook (or stuntman) wears long hair running from the roof of the Apple Park building, cuts the glass door to break in, opens the ventilation door, and then swings down to the secret cellar MacBook filled with honey. After going into the basement, the character in the video deftly crossed the laser fence, picked up the M1 chip from the MacBook and then attached it to the iPad Pro. At the end of the video, the character takes off his wig, reveals his identity as CEO Tim Cook, and then smiles at the new iPad. According to the <em> The Verge</em> , the video posted by Apple titled &#8220;Mission Implausible&#8221; to introduce M1 chip on the new iPad Pro. The action scene in the video makes many people think of Tom Cruise in the famous movie <em> Mission Impossible</em> . The iPad Pro 2021 introductory video received much attention. According to the <em> Mashable</em> The image of CEO Tim Cook smiling quickly became the subject of meme photos on the Internet. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_119_38594444/9483fe36db74322a6b65.gif" width="625" height="352"> <em> CEO Tim Cook&#8217;s smile at the end of the video became the subject of a series of photoshoots. Photo: The Verge. </em> “Tim is looking at my wallet,” says YouTuber tech <em> DeVante Chisolm</em> happily commenting on Twitter. Reporter Alex Heath&#8217;s <em> The Information </em> “This is the look on Tim&#8217;s face when Apple forces all apps to comply with App Tracking Transperancy on iOS”. iPad Pro 2021 is the product to be expected in last night&#8217;s event. This is the first iPad equipped with M1, processor chip developed by Apple on ARM architecture. The 12.9-inch version uses a Mini LED display, called the Liquid Retina XDR, with more than 10,000 small LEDs placed below the screen, helping to create independent bright areas similar to the OLED display. For the first time an iPad has an option of 2 TB storage, allowing more photos, videos and apps to be saved than ever before. This is also the first Apple iPad to support 5G network. In Vietnam, the 12.9-inch 128 GB iPad Pro M1 regular version, the 5G version, is priced at 30 and 34 million dong, respectively. The most advanced version of the iPad Pro M1 with 2 TB of internal memory costs 64 million VND. This is the highest price for an iPad ever. In addition to iPad Pro 2021, Spring Loaded event taking place at 0:00, 21/4 (Vietnam time) also has the appearance of iMac M1, Apple TV 4K upgraded, AirTag accessories, purple iPhone 12 and translation Podcast subscription service. <em> <strong> Apple launches new purple iPhone and improved iPad Pro M1</strong> </em> <em> During the Spring Loaded event taking place at 0:00 on April 21 (Vietnam time), Apple introduced a series of products including iPhone 12 purple version, new design iMac, AirTag card, iPad Pro M1.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8252</post-id>	</item>
	</channel>
</rss>