Chandrayan 2 “Vikram Lander” Has been traced

Vikram lander has been located on the moon’s surface Isro Cheif sivan as saying today. ISRO had lost contact with “Vikram” lander , one of three components of the Chandrayaan 2 spacecraft, on Saturday morning while the lander was attempting a historic soft landing near the south pole of the moon. The lander stopped transmitting …

Samsung Galaxy Note 10+ Review

Do you really prefer a stylish to go with your new phone? This is the big question when you have to answer when your ready with cash for your new flagship Android phone. Samsung Galaxy note 10+ it is surely a futuristic android phone compare to other phones in the market if a phone come …

India’s no first use nuclear theology rooted in wars country might fight, touted to be a tactic to discourage enemy strikes

Defense Minister Rajnath Singh said that India’s position on the first use (NFU) of nuclear weapons could change in the future, even though it remains committed to the doctrine now, causing controversy with global consequences. It is probably not wise to read too much in the statement, one that simply reflects a long-standing and unfinished …

What Is Epilepsy?

Epilepsy is a chronic condition characterized by recurrent seizures that can range from brief attention lapses or muscle jerks to severe and prolonged seizures. According to the World Health Organization, more than 50 million people worldwide have epilepsy and 80% of those people live in developing regions. The Centers for Disease Control and Prevention (CDC) …

Microsoft Updates Privacy Policy To Admit Listening To Voice Data

Following the discovery that Microsoft contractors sometimes listen to translated Skype calls, Redmond has updated its privacy policy. The updated policy now admits that the software giant does collect user voice data via its staff and contractors. The admission comes after a contractor revealed to Motherboard last week that Microsoft workers occasionally listen to real …

Hackers can intercept sound of your typing to access your data

Using only a smartphone, hackers can listen to what is being written with remarkable precision and access their personal information. According to researchers at the Southern Methodist University (SMU) based in Dallas, it is possible to access your information in a more subtle way: by using a nearby smartphone to intercept the sound of your …