Samsung Galaxy A23 5G officially presented

Samsung officially presented the new Galaxy A23 5G smartphone. The model received support for operation in fifth-generation networks. The smartphone is available in configurations with 4 GB,…

Nothing will release two models of wireless headphones

Recently, the business debuted the Nothing Ear headphones (1), but now it was revealed that there would be two other kinds of wireless devices. This is according…

The cheapest Redmi smartphone with 5G gets MIUI 13

Redmi Note 9T was the first smartphone of the Xiaomi sub-brand for the international market, supporting 5G networks. It was one of the cheapest options with such…

iPhone sales record set

Apple reported record profits and 48 million smartphones sold in the second quarter. The American company in the financial report for the second quarter announced the achievement…

Sweatcoin: how to turn steps into a crypt for free

Sweatcoin, a London-based software firm, intends to motivate people to exercise more and create SWEAT, a move-to-earn token, in order to help the world recover. Sweatcoin’s goal…

Nissan and Mitsubishi will jointly release an electric car

Nissan and Mitsubishi have announced a new general-purpose kayak with an all-electric powertrain. The premiere of the novelty is scheduled for May 20. The train will be…

Huawei sales fall for six consecutive quarters

Huawei Technologies’ sales in the first quarter of 2022 were 131 billion yuan. The Chinese company’s sales have been declining over the past six quarters. Huawei’s net…

There’s a new way to install Windows 11

Microsoft released a physical media version of the Windows 11 operating system in a package containing a flash drive. A new installation method has emerged, according to…

The main signs of an attack with the help of social engineering

You are quietly working at the computer, and suddenly a letter arrives in the mail with a message from the employees of a company you know. How…

Methods of social engineering today

An attack on an inexperienced Internet user can follow many different scenarios. Attackers use such human feelings as inattention, curiosity, greed, and credulity, “play” on the qualities…