Will homes on the Moon and Mars be made of fungi?

Will homes on the Moon and Mars be made of fungi?

Science fiction often imagines our future on Mars and other planets as run by machines, with metallic cities and flying cars rising above dunes of red sand. But the reality may be even stranger – and “greener”. Instead of habitats made of metal and...
Microsoft plans to eliminate its carbon footprint

Microsoft plans to eliminate its carbon footprint

Microsoft has announced an ambitious goal and a new plan to reduce and ultimately remove its carbon footprint. By 2030 Microsoft will be carbon negative, and by 2050 will remove from the environment all the carbon the company has emitted either directly or by...
The past decade was Earth’s warmest ever

The past decade was Earth’s warmest ever

Earth’s global surface temperatures in 2019 were the second warmest since modern recordkeeping began in 1880, according to independent analyses by NASA and the National Oceanic and Atmospheric Administration (NOAA). Globally, 2019 temperatures were second only...
Security still plays second fiddle when it comes to budget

Security still plays second fiddle when it comes to budget

The vast majority (89%) of chief information security officers (CISO) are regularly summoned by the board of directors to provide recommendations for the business. But, despite a “direct line” with top bosses, this does not necessarily result in dedicated...
Human biology could be key to design in 3D printing

Human biology could be key to design in 3D printing

Engineers need to get more creative in their approach to design and additive manufacturing (AM) systems, by taking inspiration from the way humans grow and develop. In a new paper, published in The International Journal of Advanced Manufacturing Technology, teams from...
SA banks under attack from Russia hackers

SA banks under attack from Russia hackers

Kaspersky security researchers have reported on thousands of notifications of attacks on major banks located in the sub-Saharan Africa (SSA) region. The malware used in the attacks indicates that the threat actors are most likely to be an infamous Silence hacking...