How much do video games earn every minute?

0
Fortnite, League of Legends, Overwatch, Apex Legends, and whoever has more put more. These are just some of the most popular games of the...

Sony Xperia 1 II: pre-orders starting today

0
Today it is possible to pre-order the new Sony Xperia 1 II. It features ultra-fast 5G connectivity and a triple lens camera with many...
Portable mask that does not allow air entry with coronavirus – The Media Blog

Portable mask that does not allow air entry with coronavirus –...

0
An artifact that ensures you do not receive polluted air was recently released by the Canadian firm Vyzr Technologies. The company claims that this...

Australia, the world’s fastest Internet connection

0
Data travels up to 44.2 terabits per second. The results of the experiment, which took place in Melbourne, were published in the journal Nature...

What apps do protesters use in the U.S.? Discovering Signal

0
Signal is an encrypted messaging app very similar to WhatsApp which has seen an increase in users in recent days following protests for the...

How to hide old and embarrassing posts on facebook

0
Facebook announced the arrival of an improvement for the tool "Manage Activities" which allows users to...

Fake news about the coronavirus, Whatsapp limits the “chains”

0
The instant messaging system arranges for the forwarding of dubious information to chats at a time: "More space for private conversations"

Immune app: how it works and how to download anti-coronavirus to...

0
After months of experimentation it has finally arrived the Immuni app which will help citizens in Italy to check, track and warn in case...

Facebook Messenger supports the new Bubbles API

0
Google introduced the new one Bubbles API with Android 10 Beta 2 in April last year. The API was initially offered as an activation...

Metamorfo arrives, malware spread via malspam

0
Bitdefender: Cybercrime has developed Metamorfo, a malware channeled via malspam and mainly targets Brazil. To spread, use the Dynamic-link library (DLL) hijacking techniqueIt's called...