Sony Hints at ‘Super Fungible Tokens’ in Latest Patent Application: All You Need to Know

Sony is trying to carve a new niche within the NFT sector, as hinted by the company’s recent patent application. This new category of digital collectibles that Sony is planning to foray into, via its games, is called ‘Super Fungible Tokens’. The NFT sector, due to its highly speculative nature, has seen several ups and … Read more

Apple Patent Application Describes a Smart Ring That Can Control Multiple Devices

Apple Smart Ring has been in the rumours for quite sometime, and a new patent application has shed more light on the kind of device the Cupertino-based tech giant has in mind. As per the application, the smart ring might not be focused only on health features but may also offer a new way to … Read more

Apple’s Latest Patent Application Reveals New Touchscreen iMac Design for Artists With Wireless Charging Station

In the recent past, Apple has reserved all of its touchscreen software interactions to its iPhones and iPads (iOS and iPadOS) while limiting its iMac and MacBook (macOS) software interactions to a mouse, keyboard and trackpad. While there have been many hardware mods designed to turn the iMac’s interface into a touchscreen one, these would … Read more

Microsoft’s Foldable Smartphone Could Be In Development, Suggests New Patent Application

Microsoft’s latest patent application suggests that the company could be developing a technology for a foldable smartphone that will be quite different from its Surface Duo lineup. The company could try its hand at a ‘true foldable’ design where a single foldable panel is used instead of two separate displays connected by a hinge. The … Read more

The Ultimate Guide to Web Application Penetration Testing

Introduction Web Application Penetration Testing (often abbreviated as Web App Pentesting) is the practice of simulating cyberattacks on a web application to identify security weaknesses, vulnerabilities, and potential attack vectors. The goal of pentesting is to uncover security flaws that could be exploited by malicious actors, including vulnerabilities such as poor authentication practices, insecure storage … Read more