ICT Media (Total Posts : 189 )


Hacker found to access Google account without password

Hacker found to access Google account without password

Hackers have found a way to access Google Account without password. In a research, it is seen that hackers can find a way to access the Google account without a password with the help of authentication cookies.This new security vulnerability...

Read More Published on : 2 months ago
The Stock Market in Nepal : Bullish Trend on the banking Sector of Nepal

The Stock Market in Nepal : Bullish Trend on the banking Sector of Nepal

There were 4 trading days in the stock market this week. In the 4 days of trading this week, the market rose on 4 days. The market closed at 2131.49 points this week, which closed at 2018.76 points in the previous week. Based on this,...

Read More Published on : 2 months ago
Startups Policy in Nepal : Startups will be exempted from income tax for 10 years.

Startups Policy in Nepal : Startups will be exempted from income tax for 10 years.

The government is going to give income tax exemption to startups for 10 years. In the National Startup Enterprise Policy 2080, recently passed by the government, it has been mentioned that there will be provision for income tax exemption for ten years after the start...

Read More Published on : 2 months ago
The biggest cybercrime in the world : Israel lost $12 billion annually

The biggest cybercrime in the world : Israel lost $12 billion annually

Artificial intelligence (AI), cyber crime is increasing in the world. Cybercrime is a type of crime in which computers are considered as objects of crime. Cybercrime is criminal activity carried out through computer networks.In other words, cybercrime can be defined...

Read More Published on : 2 months ago
Monetary policy Reviewed FY 2080/081

Monetary policy Reviewed FY 2080/081

Kathmandu. Nepal Rastra Bank has reduced the risk burden of higher purchase loans. While publishing the third quarter review of the monetary policy of the current fiscal year 2080/81, it has been mentioned that the risk burden of vehicle loans under higher purchase will be...

Read More Published on : 2 months ago
New Battery developed for Electric Vehicles with full charges only 10 minutes

New Battery developed for Electric Vehicles with full charges only 10 minutes

The famous battery manufacturer CATL (Contemporary Amperex Technology Company Limited) has developed a new battery for electric vehicles. The company has introduced Shenxing Plus battery, which can drive the vehicle for 600 km after 10 minutes of charging.Car companies use...

Read More Published on : 2 months ago
Smartphones as addictive as drugs - Cyber Report

Smartphones as addictive as drugs - Cyber Report

According to experts, by 2050, 50 percent of people will have my phobia. If children use smartphones for a long time, this problem will appear quickly. Therefore, experts have suggested not to bring digital devices, especially smartphones, too close. Excessive smartphone use can have...

Read More Published on : 2 months ago
What is the next technology to replace smartphones ?

What is the next technology to replace smartphones ?

Internet of Things (IoT): The IoT refers to a network of interconnected devices that can communicate and share data with each other. As IoT devices become more prevalent, they could take over some functions currently performed by smartphones.

Read More Published on : 2 months ago
National AI Policy of Nepal : Nepal Government Formulating National AI Policy

National AI Policy of Nepal : Nepal Government Formulating National AI Policy

The government is going to introduce a national AI policy. On the occasion of National ICT Day on 2024 Secretary of the Ministry of Communication and Information Technology Ramakrishna Subedi said that the National AI Policy is in the process of being formulated. "The National...

Read More Published on : 2 months ago
How can avoid malware from a PDF file ?

How can avoid malware from a PDF file ?

PDFs can contain harmful security threats such as viruses, malware, and trojans. Like many other file types, PDFs can be used to compromise our data and sensitive information if you do not take the proper precautions. We save most of our documents like educational, banking...

Read More Published on : 2 months ago