Initializing...
0%

Blogs

Image for The End of the Password: Why Hackers are Targeting Your Personality Instead
Cybersecurity

The End of the Password: Why Hackers are Targeting Your Personality Instead

Cyber threats have evolved beyond traditional password hacking into psychological manipulation. It explains how attackers now use social engineering, sentiment analysis, and AI-driven digital doppelgängers to exploit human behavior rather than technical systems. The piece highlights the rise of the “disinformation economy” and stresses the importance of building psychological firewalls, practicing digital minimalism, and fostering skepticism to stay safe in 2026.cyber threats have evolved beyond traditional password hacking into psychological manipulation. It explains how attackers now use social engineering, sentiment analysis, and AI-driven digital doppelgängers to exploit human behavior rather than technical systems. The piece highlights the rise of the “disinformation economy” and stresses the importance of building psychological firewalls, practicing digital minimalism, and fostering skepticism to stay safe in 2026.

Dec 22, 2025 by Gauri DhanakshirurRead post
Image for Tsinghua University Breaks a 65-Year Limit: A Faster Alternative to Dijkstra’s Algorithm
Algorithm

Tsinghua University Breaks a 65-Year Limit: A Faster Alternative to Dijkstra’s Algorithm

A major theoretical breakthrough in computer science. Researchers at Tsinghua University developed a new algorithm for the single-source shortest path (SSSP) problem that is asymptotically faster than the 65-year-old Dijkstra's algorithm for large graphs. The new method bypasses the traditional "sorting barrier" but is currently too complex to replace Dijkstra's in everyday applications. Its significance lies in opening new avenues for research in graph algorithms and challenging long-held assumptions.

Dec 22, 2025 by Kartik ShekharRead post
Image for AI in Cybersecurity: A Boon and a Bane
Cybersecurity

AI in Cybersecurity: A Boon and a Bane

The dual role of artificial intelligence in the modern digital security landscape. It explains how AI is weaponized by hackers for faster, more sophisticated attacks (like personalized phishing and deepfake scams), while simultaneously being leveraged by defenders for real-time threat detection, automated response, and predictive security measures. The blog concludes that AI is a powerful tool whose effectiveness depends on responsible use, but cautions that human behavior remains the weakest link in cybersecurity systems.

Dec 22, 2025 by Kartik ShekharRead post
Image for When the Brain Speaks in Sentences: AI and the Rise of Mind Captioning
Cognitive Science

When the Brain Speaks in Sentences: AI and the Rise of Mind Captioning

A new AI-driven technique called mind captioning. This approach converts patterns of brain activity, captured via fMRI scans, into detailed sentences describing what a person is seeing or imagining, even when recalling videos from memory. The article highlights that this breakthrough not only advances the understanding of how the brain forms meaning but also offers practical applications for communication in individuals with language impairments, while emphasizing the ethical need to safeguard mental privacy.

Dec 22, 2025 by Kartik ShekharRead post
Image for The 15% Rule: Why Most of Your LLM is Dead Weight
Sparse AI

The 15% Rule: Why Most of Your LLM is Dead Weight

Discusses the shift in Large Language Models (LLMs) from large parameter counts to efficiency, introducing the "15% Rule"—the concept that only a small fraction of an LLM's weights are actively used. It details strategies for creating "Compact AI," such as SparseGPT for one-shot weight pruning and Reinforced Context Pruning to streamline the thought process. The piece concludes by advocating for elastic models that can dynamically adjust their size based on the task, while also cautioning about the Matthew Effect, which is the risk of losing specialized knowledge when models are reduced.

Dec 22, 2025 by Anvitha Bhat ARead post
Image for Tech Tank 2025
hackathons

Tech Tank 2025

Tech tank was a 12 hour hackathon conducted by acm rvce in collab with gdg RVCE on the 11th & 12th of april 2025. pre hack workshop conducted on 7th april 2025. A shark tank inspired hack

Jul 30, 2025 by Anirudh R KulkarniRead post