Contents:
- Scientists have shown a neurochip that could become the heart of Web 3.0
- Google has shown AI that builds 3D worlds based on descriptions
- It's hard to believe: Windows 95 is already 30 years old
- ESET has discovered PromptLock, an AI-powered ransomware prototype
- The creator of Rapper Bot, one of the most powerful botnets in history, has been detained
- Remember the Briton who threw a disk with bitcoins into a landfill? So, he was forbidden to dig, and there will only be a film.
- Useful sites worth visiting
- Interesting things on Reddit

Learn for free: "Neural Networks. A Practical Course"
Learn moreWith the end of the holiday season, we sum up the results of August. In this issue, we explore a microwave-based neural chip, dangerous AI ransomware, photorealistic 3D worlds from Google, the Windows 95 anniversary, and the story of a British man who lost his Bitcoin in a landfill. These events highlight significant advances in technology and current cybersecurity risks, as well as remind us of the importance of digital assets in the modern world.
Content is an important element of a webpage, helping users quickly navigate information. Proper content design improves user experience and facilitates better content perception. It is important that content is clear, logical, and easy to understand. This will help not only readers but also search engines better index the page. Use keywords related to the topic to improve SEO. It is also worth adding links to relevant sections to facilitate navigation. Remember that well-structured content attracts more visitors and holds their attention.
- Scientists have demonstrated a neurochip that could become the heart of Web 3.0
- Google has demonstrated AI that builds 3D worlds based on descriptions
- It's hard to believe: Windows 95 is already 30 years old
- ESET has discovered PromptLock, a prototype ransomware virus based on AI
- The creator of Rapper Bot, one of the most powerful botnets in history, has been detained
- Remember the Briton who threw a disk with bitcoins into a landfill? So, he was forbidden to dig, and there will only be a film.
- Useful sites worth visiting
- Interesting things on Reddit
Scientists have shown a neurochip that could become the heart of Web 3.0
Engineers from Cornell University have developed an analog neurochip called a "microwave brain." This innovative chip is capable of simultaneously processing data and transmitting it wirelessly. For example, it can recognize objects in images and instantly send the results to other devices, without Wi-Fi modules and additional electronics. The development of such a device opens new horizons in the field of wireless data transmission and information processing, which can significantly improve the efficiency of various technologies and applications.
At the moment, this is a prototype, but if the technology goes beyond laboratory conditions, it could change the processor market in the next 5-10 years. With such a chip, smartphones and smartwatches will be able to operate 2-3 times longer without recharging. Internet of Things devices will become more compact, and self-driving cars will be able to analyze their environment in real time and make decisions with minimal delays. This innovation promises to significantly improve the efficiency and autonomy of modern technologies. Neural chips could become an important element of Web 3.0 architecture. Modern decentralized systems lack energy-efficient solutions for local processing of large volumes of data. The "microwave brain" provides this capability: it can verify transactions, execute smart contracts, and tokenize assets directly on the device, without accessing cloud data centers. This makes neurochips key to improving performance and security in the Web 3.0 ecosystem.

Read also:
Web 3.0: The Impact of Blockchain and Cryptocurrency on the Future of the Internet
Web 3.0 is a new The internet era, in which blockchain and cryptocurrencies play a key role in the creation of decentralized platforms and services. This internet transformation is aimed at ensuring greater security, privacy, and user control over their data. Blockchain allows for the creation of transparent and immutable records, making online interactions more reliable. Cryptocurrencies, in turn, provide new financial models and opportunities for users. They simplify transactions, eliminate the need for intermediaries, and allow users to interact directly with each other. With growing distrust of centralized systems, these technologies are becoming increasingly relevant. Web 3.0 also facilitates the development of smart contracts, which automate the fulfillment of obligations between parties, minimizing risks and increasing efficiency. Such contracts can be used in various fields, from finance to real estate, opening up new horizons for business. The integration of blockchain and cryptocurrencies makes the internet more open and accessible. Users are given the opportunity to participate in the governance of decentralized projects and receive rewards for their actions. Web 3.0 is thus shaping a new society that values transparency, security, and decentralization.
Google Shows Off AI That Builds 3D Worlds Based on Descriptions
Google's DeepMind division announced Genie 3, an innovative model capable of creating detailed, interactive 3D environments based on text descriptions. The key feature of Genie 3 is the ability for the user to move freely within the generated world in real time. This model provides visualization in 720p resolution and 24 frames per second, allowing users to fully immerse themselves in the created environments. Genie 3 opens up new horizons in virtual reality interaction and has the potential to significantly change approaches to game and educational app development.
The developers claim that with Genie 3, you can quickly and efficiently create full-fledged prototypes of game locations based on text descriptions. For example, enter "medieval castle on the edge of a cliff," and the model will create a detailed 3D scene. Furthermore, you can explore the created location and make changes in real time, significantly simplifying the game development process. This feature makes Genie 3 an indispensable tool for game designers striving to effectively create unique game worlds.
If you're missing a bridge over a chasm or torches on the walls, simply mention it in your request. In programming, there's a concept called "vibe coding," and in game design, there's a similar phenomenon called "vibe game design." This approach allows you to more accurately convey the atmosphere and emotions you want in a game. By incorporating details like environmental elements and visual accents, you can significantly improve the perception of the game space.
Access to Genie 3 is currently limited and is only available through a closed research program. We will closely monitor the updates and test all the features as soon as the first version is available.

It's hard to believe: Windows 95 is already 30 years old
August 24, 2025, marks 30 years since the release of the legendary Windows 95 operating system. This OS became a landmark event in the world of technology, introducing users to such important elements as the Start button, the taskbar, and iconic icons, including the Recycle Bin for deleting files and My Computer for accessing drives and connected devices. Windows 95 not only changed the interface of operating systems, but also made the computer more accessible and convenient for a wide range of users.
Windows 95 was a revolutionary operating system, combining 32-bit technology, multitasking, and a user-friendly interface that was significantly different from previous versions of the OS. One of the key advantages of Windows 95 was its simplified interaction with the computer. Users no longer needed to learn the command line, as they could easily drag and drop files and install programs using the Setup Wizard. For example, installing a new game simply required inserting a CD and following step-by-step instructions, which was significantly easier than entering complex commands in MS-DOS. Windows 95 made technology more accessible and user-friendly for a wider audience, which contributed to its popularity and successful market adoption.
In honor of Windows 95's 30th anniversary, we offer you the opportunity to run an emulator of this legendary operating system right in your browser. It's a great way to reminisce about one of Microsoft's most iconic products. If the company hadn't strived to dominate the market and develop a system with such an intuitive interface, we might still be using text commands in a black console and considering it the norm. Take this chance to remember what it was like to work with Windows 95 and appreciate how far technology has come.

ESET Discovers PromptLock, an AI-Powered Ransomware Prototype
ESET researchers have announced the emergence of PromptLock, the first known ransomware to actively use artificial intelligence (AI) to carry out attacks. Unlike traditional ransomware, PromptLock does not contain pre-written malicious code. Instead, it includes special prompts that interact with a local neural network on the infected device. This innovation makes PromptLock more adaptive and difficult to detect, highlighting the need for enhanced cybersecurity and updated protection methods against such threats.
PromptLock interacts with artificial intelligence (AI) installed on the device, which automatically creates malicious scripts in the Lua language. These scripts scan the system, identify valuable files, and encrypt them, which can lead to data loss and serious consequences for users.
Currently, this is not a full-fledged virus, but only a prototype using simple encryption algorithms. Mass attacks have not yet been recorded, but experts are concerned about future versions of these threats. They are expected to be able to bypass antivirus programs, adapt to existing defenses, and disguise themselves as legitimate software. It is important to hope for the development of a reliable AI antivirus that can effectively counter such threats.

Read also:
Malware, or malware, poses a serious threat to users and organizations. There are several types of malware, each with its own characteristics and purposes. These include viruses, worms, Trojans, spyware, rootkits, and exploits.
Viruses can infect files and programs, copying themselves to devices and causing data damage. Worms, unlike viruses, self-propagate across networks, making them particularly dangerous. Trojans disguise themselves as legitimate software, deceiving users and allowing attackers to access the system. Spyware collects information about the user without their knowledge, which can lead to the leakage of confidential data. Rootkits hide their presence on the system, making detection and removal difficult. Exploits exploit vulnerabilities in software to perform malicious actions.
Examples of malware-related attacks include the distribution of viruses via email, the use of vulnerabilities in web applications to introduce worms, and attacks using Trojans to steal credentials. Given the ever-evolving cyberthreat landscape, it's important to stay informed about the latest trends and take steps to protect against malware, including regular software updates and using antivirus solutions.
Creator of Rapper Bot, One of the Most Powerful Botnets in History, Arrested
American law enforcement has arrested 22-year-old Ethan Foltz of Oregon, who is accused of creating and operating the Rapper Bot botnet. This network operated on a DDoS-for-hire model, allowing users to pay to organize massive attacks on websites and online services. The entire botnet infrastructure has now been destroyed, and Foltz faces up to ten years in prison.
Rapper Bot began its activity in 2021, primarily targeting home routers, DVRs, and other IoT devices with insufficient security and outdated firmware. Budget models from brands like TP-Link and Netgear, which had not received current updates, became easy targets for malware. Due to the large number of vulnerable devices, the botnet was able to form an army of approximately 65,000–95,000 infected machines.
In 2025, Rapper Bot carried out over 370,000 attacks on 18,000 targets in 80 countries. The power of individual attacks ranged from 3 to 6 Tbps, which is 60 times greater than standard DDoS attacks, which reach 50–100 Gbps. This incredible power made it possible to disrupt the infrastructure of even large companies with highly effective security systems. For example, in February 2025, a botnet paralyzed the operations of several European banks for four hours, demonstrating the threat such cyberattacks pose to the financial sector.

Read more:
DDoS attacks, or distributed denial-of-service attacks, are malicious attacks against servers, networks, or services in order to overload them. These attacks are carried out using multiple compromised devices that simultaneously send requests to the target system, rendering it unavailable. DDoS attacks rely on botnets—networks of infected computers that execute the attacker's commands.
DDoS attack protection is challenging due to the variety of methods used and the constant evolution of technology. Attackers can employ various techniques, such as traffic flooding, sending malicious packets, or excessive requests, making it difficult to predict and prevent attacks. Furthermore, scaling protection requires significant resources and time, leaving many organizations vulnerable.
Effective DDoS attack protection involves the use of multi-layered security systems, traffic monitoring, and the implementation of specialized solutions that can filter attacks, reducing their impact on operating systems. It's important to understand that complete protection is impossible, but risk minimization and rapid response to incidents can significantly reduce the impact of DDoS attacks.
Remember the Brit who threw a disk with bitcoins in a landfill? Well, he was banned from digging, and there will only be a movie
In 2009, James Howells mined about 8,000 bitcoins, storing them on the hard drive of his laptop. Unfortunately, in 2013, he accidentally threw the disk along with old equipment while cleaning. The hard drive ended up in a municipal landfill in Newport, lost under tons of trash. This story has become a symbol of loss in the world of cryptocurrency, highlighting the importance of secure storage of digital assets and the need for careful handling of the equipment on which they are stored.
Since then, Howells has repeatedly tried to regain access to his cryptocurrency coins. He approached the City of Newport, offering to fund the excavation and share a significant portion of the recovered funds with the city. Howells also planned to use artificial intelligence to analyze images of the landfill and to employ robots for precise excavations. However, his initiatives were always rejected. In 2025, a court finally ruled that the hard drive had become the property of the landfill, ending his efforts to recover his lost assets.
The story seemed to have come to an end, but James made an important statement.
The authorities may have physical access to the hard drive, but the digital assets stored on it remain mine. According to the law, 8,000 bitcoins belong to me. Anyone can check my wallet balance at any time.
Howells is considering tokenizing his bitcoins, which would involve issuing new digital coins representing shares in his lost crypto assets. For example, he could create 1,000 tokens, each representing 0.1% of the total 8,000 BTC. Owners of these tokens would be eligible to claim their share if James manages to recover the hard drive containing the cryptocurrency. Tokenization could attract investors and provide an opportunity to obtain liquidity for lost assets, which is becoming increasingly important given the growing interest in cryptocurrencies.
It's unclear whether there will be buyers for Howells' tokens, but there is encouraging news: Lebul has acquired the film rights to his story and plans to produce a film about the failed crypto mogul. This will give him the opportunity to compensate for some of his losses and attract attention to his name in the world of cryptocurrencies.

Useful sites worth visiting
DB Quacks is a browser game where learning SQL queries is done through the help of a fascinating duck character. The first chapter of the game introduces you to the context and the basics, and subsequent levels offer quests with tasks and interactive dialogues. Instead of a traditional explanation, such as the query SELECT * FROM users WHERE age > 18, you are given the task: "Help the duck find all the adult ducklings," which allows you to write the SQL query yourself. This game format significantly simplifies the process of memorizing commands and makes learning more effective compared to classic textbooks.

CodinGame is an interactive programming learning platform that supports languages such as Python, JavaScript, and Java. Users solve problems in the form of mini-games and challenges, allowing them to not only develop their coding skills but also participate in the creation of bots for battle. The platform also hosts competitions where you can test your skills and climb the leaderboards. CodinGame offers a unique way to learn programming, combining fun and practice.
Instead of the standard "Sort an array in ascending order" task, you may be offered more complex and interesting tasks, such as programming a robot's route through a maze. You may also be tasked with developing an algorithm for resource collectors, which must deliver supplies to allies while avoiding enemy patrols. These tasks require not only programming skills but also a creative approach to problem solving, which makes them more engaging and useful for developing logical thinking.

Exercism is an interactive platform offering a wide range of exercises in major programming languages. In the Python track, you can start with a simple "Hello, World!" task and gradually master more complex concepts. Each exercise has quizzes, allowing you to verify the correctness of your code. If you have any questions, you can ask the community for help on Discord or consult the supporting materials available for all tasks. Exercism provides an excellent opportunity to learn programming and improve your skills.

Reworked text:
Pay attention to the following materials:
Games for programmers: more than 20 puzzles that will help you master programming and develop logical thinking. These games are not only fun but also useful for paving the way to a successful career in IT. They will help improve coding skills, teach you how to solve complex problems, and develop a creative approach to programming. Take this opportunity to improve your knowledge and skills by playing exciting puzzles that will make the learning process interesting and productive.
Interesting on Reddit
The r/it subreddit is actively discussing the reason why more and more people are deciding to reduce their time online. Participants in the discussion point to several key factors. First, fatigue from constant messaging and notifications is becoming increasingly noticeable. Second, growing concerns about digital privacy and security are causing concern. Finally, many are nostalgic for the "simpler" internet, where communication and information were less overwhelming. These aspects are forcing users to rethink their digital behavior and strive for a more mindful use of online space.
In many cases, offline time is perceived as a new luxury. In today's world, not everyone can afford to remain unavailable 24/7. IT professionals, freelancers, customer service representatives, and even healthcare workers are often required to remain connected outside of work hours. This makes a full-fledged digital detox a virtually unattainable privilege. It's important to realize that time spent away from screens can significantly impact your mental and physical health, as well as increase your productivity at work.

Read also:
Phil Rankin: "I have two jobs, and this helps me avoid "Burnout"
Phil Ranjin shares his experience, explaining how having two jobs contributes to his emotional and professional well-being. By working on two fronts, he finds variety and new challenges, which allows him to avoid the routine and monotony that often lead to burnout. This approach helps him maintain a work-life balance, as well as maintain a high level of motivation and creativity. Importantly, properly distributing time and energy between multiple projects can be an effective strategy for preventing professional burnout.
In the r/PromptEngineering community, a user presented the results of his three-week study, during which he analyzed ChatGPT responses. During the analysis, he concluded that the quality of the model's responses is significantly improved if he instructs it to reason step by step before providing a final answer. This method could be a useful tool for users seeking more accurate and informed answers from artificial intelligence.
Write a function to sort an array of numbers, explaining in detail the algorithm chosen and its time complexity. Finally, provide the completed code. This approach, dubbed "structured prompting" by the author, allows the model to sequentially interpret the question, analyze the details, build a logical chain of reasoning, and formulate a final answer.
ChatGPT should be treated as a promising student. First, it rephrases the question in its own words, analyzes the details, builds a logical chain of reasoning, and then provides an answer. This method can be effective in a variety of fields, including programming, writing, and solving complex mathematical problems. This approach is worth testing to achieve better results.

Read also:
Prompts for neural networks: how to optimally formulate queries to ChatGPT and other neural networks
Correct formulation of queries to Neural networks like ChatGPT play a key role in obtaining high-quality and relevant answers. Effective prompts help achieve the best results, allowing users to maximize the capabilities of AI.
There are several aspects to consider when creating an effective query. First, formulate your questions clearly and unambiguously. Use clear and simple words to avoid misunderstandings. Second, try to be specific. Clarify what information you are looking for and add context if necessary. For example, instead of a general question like "Tell me about dogs," ask a more specific question such as "Which dog breeds are suitable for apartment living?"
It is also helpful to use examples and analogies. This helps the neural network better understand your expectations and provide a more relevant answer. Feel free to experiment with query formulations to find out which ones produce the most satisfying results.
Also, consider the capabilities of the neural network. Some platforms may be better suited for certain topics or types of queries. Explore the functionality of ChatGPT and other neural networks to understand their strengths and limitations.
Finally, writing good prompts for neural networks is an art that requires practice and patience. By following these guidelines, you can significantly improve the quality of your interactions with AI and receive more accurate and useful responses.
Learn more about programming and web development in our Telegram channel. Subscribe to stay up-to-date with interesting materials and helpful tips!
Rework the text, maintaining its main topic, and optimize it for SEO. Add information, but avoid unnecessary details. Remove emojis and unnecessary symbols. Avoid using bullet points or bullet points. The text should be clear and consistent.
- Tunnel syndrome in programmers: how to recognize it in time and avoid surgery
- Isaac Newton and the secrets of the Universe
- Bill Gates: how a botanist created Microsoft and destroyed competitors

