Investor sentiment in crypto is now at the same level it was during the 2022 Terra-LUNA crash that sent shockwaves through the crypto market. Google worldwide search volume for “crypto” is hovering near one-year lows, reflecting weak investor sentiment amid a broad market downturn that reduced the total market capitalization of crypto from an all-time high of more than $4.2 trillion to about $2.4 trillion. Worldwide search volume for “crypto” is 30 out of 100 at the time of this writing, with a reading of 100 indicating the highest level of search interest, which was last reached in August 2025 in parallel with the market capitalization high. The 12-month low is 24, according to Google Trends data. Search volume in the US featured a similar pattern, with volume peaking at 100 in July and dropping to below 37 in January. However, US search figures diverged from worldwide volume data by surging back up to 56 in the first week of February. Read more
The surge in Google search activity for "Bitcoin" led Bitwise’s head of Europe, André Dragosch, to claim that “retail is coming back.” Google search volume for the term “Bitcoin” surged over the past week as the asset’s price briefly fell to the $60,000 level for the first time since October 2024. Google Trends provisional data shows worldwide searches for “Bitcoin” reached a score of 100 for the week starting Feb. 1, the highest level in the past 12 months. The previous peak was a score of 95 in the week of Nov. 16–23, when Bitcoin (BTC) slipped below the psychological $100,000 level for the first time in nearly six months. Read more
The low levels of internet search volume signal that retail investors are not interested in the crypto market, a stark contrast from January. Worldwide Google search volume for the term “crypto” is hovering above the 1-year low and has reached a 1-year low in the United States as 2025 comes to a close, indicating weak crypto investor sentiment. The Google search volume scale ranges from 0-100, with 100 indicating the highest levels of search volume. Worldwide search volume for “crypto” hit 26 on Monday, just two points above the 1-year low of 24. Worldwide search volume collapsed during the crypto market crash in April, due to US President Donald Trump’s sweeping tariff policy. US Google search volumes for “crypto” followed the same pattern but fell to a 1-year low of 26 on Monday. Mario Nawfal said: Read more
Google's Willow quantum computer processor was able to map out the features of a molecule 13,000 times faster than a modern supercomputer. Researchers at tech giant Google said they mapped out the structure of a molecule 13,000 times faster than the most powerful “supercomputers” available today, achieving the first verifiable quantum advantage. The experiment used Google’s Willow Quantum processor and “quantum echoes,” a technique that uses targeted waves to image an object in detail, according to Google. The technique targets a single qubit, the basic unit of information storage in quantum computing, with a precise signal, causing it to react. The process is then reversed, allowing the researchers to measure the “echo” or signal that bounces back, Google said. Read more
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract. North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group. The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google. Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site. Read more