New infosec products of the week: April 26, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Cyberint, Forcepoint, Invicti Security, Netwrix, Trend Micro, Zero Networks, and WhyLabs. Trend Micro launches AI-driven cyber risk management capabilities T.....»»
How to Use Apple Managed Device Attestation to secure networks
Managed Device Attestation enables enterprises to verify Apple devices for security, protecting the corporate network. Here's how to use it.Apple Device Attestation.In our interconnected world, the issue of device identity plays a critical role in on.....»»
New experimental evidence unlocks a puzzle in vascular tissue engineering
Angiogenesis is a process of forming hierarchical vascular networks in living tissues. Its complexity makes the controlled generation of blood vessels in laboratory conditions a highly challenging task......»»
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, Cisco T.....»»
Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks? Enlarge (credit: Getty Images) Hackers backed by a powerful nation-state have been exploiting two zero-day vulnerabilities in Ci.....»»
Computer game helps students get better at detecting fake news
A computer game helped upper secondary school students become better at distinguishing between reliable and misleading news. This is shown by a study conducted by researchers at Uppsala University and elsewhere......»»
Virtual reality can motivate people to donate to refugee crises regardless of politics
Political conservatives who watched a documentary on Syrian refugees with a virtual reality headset had far more sympathy for the people depicted in the film than those who viewed the same film on a two-dimensional computer screen......»»
AI designs active pharmaceutical ingredients quickly and easily based on protein structures
A new computer process developed by chemists at ETH Zurich makes it possible to generate active pharmaceutical ingredients quickly and easily based on a protein's three-dimensional surface. The new process, detailed in Nature Communications, could re.....»»
Research combines DNA origami and photolithography to move one step closer to molecular computers
Molecular computer components could represent a new IT revolution and help us create cheaper, faster, smaller, and more powerful computers. Yet researchers struggle to find ways to assemble them more reliably and efficiently......»»
Zero Networks unveils identity segmentation solution to prevent credential theft
Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse by au.....»»
Forcepoint DSPM safeguards sensitive information by examining data context and content
Forcepoint has launched Forcepoint Data Security Posture Management (DSPM), driven by AI to deliver real-time visibility, ease privacy compliance and minimize risks for data stored in multi-clouds and networks, including endpoints. Forcepoint DSPM ha.....»»
Recoding Voyager 1—NASA’s interstellar explorer is finally making sense again
"We're pretty much seeing everything we had hoped for, and that's always good news.” Engineers have partially restored a 1970s-era computer on NASA's Voyager 1 spacecraft after five months of long-distance troubleshooting, building.....»»
How to change mouse DPI on Windows and Mac
DPI controls the sensitivity associated with a computer mouse. There are numerous reasons why you’d want to change a mouse’s DPI, and we'll show you how......»»
Computer model helps support theory of asteroid Kamo"oalewa as ejecta from the moon
A small international team of planetary scientists has found evidence supporting the theory that the near-Earth asteroid Kamo'oalewa is ejecta from the moon. In their paper published in the journal Nature Astronomy, the group describes their data-dri.....»»
Report: Apple acquires French startup behind AI and computer vision technology
Apple has reportedly acquired Datakalab, a Paris, France-based startup specializing in artificial intelligence compression and computer vision technology. According to French business magazine Challenges, the acquisition was finalized in December......»»
The fungi in our guts can make cases of COVID worse
The immune system can get kicked into overdrive when the fungi run riot. Enlarge / Computer illustration of Candida fungi. (credit: Kateryna Kon | Science Photo Library | Getty) Fungi are an indispensable part of your mi.....»»
Fuxnet malware: Growing threat to industrial sensors
In this Help Net Security video, Sonu Shankar, Chief Strategy Officer at Phosphorus, discusses how Blackjack’s Fuxnet malware should be a wakeup call to industrial operators about the vulnerability of sensor networks and the outsized impact these a.....»»
How to tell if your webcam has been hacked
Has your webcam been hacked? It's a common fear, but how does it happen? Here's how to tell if someone may be watching through your computer cam and what to do......»»
The fungi in our guts can make cases of Covid worse
The immune system can get kicked into overdrive when the fungi run riot. Enlarge / Computer illustration of Candida fungi. (credit: Kateryna Kon | Science Photo Library | Getty) Fungi are an indispensable part of your mi.....»»
How to fornetwork on a Mac
Need to get your MacBook to forget a Wi-Fi network it keeps automatically connecting to? Here’s how to manually remove the network from your computer......»»