AI tool used to spot child abuse allegedly targets parents with disabilities
Pennsylvania county's child welfare algorithm has inspired tools in other states. Enlarge (credit: d3sign | Moment) Since 2016, social workers in a Pennsylvania county have relied on an algorithm to help them determine w.....»»
I compared Google and Samsung’s AI photo-editing tools. It’s not even close
Google and Samsung both have their own versions of an object removal tool. But which one works better? We found out......»»
Get this Asus laptop with a year of Microsoft Office for $199
The Asus Vivobook Go L510MA, which comes with one year of Microsoft 365, is an excellent productivity tool that doesn't break the bank at $199 from Walmart......»»
Scientists say voluntary corporate emissions targets not enough to create real climate action
Companies' emissions reduction targets should not be the sole measure of corporate climate ambition, according to a new perspective paper......»»
Congo accuses Apple of using illegal conflict minerals in its supply chain
The Democratic Republic of Congo is accusing Apple of using illegally exploited minerals sourced in the eastern regions, involving violence, child labor and other human rights violations. This allegation disagrees with Apple’s published Conflic.....»»
Anatomy IT’s new Security Suite targets healthcare cybersecurity threats, improves incident response
Anatomy IT has announced the launch of an expanded end-to-end cybersecurity product suite designed to safeguard healthcare delivery organizations from evolving and growing IT system threats. A record 133 million individuals were affected by healthcar.....»»
iMazing 3 launches for Mac and PC with all-new design, fresh features, dark mode, more
iMazing has been a go-to tool for Apple power users and IT admins for almost 20 years, now developer DigiDNA is out with iMazing 3. The major release sees a re-engineering of the whole app that brings a new UI and features, and even Vision Pro compat.....»»
AI tool recognizes serious ocular disease in horses
Colloquially known as moon blindness, equine recurrent uveitis (ERU) is an inflammatory ocular disease in horses, which can lead to blindness or loss of the affected eye. It is one of the most common eye diseases in horses and has a major economic im.....»»
Evolutionary biologists show that the color variants of female cuckoos are based on ancient mutations
Every cuckoo is an adopted child—raised by foster parents, into whose nest the cuckoo mother smuggled her egg. The cuckoo mother is aided in this subterfuge by her resemblance to a bird of prey. There are two variants of female cuckoos: a gray morp.....»»
Hackers are using developing countries for ransomware practice
Businesses in Africa, Asia, and South America hit before moving on to Western targets. Enlarge (credit: Getty Images) Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and Sout.....»»
Zero Networks unveils identity segmentation solution to prevent credential theft
Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse by au.....»»
Hackers are carrying out ransomware experiments in developing countries
Businesses in Africa, Asia, and South America hit before moving on to western targets. Enlarge (credit: Getty Images) Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia and South.....»»
CEO Mary Barra"s pay declined 3.9% to $27.8 million as GM missed stock targets
After eight consecutive years as the highest-paid Detroit 3 CEO, Barra's compensation trailed the $39 million Stellantis shareholders approved for Carlos Tavares......»»
Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
For nearly four years and perhaps even longer, Forest Blizzard (aka Fancy Bear, aka APT28) has been using a custom tool that exploits a specific vulnerability in Windows Print Spooler service (CVE-2022-38028). Dubbed GooseEgg, the tool is a launcher.....»»
Understanding the spread of behavior: How long-tie connections accelerate the speed of social contagion
Human beings are likely to adopt the thoughts, beliefs, and behaviors of those around them. Simple decisions like what local store is best to shop at to more complex ones like vaccinating a child are influenced by these behavior patterns and social d.....»»
A universal framework for spatial biology
Biological processes are framed by the context they take place in. A new tool developed by the Stegle Group from EMBL Heidelberg and the German Cancer Research Center (DKFZ) helps put molecular biology research findings in a better context of cellula.....»»
New small molecule helps scientists study regeneration
Regenerating damaged tissues or organs has been a dream of scientists for decades. Now, researchers at the FMI and Novartis Biomedical Research have discovered a new molecule that activates a protein involved in regeneration. The tool holds promise f.....»»
New toolkit makes molecular dynamics simulations more accessible
Molecular dynamics (MD) simulations have become a powerful tool in the ever-growing fields of molecular biology and drug development. While many MD simulation techniques exist, parallel cascade selection MD (PaCS-MD) is a particularly useful one when.....»»
Stellar Cyber launches MITRE ATT&CK Coverage Analyzer
Stellar Cyber launched the MITRE ATT&CK Coverage Analyzer, enabling users to visualize the impact of data source changes on their ability to detect threats in their specific environments. With this new tool, free of charge to all existing customers,.....»»
People doubt their own ability to spot AI-generated deepfakes
23% of Americans said they recently came across a political deepfake they later discovered to be fake, according to McAfee. The actual number of people exposed to political and other deepfakes is expected to be much higher given many Americans are no.....»»
Discover if your data have been leaked with Proton Mail"s new tool
Proton Mail's Dark Web Monitoring identifies and alerts you if your credentials appear in a breach. Here's what this means for your communications security......»»