Biden Signs NDAA Relying on Voluntary Private-Sector Cybersecurity Collaboration
President Joe Biden has signed into law the National Defense Authorization Act of 2022 which codifies an approach to cybersecurity that depends on the decisions of private-sector entities to protect the bulk of the nation's critical infrastructure. F.....»»
Active Directory compromise: Cybersecurity agencies provde guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Plane contrails: white fluffy contributors to global warming
The white, feathery lines behind airplanes that look like bits of harmless cloud are anything but, warn experts, who say they could have a greater environmental impact than the aviation sector's CO2 emissions......»»
ALICE probes the strong interaction three-body problem with new measurements of hadron–deuteron correlations
In an article recently published in Physical Review X, the ALICE collaboration presented its studies of correlations in the kaon–deuteron and proton–deuteron systems, opening the door to precise studies of the forces in three-body nuclear systems.....»»
Rolls-Royce brings white-glove vehicle customization to U.S.
The New York Private Office joins similar hubs in Dubai and Shanghai. Los Angeles and Miami are on the short list for a future design studio......»»
Cryo-ET study provides viral close-up of HTLV-1, the "overlooked cousin of HIV"
In collaboration with the University of Minnesota and Cornell University, Martin Obr and Florian Schur from the Institute of Science and Technology Austria (ISTA) provide new details into the architecture of HTLV-1 (Human T-cell Leukemia Virus Type 1.....»»
U.S. car-tech ban is a powerful new weapon against Chinese EVs
Biden administration officials cast the threat of Chinese vehicles and technology as both a national-security threat that could enable espionage and an economic threat......»»
What is a VPN? Here’s what they do and why you need one
Virtual private networks are a great way to protect your privacy online, but how do they work? Here is our guide to the essentials......»»
Violence, harassment from students is overwhelmingly "part of the job" for Saskatchewan education sector workers
Saskatchewan education sector workers are experiencing disturbing levels of workplace violence and harassment, says a new report spotlighting a situation that has reached "a breaking point," according to its authors......»»
Signs of hope for endangered Maugean skate
For the first time in nearly a decade, scientists have recorded an increased presence of young Maugean skates—a ray of hope for the survival of the endangered species......»»
Transportation, logistics companies targeted with lures impersonating fleet management software
Financially motivated threat actors are targeting North American companies in the transportation and logistics sector with tailored lures, info-stealing malware, and a clever new trick. How the attack unfolds According to Proofpoint threat researcher.....»»
Cloudflare helps secure popular messaging applications
Cloudflare announced a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. When using end-to-end encryption messaging applications, a public-private key exchange encrypts messages to prot.....»»
Huawei laptop teardown shows China’s steps toward tech self-sufficiency
Embargo on high-tech goods has forced China to create its own supply chain. Enlarge (credit: FT) China’s demand that the public sector step up use of domestic semiconductors can best be seen within Huawei’s Qingyun L.....»»
Tesla supplier goes bankrupt after $30M verdict in defective parts lawsuit in Ohio
Wrena filed for voluntary Chapter 11 bankruptcy in U.S. Bankruptcy Court with liabilities between $10 million and $50 million......»»
Evaluating embedded vulnerabilities and cybersecurity risks in procurement
Evaluating embedded vulnerabilities and cybersecurity risks in procurement.....»»
How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats,.....»»
Future-proofing cybersecurity: Why talent development is key
In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent n.....»»
MFA bypass becomes a critical security issue as ransomware tactics advance
Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the past 12 months – a jump from 61% in 2023, according to SpyCloud. Session hijacking surges as ma.....»»
Auto supplier goes bankrupt after $30M verdict in defective parts lawsuit
Southfield, Mich.-based automotive supplier Wrena LLC filed for bankruptcy Monday with the intention of selling the business after being ordered to pay $30 million in a lawsuit over defective parts. The company petitioned for voluntary Chapter 11.....»»
Family-owned businesses hold non-family CEOs more accountable than family CEOs for firm performance
Family-owned businesses account for 59% of the U.S. private workforce, with 35% of Fortune 500 companies being family-owned. Although family-owned firms employ more than half of the U.S. workforce, little is known about their operations due to the se.....»»
Researchers discover tumors inherited by generations of jellyfish-like creatures
Researchers from the CANECEV laboratory, an international collaboration between Deakin University and the University of Montpellier, have observed for the first time the birth of transmissible tumors in freshwater brown hydras—tiny, jellyfish-like.....»»