Current attacks, targets, and other threat landscape trends
In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in incident response engagements from Q2 2024, which covers April to June. Whil.....»»
OnePlus 13 vs. Samsung Galaxy S25 Ultra: What does the future hold?
The OnePlus 13 and Samsung Galaxy S25 Ultra are two of the best phones launching in 2025. One emerges as the better choice, based on current rumors......»»
Scientists develop cost-effective lasers for extended short-wave infrared applications
Current laser technologies for the extended short-wave infrared (SWIR) spectral range rely on expensive and complex materials, limiting their scalability and affordability. To address these challenges, ICFO researchers have presented a novel approach.....»»
Update your iPhone now to stop your iCloud data from getting stolen
A now-patched iOS vulnerability could let malicious apps silently steal your iCloud data with no alerts, and no consent.The latest security flaw in iOSThe team at Jamf Threat Labs has discovered a big security issue in Apple's Transparency, Consent,.....»»
Human intrusions ruffle the feathers of even the boldest penguins
Little penguin habitats and colonies are under threat from urban development and human activities, according to a new article in the journal Behaviour......»»
How Astro Bot charmed its way to becoming our Game of the Year
Astro Bot is Digital Trends' 2024 game of the year, but that decision came with a lot of soul searching......»»
RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
Microsoft: “Hack” this LLM-powered service and get paid
Microsoft, in collaboration with the Institute of Science and Technology Australia and ETH Zurich, has announced the LLMail-Inject Challenge, a competition to test and improve defenses against prompt injection attacks. The setup and the challenge LLM.....»»
What makes for a fulfilled cybersecurity career
In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfi.....»»
The Gorge trailer: Anya Taylor-Joy and Miles Teller guard a dangerous secret in new Apple thriller
Anya Taylor-Joy and Miles Teller are forced to protect the world from a mysterious threat in the first trailer for Apple TV+'s The Gorge......»»
With their new movie Y2K, Kyle Mooney and Evan Winter invite you to 1999’s deadliest party
In an interview with Digital Trends, Kyle Mooney and Evan Winter discuss their new film Y2K and how they used nostalgia to power this coming-of-age story......»»
Analysis provides new insights into the replication of BK polyomavirus, a major cause of kidney transplant failure
BK polyomavirus, or BKPyV, is a major cause of kidney transplant failure. There are no effective drugs to treat BKPyV. Research at the University of Alabama at Birmingham reveals new aspects of BKPyV replication, offering possible drug targets to pro.....»»
T-Mobile has completely revamped its 5G home internet plans
T-Mobile has introduced new home and small business internet plans that come with more perks at lower price points than current offerings......»»
Holiday 2024 Mac Buyer"s Guide -- Which desktop Mac you should buy?
Following the introduction of new Mac models in October, Apple has shaken up its desktop Mac roster. Here's what you should buy this holiday season, at just about any price point.Apple's current crop of desktop MacsPrice is an important factor when c.....»»
Copenhagen takes on its biggest climate threat—water
In low-lying Copenhagen where rising sea levels, groundwater and rainfall pose a risk to infrastructure, the Danish capital is trying to adapt and protect urban areas from climate change......»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Climate change threatens global food supply: Scientists call for urgent action
As climate change accelerates, scientists are sounding the alarm about its potentially devastating impact on the world's food supply. In a paper published by Trends in Plant Science, an international team of researchers warns that without rapid chang.....»»
Reflecting on 20 years of the Aceh tsunami: From "megathrust" threat to disaster mitigation
20 years have passed since the Aceh tsunami, which left deep scars on Indonesia, especially for those directly affected. Aceh was also recovering from a three-decade armed conflict between the Free Aceh Movement and the national government.....»»
Hitting the target for eradicating feral pigs on Kangaroo Island
The Black Summer bushfires of 2019–20, that razed more than half of the landscape on Kangaroo Island in South Australia, left an indelible mark on the island's unique native biodiversity, which is still struggling to recover......»»
8 US telcos compromised, FBI advises Americans to use encrypted communications
FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks a.....»»
Building trust in tokenized economies
As the tokenized economy expands, the digital landscape is reshaped by decentralized systems and new forms of asset ownership. In this Help Net Security video, Jeremy Bradley, COO of Zama, explores the emerging privacy-preserving technologies that ca.....»»