Cyber-crime gangs" earnings slide as victims refuse to pay
New research points to a positive trend with ransomware gangs' profits dropping 40% in 2022......»»
How to delete a slide in PowerPoint
You can remove unnecessary slides to make your presentation more succinct. We’ll show you how to delete a slide in PowerPoint on the web, desktop, and mobile......»»
Drawbridge expands cyber risk assessment service
Drawbridge released its next generation cyber risk assessment service. Provided as a suite of modules, the solution combines a set of analytics with Drawbridge’s client service. Clients can now benchmark and score their cyber programs to prioritize.....»»
Volvo bets on EX90 crossover to reverse EV sales slide
The three-row EX90 was delayed half a year by software-integration issues and is now arriving at a time when EVs aren't gaining much market share......»»
Android malware uses NFC to steal money at ATMs
ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»
Why C-suite leaders are prime cyber targets
Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybers.....»»
"Internet of fish" empowering Lake Victoria women
Along the shores of East Africa's Lake Victoria, in Kenya, women fisherfolk including those known for being victims of sexual exploitation, are harnessing the Internet of Things (IoT) to help them counter their abusers while enhancing their incomes,.....»»
The right to disconnect from work—and employer surveillance—is growing globally. Why is NZ lagging?
A new law giving Australian workers the "right to disconnect"—to refuse contact from their employers outside their working hours (unless that refusal is unreasonable)—comes into effect this month......»»
OpenCTI: Open-source cyber threat intelligence platform
OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards. It features a modern web appl.....»»
Netflix’s best TV show right now is this riveting 2020 British crime drama
This 2020-2022 AMC series is one TV's great crime dramas. Now streaming on Netflix, here's why you shouldn't miss out on the next great binge-worthy hit......»»
The overshoot myth: We can"t keep burning fossil fuels and expect scientists of the future to get us back to 1.5°C
Record breaking fossil fuel production, all-time high greenhouse gas emissions and extreme temperatures. Like the proverbial frog in the heating pan of water, we refuse to respond to the climate and ecological crisis with any sense of urgency. Under.....»»
Experts study immigration in relation to jobs, crime and disease
According to the U.S. Census Bureau, immigrants made up 13.9% of the total population in 2022. Among them are highly skilled workers who fill critical gaps in high-tech industries as well as those who construct the buildings in which we live and who.....»»
New forensics technique measures individual DNA shedding to aid criminal investigations
A pioneering new DNA forensics technique is looking for a reliable method to measure a suspect's individual level of natural shedding of skin and other cells to add to, and compare with, evidence collected at crime scenes......»»
Stolen, locked payment cards can be used with digital wallet apps
Fraudsters can add stolen payment cards to digital wallet apps and continue making online purchases even after victims’ report the card stolen and the bank blocks it, computer engineers with University of Massachusetts Amherst and Pennsylvania.....»»
Apple is launching its own true-crime podcast, Scamtown, next week
Apple has created its own true-crime podcast, Scamtown, and it’s debuting next week on August 26. Here are all the details for this new show, how it fits into Apple’s podcasting strategy, and the special perk coming for Apple TV+ subscribers......»»
Protecting academic assets: How higher education can enhance cybersecurity
Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support staff, and overwhelming amounts of data, much of which is PII (personally ident.....»»
Crime blotter: Two arrested after iPhone theft, tracked across New England
In Apple-related crime, an iPhone lock screen photo leads to an arrest, a man stole phones to finance a vacation, and a tossed iPhone leads to domestic violence charges.Man in handcuffs (Source: Pixabay)A pair of thieves were arrested in Connecticut.....»»
Popular AI “nudify” sites sued amid shocking rise in victims globally
“Nudify” sites may be fined for making it easy to “see anyone naked,” suit says. Enlarge (credit: Viktoriya Skorikova | Moment) San Francisco's city attorney David Chiu is suing to shut down 16 of the most popula.....»»
Video dominates mobile app revenue; TikTok coins reward live streamers
Video dominates mobile app revenue, according to a new report. Of the total $3.8B smartphone owners spent on entertainment apps last quarter, three billion of it was spent on streaming and short video apps. The most dramatic growth in earnings was.....»»
Critical Start helps organizations reduce cyber risk from vulnerabilities
Critical Start announced Critical Start Vulnerability Management Service (VMS) and Vulnerability Prioritization. These new offerings are a foundational pillar of Managed Cyber Risk Reduction, allowing organizations to assess, manage, prioritize, and.....»»
Business and tech consolidation opens doors for cybercriminals
Cyber threats continued to intensify in the first half of 2024 as cybercriminals exploited security gaps from growing business and technological consolidation, according to Resilience. Consolidation in business and tech fuels new third-party risks Re.....»»