DNA analysis of elephant ivory reveals trafficking networks
As few as three major criminal groups are responsible for smuggling the vast majority of elephant ivory tusks out of Africa, according to a new study......»»
Saturday Citations: Cold dark matter takes a hit; a new paradigm for biology; those fracking earthquakes
This week, researchers formulated a new method to calculate the probability of generating intelligent life in the universe. Investigations of a meteorite that originated on Mars revealed that it once interacted with liquid water. And an analysis of f.....»»
Extreme heat weakens land"s power to absorb carbon, analysis finds
A new European Space Agency-backed study shows that the extreme heat waves of 2023, which fueled huge wildfires and severe droughts, also undermined the land's capacity to soak up atmospheric carbon. This diminished carbon uptake drove atmospheric ca.....»»
Hormone receptor structure reveals how it functions in heart disease
Weill Cornell Medicine researchers have determined the full-length structure of a blood pressure-regulating hormone receptor for the first time, uncovering how it functions, which may enable better drug targeting of the receptor for diseases such as.....»»
Genes of ancient animal relatives used to grow a mouse: Study reveals hidden history of stem cells
An international team of researchers has achieved an unprecedented milestone: the creation of mouse stem cells capable of generating a fully developed mouse using genetic tools from a unicellular organism, with which we share a common ancestor that p.....»»
Study of Scotland"s last plague reveals humanity in face of "Black Death"
A new study led by the University of Aberdeen has provided greater understanding of Scotland's final deadly brush with the plague......»»
Palo Alto Networks firewalls, Expedition under attack (CVE-2024-9463, CVE-2024-9465)
Attackers have been spotted exploiting two additional vulnerabilities (CVE-2024-9463, CVE-2024-9465) in Palo Alto Networks’ Expedition firewall configuration migration tool, CISA has confirmed on Thursday. About the vulnerabilities (CVE-2024-94.....»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
NIST report on hardware security risks reveals 98 failure scenarios
NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report hig.....»»
Electric field signals reveal early warnings for extreme weather, study reveals
A new study led by Dr. Roy Yaniv from the Institute of Earth Sciences at The Hebrew University of Jerusalem and Sheba Medical Center, in collaboration with Dr. Assaf Hochman from The Hebrew University and Prof. Yoav Yair from Reichmann University, ha.....»»
Discovery of 2,586 orphan genes in Rosa chinensis reveals stress adaptation and flower development
Orphan genes, found only in specific lineages, are key drivers of new functions and phenotypic traits. This discovery lays a foundation for understanding how roses thrive under environmental challenges......»»
What determines support for EU-climate policy? Study reveals acceptance depends on inclusion of social policy measures
Climate change is one of the greatest challenges of our time, and the European Union has set itself ambitious targets to become climate-neutral by 2050. A new policy paper from the Cluster of Excellence "The Politics of Inequality" at the University.....»»
AI Analysis of Police Body Camera Videos Reveals What Typically Happens during Traffic Stops
Examining body camera videos at scale reveals racial differences in how police treat drivers during traffic stops—and what corrective programs really work.....»»
Rumor Replay: ‘HomePad,’ iPhone 18 camera, Vision Pro 2, more
This is Rumor Replay, a new weekly column at 9to5Mac that provides a quick rundown of the most recent Apple product rumors, with my analysis and commentary. Today: Apple’s new ‘HomePad’ device, Vision Pro 2 release date, iPhone 18 camera change.....»»
Deep learning streamlines identification of 2D materials
Researchers have developed a deep learning-based approach that significantly streamlines the accurate identification and classification of two-dimensional (2D) materials through Raman spectroscopy. In comparison, traditional Raman analysis methods ar.....»»
Can self-employment delay retirement? Only if you are healthy and wealthy
Self-employment can provide an alternative career transition to retirement, but only for those in good health and in high-paying careers, research from Trinity Business School reveals......»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
Climate policy monitor reveals net zero regulations surge globally but implementation gap remains
As countries meet at COP29 in Baku, a new Oxford University study, developed through pro-bono partnerships with 48 leading law firms around the world, provides the most detailed view yet of how key economic rules are aligning—or not—to climate go.....»»
Mothers, metaphors and dyslexia: What language reveals about the challenges of a child"s learning disability
Alarm bells. Red flags. A labyrinth......»»
Infostealers increasingly impact global security
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the gl.....»»