DNSFilter Malicious Domain Protection identifies risky domains
DNSFilter announced the addition of a new Malicious Domain Protection feature to its protective DNS software, building on its machine learning capabilities. This feature bolsters DNSFilter’s defenses providing better visibility and protection a.....»»
SMS Stealer malware targeting Android users: Over 105,000 samples identified
Zimperium’s zLabs team has uncovered a new and widespread threat dubbed SMS Stealer. Detected during routine malware analysis, this malicious software has been found in over 105,000 samples, affecting more than 600 global brands. SMS Stealer.....»»
Senate passed child protection bills that could dramatically regulate social media
The Senate has passed two major child protection bills that could have a dramatic impact on how social media apps operate. If the bills make it through the House to become law, then social media apps would have to make it possible for users to dis.....»»
Study identifies universal blueprint for mammalian brain shape
Researchers have developed a new approach for describing the shape of the cerebral cortex, and provide evidence that cortices across mammalian species resemble a universal, fractal pattern......»»
The genetic blueprint of photosynthesis in citrus: Study identifies key traits and genes to boost fruit production
A research team investigated 71 citrus accessions and varieties using over 56,000 single nucleotide polymorphisms (SNPs) and 37 leaf reflectance parameters to study photosynthesis-related traits. They identified four distinct clusters of interrelated.....»»
From selfie injuries to viral stunts, social media can be risky for children. Could a ban help?
Australia is one of several countries currently considering a social media ban for children. Nationally, there are calls to raise the age a young person can legally use social media from 13 to 16, while South Australian premier Peter Malinauskas is l.....»»
Radioactive rhinoceros horns may deter poaching
Through a collaboration between Texas A&M University, University of Witwatersrand, Colorado State University and others, the Rhisotope Project, a South African organization dedicated to rhinoceros protection, is pioneering the incorporation of radioa.....»»
VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
Ransomware operators have been leveraging CVE-2024-37085, an authentication bypass vulnerability affecting Active Directory domain-joined VMware ESXi hypervisors, to gain full administrative access to them and encrypt their file system. VMware owner.....»»
Border agents cannot search smartphones without a warrant, rules federal court
A federal court has ruled that US Customs and Border Protection agents cannot search smartphones without a warrant. The ruling didn’t actually help the defendant who brought the case, and only applies to the Eastern District of New York where th.....»»
Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
CVE-2023-45249, a critical vulnerability affecting older versions of Acronis Cyber Infrastructure, is being exploited by attackers. About Acronis Cyber Infrastructure Acronis is a privately held Swiss cybersecurity and data protection technology comp.....»»
Microsoft 365 users targeted by phishers abusing Microsoft Forms
There has been an uptick in phishing campaigns leveraging Microsoft Forms this month, aiming to trick targets into sharing their Microsoft 365 login credentials. A malicious Microsoft form (Source: Perception Point) Malicious forms leading to phishin.....»»
Scientists unlock more secrets of Rembrandt’s pigments in The Night Watch
Use of arsenic sulfides for yellow, orange/red hues adds to artist's known pigment palette. Enlarge / Rembrandt's The Night Watch underwent many chemical and mechanical alterations over the last 400 years. (credit: Public domain).....»»
Arsenic and old paint: Analyzing pigments in Rembrandt’s The Night Watch
Use of arsenic sulfides for yellow, orange/red hues adds to artist's known pigment palette. Enlarge / Rembrandt's The Night Watch underwent many chemical and mechanical alterations over the last 400 years. (credit: Public domain).....»»
BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
BIND (Berkeley Internet Name Domain) is an open-source DNS software system with an authoritative server, a recursive resolver, and related utilities. BIND 9.20, a stable branch suitable for production use, has been released. According to the current.....»»
Researchers expose GitHub Actions workflows as risky and exploitable
GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions workflows remain insecure, often due to excessive privileges or high-risk de.....»»
This new Google Chrome security warning is very important
Chrome changes how it warns users of suspicious downloads by offering easily digestible explanations with it anti-phishing Enhanced protection feature......»»
Study identifies best bioenergy crops for sustainable aviation fuels by US region, policy goals
Researchers analyzed the financial and environmental costs and benefits of four biofuels crops used to produce sustainable aviation fuels in the U.S. They found that each feedstock—corn stover, energy sorghum, miscanthus or switchgrass—performed.....»»
Vulnerability in Telegram app for Android allows sending malicious files disguised as videos
ESET researchers discovered a zero-day exploit, which targets the Telegram app for Android, that appeared for sale for an unspecified price in an underground forum post from June 2024. Example of how the EvilVideo exploit appears on Telegram (source:.....»»
Confidential AI: Enabling secure processing of sensitive data
In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential computing, particularly at the silicon level, enhances data protection for AI applications.....»»
As a reviewer, here’s why I recommend Norton over McAfee for most people
Norton and McAfee are leading antivirus software solutions with decades of experience, but which offers the best protection and most value?.....»»
Insect pests study finds public surveillance is critical to early detection
A new study from the University of Maryland identifies key patterns and factors influencing insect pest establishment and detection across the U.S. and suggests public surveillance awareness and involvement is a critical component of efforts to prote.....»»