European companies hit with effective DocuSign-themed phishing emails
A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of multiple victims in different firms, according to Palo Alto Networks’ Unit 42 researchers. The phishing.....»»
The optical disc onslaught continues, with LG quitting Blu-ray players
Streaming uncertainty has some people clinging to their discs. Like with much of physical media, the onslaught against optical media is ongoing. In the latest hit against physica.....»»
Apple-designed Wi-Fi chip rumored to debut in refreshed HomePod mini & Apple TV
Rumors about the Apple TV set top box are rare, but a new one predicts that a refresh of the hardware will hit store shelves in 2025 with an Apple-designed Wi-Fi chip, alongside a new HomePod mini.You can get HomePods and an Apple TV to connect to a.....»»
Weight loss drugs may also treat addiction, Alzheimer’s, and heart disease
Pharmaceutical companies are already cashing in on their other health benefits. One of Dr. Mo Sarhan’s patients was experiencing intense cravings for opioids and alcohol when th.....»»
Security cameras and alarms effective at deterring burglars, say burglars
If you’ve ever wondered whether security cameras and alarms are effective at deterring burglars, the answer is yes – and that comes from a very reliable source: burglars. KGW-TV asked 86 inmates convicted of burglary what would make them more.....»»
Wedding banned - Apple Watches not welcome at fashionista"s ceremony
It's a long walk up that aisle, and wedding guests could even hit their stand goal in church, but one couple is insisting that nobody wears an Apple Watch to their special day.The original Apple Watch had a feature for lovingly sending your heartbeat.....»»
Physicists introduce approach to control wave patterns via fluid flows
The reliable control of traveling waves emerging from the coupling of oscillations and diffusion in physical, chemical and biological systems is a long-standing challenge within the physics community. Effective approaches to control these waves help.....»»
Jetico Search locates and manages sensitive data
Jetico launches Search, a PII and sensitive data discovery tool integrated with BCWipe to locate and securely erase files beyond forensic recovery. Addressing the growing demand for effective solutions in data protection, Search integrates discovery.....»»
Shaping effective AI governance is about balancing innovation with humanity
In this Help Net Security interview, Ben de Bont, CISO at ServiceNow, discusses AI governance, focusing on how to foster innovation while ensuring responsible oversight. He emphasizes the need for collaboration between technologists, policymakers, an.....»»
TCL TVs will use films made with generative AI to push targeted ads
TCL to "heavily promote" original short films with gen AI animation, characters. Advertising has become a focal point of TV software. We’re seeing companies that sell TV sets be.....»»
This great sci-fi comic book should be Netflix’s next hit binge-worthy show. Here’s why
The heir to Netflix's hit genre shows like Stranger Things is this great 2021-2022 comic series that blends aliens, friendship drama, and the end of the world......»»
Brazilian beef and leather companies fall short in tackling deforestation, a study finds
The next United Nations climate conference, COP30, will be held in Belem, the capital of an Amazon region where widespread deforestation mainly driven by cattle farming has turned the surrounding rainforest from a vital carbon sink into a significant.....»»
Containers have 600+ vulnerabilities on average
Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are struggling to get container security right. Issues from misconfigured clouds, containers, and networks to.....»»
Why crisis simulations fail and how to fix them
In this Help Net Security interview, Allison Ritter, Head of Cyber Experiential Exercising at Cyberbit, shares her insights on the key differences between in-person and virtual cyber crisis simulations and what makes each approach effective. Ritter h.....»»
Researchers call on European Commission to protect groundwater and subterranean life from pollution
The subterranean world holds a value that is often underestimated. Its significance seems to escape notice, particularly its vital role in storing drinking water—a resource long taken for granted—and its contribution to biodiversity, harboring un.....»»
Scientists develop cost-effective lasers for extended short-wave infrared applications
Current laser technologies for the extended short-wave infrared (SWIR) spectral range rely on expensive and complex materials, limiting their scalability and affordability. To address these challenges, ICFO researchers have presented a novel approach.....»»
Fashion police dictated gender norms in early modern Genoa, historian finds
While fashion magazines and social media strongly influence how people dress today, there were literally fashion police in most early modern European cities, according to art history scholar Ana Cristina Howie, with local laws dictating—down to the.....»»
Box integrates Adobe Express image editor directly into its cloud platform
Adobe and Box on Tuesday announced a new partnership that will integrate services from both companies. Starting today, Box users will have access to the Adobe Express image editor directly from the cloud platform, so that they can create and edit vis.....»»
Apple Maps gets upgraded Yelp experience, with more change likely coming
Apple Maps may have had a shaky start, but it has undoubtedly grown very compelling over the years. One area that’s still hit or miss, though, is integrations with third-party services like Yelp. But that Yelp integration is about to get better......»»
Strengthening security posture with comprehensive cybersecurity assessments
In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools and methodologies, the role of AI and automation, and strategies for aligning assessments with organizationa.....»»
Norwegian app ‘Vipps’ is the first to support NFC wallet API on iPhone
The European Union’s Digital Markets Act (DMA) antitrust legislation compelled Apple to grant developers greater access to the iPhone’s NFC reader, and this change was implemented earlier this year with iOS 17.4. Now, the Norwegian payment platfo.....»»