Exploring the insecurity of readily available Wi-Fi networks
In this video for Help Net Security, Andy Thompson, Global Research Evangelist at CyberArk, talks about Wi-Fi security. He walks you through various protocols we see in the wild, and introduces specific hacking techniques to crack Wi-Fi passwords. Cy.....»»
Exploring the asteroid Apophis with small satellites
The author of a disaster novel couldn't have dreamed it up any better: On a Friday, the thirteenth of all days, the potentially dangerous asteroid (99942) Apophis will come extremely close to humanity......»»
Sister cities can help communities better navigate the climate crisis, research suggests
Anthropologists at Rice University suggest in a new study that establishing networks of 'sister cities' dedicated to addressing the impact of natural disasters can mitigate the devastation wrought by climate change......»»
Chemist explores the real-world science of Star Wars
A professor at the University of Warwick is exploring the chemistry of the galaxy far, far away this Star Wars Day, May the 4th......»»
Physicists arrange atoms in close proximity, paving way for exploring exotic states of matter
Proximity is key for many quantum phenomena, as interactions between atoms are stronger when the particles are close. In many quantum simulators, scientists arrange atoms as close together as possible to explore exotic states of matter and build new.....»»
Analysis of minority-serving institutions demonstrates layered processes to build students" capacities
The model minority myth paints a picture of Asian Americans as a monolithic group with unparalleled success in academics. A new NYU study unpacks this myth, exploring the needs of Asian American, Native Hawaiian, and Pacific Islander students and how.....»»
Cybersecurity jobs available right now: May 1, 2024
Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for testing and evaluating the security of a LyondellBasell’s networks, systems, and applic.....»»
Using cow dung and microorganisms to compost diapers and sanitary wear
Research published in the International Journal of Environment and Waste Management has looked at how used diapers (baby nappies or adult napkins) and sanitary wear might be efficiently composted using cow dung—a readily available by-product of cat.....»»
Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has confirmed on Monday, but they are “not aware at this time of any malicious a.....»»
Okta warns customers about credential stuffing onslaught
Credential stuffing attacks have exploded this April, Okta warns, and advises its customers to use available tools to block access requests originating from residential proxies before authentication takes place. Abuse of proxy networks “In cred.....»»
New infosec products of the week: April 26, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Cyberint, Forcepoint, Invicti Security, Netwrix, Trend Micro, Zero Networks, and WhyLabs. Trend Micro launches AI-driven cyber risk management capabilities T.....»»
How to Use Apple Managed Device Attestation to secure networks
Managed Device Attestation enables enterprises to verify Apple devices for security, protecting the corporate network. Here's how to use it.Apple Device Attestation.In our interconnected world, the issue of device identity plays a critical role in on.....»»
How marketing classes can rescue "ugly produce" from becoming food waste
At a time of rising food costs and growing food insecurity, a large percentage of food grown for consumption never reaches our tables......»»
New experimental evidence unlocks a puzzle in vascular tissue engineering
Angiogenesis is a process of forming hierarchical vascular networks in living tissues. Its complexity makes the controlled generation of blood vessels in laboratory conditions a highly challenging task......»»
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, Cisco T.....»»
Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks? Enlarge (credit: Getty Images) Hackers backed by a powerful nation-state have been exploiting two zero-day vulnerabilities in Ci.....»»
Zero Networks unveils identity segmentation solution to prevent credential theft
Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse by au.....»»
Forcepoint DSPM safeguards sensitive information by examining data context and content
Forcepoint has launched Forcepoint Data Security Posture Management (DSPM), driven by AI to deliver real-time visibility, ease privacy compliance and minimize risks for data stored in multi-clouds and networks, including endpoints. Forcepoint DSPM ha.....»»
Planning at multiple scales for healthy corals and communities
Governments in the Mesoamerican Reef region are exploring the use of nature-based solutions to strengthen coral health and societal benefits for coastal communities. A new study led by Stanford researchers in collaboration with scientists from the Wo.....»»
Meet QDEL, the backlight-less display tech that could replace OLED in premium TVs
Interested in gadgets with premium displays? QDEL should be on your radar. Enlarge (credit: Getty) What comes after OLED? With OLED-equipped TVs, monitors, and other gadgets slowly becoming more readily available at lowe.....»»
Fuxnet malware: Growing threat to industrial sensors
In this Help Net Security video, Sonu Shankar, Chief Strategy Officer at Phosphorus, discusses how Blackjack’s Fuxnet malware should be a wakeup call to industrial operators about the vulnerability of sensor networks and the outsized impact these a.....»»