LayerX emerges from stealth to help enterprises mitigate web browsing risks
LayerX has announced its emergence from stealth and the unveiling of its universal, “user-first” browser security solution that transforms any browser. The company also announced the closing of a $7.5 million Seed round from Glilot Capital Partne.....»»
The hidden disease risks of modern housing developments in rural Africa
Tamika Lunn went to Kenya looking for bats. Her task, as a postdoctoral researcher in the lab of U of A biologist Kristian Forbes, was to catch bats to understand if, when and why they carried viruses. A spillover of a bat virus to humans could lead.....»»
Aon Cyber Risk Analyzer empowers organizations to evaluate cyber risk
Aon launched its Cyber Risk Analyzer, a digital application that allows risk managers to make data-driven, technology-enabled decisions to mitigate cyber risk. The tool is the latest in a series of new offerings, which brings together Aon’s dat.....»»
Study finds "safe" BPA alternatives may still pose health risks
A study by Professor José Villalaín of the Miguel Hernández University of Elche (UMH) in Spain, published in the Journal of Xenobiotics, reveals that bisphenol analogs BPF and BPS, used as safer alternatives to BPA, may still pose health risks......»»
Bee alert: Pesticides pose a real threat to more than 70% of wild bees
A new study reveals alarming risks that pesticides pose to ground-nesting bees, which are crucial for pollination and food production. As agriculture increasingly relies on pesticides to protect crops, the unintended consequences for these essential.....»»
When marine algae get sick: How viruses shape microbe interactions
By looking at the tiniest virus-infected microbes in the ocean, researchers are gaining new insights about the marine food web that may help improve future climate change predictions. The new study, co-authored by Wake Forest Assistant Professor of B.....»»
Standing Desks Are Better for Your Health—but Still Not Enough
Two recent studies offer some of the most nuanced evidence yet about the potential benefits and risks of working on your feet......»»
Better education can mitigate post-harvest food losses, increase global food security
Better educating farmers and food processors about how to avoid post-harvest food losses—which amount to one-third of global food production, worth US$1 trillion annually—would reduce global food insecurity, according to researchers at McGill Uni.....»»
How to lead through uncertainty
Where do we stand when the ground underneath us is shifting? What if the ground doesn't stop shifting and an acceptable "new normal" never emerges?.....»»
Top Google Chrome alternative for mobile arrives on Android
Arc Search brings lightweight, speedy, and super clean AI-assisted browsing to more smartphones than ever......»»
IBM announces Autonomous Security for Cloud
IBM announced Autonomous Security for Cloud (ASC), an AI-powered solution from IBM Consulting designed to automate cloud security management and decision-making to help mitigate risk for organizations accelerating their cloud journey on Amazon Web Se.....»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
VPNs and Online Gaming: Protecting your data and reducing lag
A VPN can be an extremely useful tool for gamers. Here's why you should consider gaming while using one.Nvidea's GeForce Now on a MacBook ProA Virtual Private Network (VPN) service offers many benefits for regular web-surfing purposes. Everything fro.....»»
NIST report on hardware security risks reveals 98 failure scenarios
NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report hig.....»»
AI’s impact on the future of web application security
In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-dri.....»»
The Myth that Musicians Die at 27 Shows How Superstitions Are Made
Famous people who die at age 27, such as Janis Joplin, Jimi Hendrix and Amy Winehouse, get even more famous because of the mythology surrounding that number—an example of how modern folklore emerges.....»»
Yes, the 10 worst passwords still include ‘password’ and ‘secret’
Some six years after virtual private network company NordVPN started searching data breaches for the most-used passwords, things are every bit as bad as when the company started. Each year, the company searches the dark web for passwords stolen by.....»»
Are standing desks good for you? The answer is getting clearer.
Whatever your office setup, the most important thing is to move. Without question, inactivity is bad for us. Prolonged sitting is consistently linked to higher risks of cardiovasc.....»»
Researchers call for recognition of tire particles as a distinct environmental threat
A new study led by an international team of scientists highlights tire particles (TPs) as the leading contributor to microplastics and calls for urgent, targeted research to address their unique environmental and health risks......»»
Cequence Security enables organizations to elevate their API defenses
Cequence Security announced its new API Security Assessment Services. Designed to provide immediate, actionable insights into API security risks, these time-bound and fixed services leverage Cequence’s advanced Unified API Protection platform, enab.....»»
Cyber professionals face an IP loss reckoning in 2025
AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI models to streamline tasks—whether drafting reports, building code, or de.....»»