LOKKER’s consent management solution blocks all unauthorized data collection on websites
LOKKER released a new consent management solution available in its Privacy Edge Platform. This builds on LOKKER’s earlier release of its Consent Verification tool, which allows businesses to check whether their existing consent management platf.....»»
Teenagers leading new wave of cybercrime
Global data breaches show no signs of slowing down as this year has already exceeded 2023 in the number of data breaches and consumers impacted, according to Experian. Younger cybercriminals on the rise Today, the world of cyber hacking is not confin.....»»
Europe"s native oyster ecosystems have "collapsed," scientists say
European native oyster ecosystems have been classified as a "collapsed" species, after an assessment of historical and ecological data revealed it has faced extreme decimation......»»
UN report: Invest in nature to cut billion-dollar costs of droughts
As droughts fueled by human destruction of the environment are projected to affect 3 in 4 people by 2050, investing in sustainable land and water management is essential to reduce their costs, which already exceed $307 billion per year globally, acco.....»»
Providing performance information of peers is effective management tool if done in correct setting, study finds
More and more companies are gathering performance data on their employees and sharing that data among their staff. Their hope: that those employees who receive feedback that their own performance is lower than their colleagues' will be more motivated.....»»
Global study points to a clear solution for the massive decline in sharks and rays
A new global study blames overfishing for a more than 50% decline in sharks and rays since 1970, but also shows a clear path to preventing their numbers dwindling further. James Cook University's Professor Colin Simpfendorfer was co-author of the ana.....»»
Citizen scientist data help uncover the mysteries of a blue low-latitude aurora
Colorful auroras appeared around Japan's Honshu and Hokkaido islands on May 11, 2024, sparked by an intense magnetic storm. Usually, auroras observed at low latitudes appear red due to the emission of oxygen atoms. But on this day, a salmon pink auro.....»»
Experiments show coating rice seedling with nanoscale carbon dots from durian helps rice plants thrive in salty soil
Extreme weather and pollution have increased the salt content in some soil, making growing conditions harsh for salt-sensitive crops like rice. Now, researchers reporting in ACS Nano detail a possible solution that doesn't require genetic modificatio.....»»
X-ray data-enhanced computational method can determine crystal structures of multiphase materials
A joint research team led by Yuuki Kubo and Shiji Tsuneyuki of the University of Tokyo has developed a new computational method that can efficiently determine the crystal structures of multiphase materials, powders that contain more than one type of.....»»
"Exceptional" wildfires across Americas in 2024: EU monitor
Severe drought stoked rampant wildfires across North and South America this year and churned up record carbon pollution in Bolivia, Nicaragua and the Pantanal wetlands, according to new data from Europe's climate monitor......»»
Bitdefender GravityZone XDR enhancements protect business data stored in the cloud
Bitdefender announced enhancements to its GravityZone XDR platform with the addition of its new Business Applications sensor, designed to protect corporate data hosted and stored in cloud-based productivity and collaboration applications. The sensor.....»»
Mitel MiCollab zero-day and PoC exploit unveiled
A zero-day vulnerability in the Mitel MiCollab enterprise collaboration suite can be exploited to read files containing sensitive data, watchTowr researcher Sonny Macdonald has disclosed, and followed up by releasing a proof-of-concept (PoC) exploit.....»»
Mitek Digital Fraud Defender combats AI generated fraud
Mitek announced Digital Fraud Defender (DFD), an advanced, multi-layered solution to safeguard digital identity verification processes against sophisticated AI-enabled fraud tactics. Designed for financial institutions, fintech, online gaming provide.....»»
SurePath AI Discover classifies AI use by intent and detects sensitive data violations
SurePath AI launched SurePath AI Discover, a new offering that provides visibility into a company’s employee use of public AI services. By classifying AI use by intent and identifying sensitive data violations, companies can better understand t.....»»
Tenable Patch Management prevents problematic updates
Tenable released Tenable Patch Management, an autonomous patch solution built to close vulnerability exposures in a unified solution. A strategic partnership and integration with Adaptiva provides the foundation of the solution. Vulnerability remedia.....»»
Preparing for Q-day: The essential role of cloud migration in securing enterprise data
As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to u.....»»
A third of people from Chicago carry concealed handguns in public before they reach middle age, 25-year study finds
Around a third (32%) of people who grew up in Chicago have carried a concealed firearm on the city streets at least once by the time they turn 40 years old, according to a major study of gun usage taking in a quarter of a century of data......»»
Scan your iPhone for Pegasus spyware using a $1 app
A newly-released app lets you regularly scan your iPhone for Pegasus spyware – which can access almost all the data on a phone – for a one-off cost of just one dollar. A mobile security firm created the app, which allows you to scan your iPho.....»»
PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
Researchers have published a proof-of-concept (PoC) exploit for CVE-2024-8785, a critical remote code execution vulnerability affecting Progress WhatsUp Gold, a popular network monitoring solution for enterprises. CVE-2024-8785 and the PoC exploit CV.....»»
Product showcase: Securing Active Directory passwords with Specops Password Policy
Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a strong and unique password, significantly reducing the risk of unauthorized access and data breaches. These policies not on.....»»
Approaching the unexplored "plasma phase-space" with data science
Fusion energy is being researched and developed as a new source of electric power that will contribute to the realization of a carbon-neutral society. At the National Institute for Fusion Science, research on magnetically confined plasma is being con.....»»