Mandatory Chinese Olympics app collects personal data, has two security holes
Use of the Chinese Olympics app, MY2022, is mandatory for everyone attending this year’s Olympic Games in Beijing, whether as an athlete or simply watching from the stadium. The app collects sensitive personal data – like passport details, m.....»»
Ketch Third Party Risk Intelligence provides control over trackers, tags, and cookies
Ketch launched Third Party Risk Intelligence, a new suite of diagnostics and management tools for brands to manage how third party vendors collect data across digital properties. As regulatory enforcement increases and wiretapping lawsuits surge, bus.....»»
Simbian unveils AI Agents to address the top pain points for SOC analysts
Simbian announced a suite of AI Agents that work alongside security teams to enhance the intelligence, speed, and coverage of their entire security program. The suite of AI Agents, which runs on the Simbian Security Accelerator Platform, addresses th.....»»
Archive.org, a repository of the history of the Internet, has a data breach
31 million records containing email addresses and password hashes exposed. Archive.org, one of the only entities to attempt to preserve the entire history of the World Wide Web an.....»»
Weaker China results a drag on BMW, Mercedes Q3 sales
BMW's sales in China fell 30 percent, the steepest drop in more than four years. Mercedes sales declined 13 percent after Chinese buyers held back purchases of expensive models......»»
A sharper view of the Milky Way with Gaia and machine learning
A group of scientists led by the Leibniz Institute for Astrophysics Potsdam (AIP) and the Institute of Cosmos Sciences at the University of Barcelona (ICCUB) have used a novel machine learning model to process data for 217 million stars observed by t.....»»
Researchers discover new isotope plutonium-227
A research team led by researchers at the Institute of Modern Physics (IMP) of the Chinese Academy of Sciences (CAS) has synthesized a new plutonium isotope, plutonium-227. Their study is published in Physical Review C......»»
Adaptiva improves collaboration between IT and security teams with vulnerability dashboards
Adaptiva announces the latest feature release for OneSite Patch: vulnerability dashboards. These new dashboards provide real-time visibility into Common Vulnerabilities and Exposures (CVEs) in the environment and patches that can remediate them–emp.....»»
Qualys Enterprise TruRisk Management unifies asset inventory and risk factors
Qualys launched the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM). The solution enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data into actionable insights that.....»»
Internet Archive data breach, defacement, and DDoS: Users’ data compromised
The Internet Archive has suffered a data breach, leading to the compromise of email addresses, screen names and bcrypt password hashes of some 31 million users. The compromise was revealed on Wednesday afternoon, when the digital library’s webs.....»»
Widening talent pool in cyber with on-demand contractors
Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make.....»»
9to5Mac Daily: October 9, 2024 – iPad mini 7 rumors, more
Listen to a recap of the top stories of the day from 9to5Mac. 9to5Mac Daily is available on iTunes and Apple’s Podcasts app, Stitcher, TuneIn, Google Play, or through our dedicated RSS feed for Overcast and other podcast players. Level u.....»»
Telegram now lets businesses use the app to verify phone numbers
Telegram this week announced an update with some new features, and there’s one in particular that’s quite interesting. The platform will now allow businesses to use Telegram for phone number verification, which can be more convenient than using m.....»»
What lies ahead for AI in cybersecurity
AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its ability to streamline data management processes boosts efficiency and strengthens security protocols. However, the.....»»
Consumers have trust issues regarding how AI collects their data
Consumers worldwide are highly concerned about the information companies collect from them – especially when it’s used for AI, according to Cohesity. The majority of respondents (73% in the UK, 81% in the US and 82% in Australia) criticiz.....»»
Archive.org, a repository storing the entire history of the Internet, has a data breach
31 million records containing email addresses and passwords hashes exposed. Archive.org, possibly one of the only entities to preserve the entire history of the Internet, was rece.....»»
Novel detection technology alerts health risks from TNT metabolites
Recently, a research group from the Hefei lnstitutes of Physical Science (HFIPS) of the Chinese Academy of Sciences developed an approach that can facilitate rapid detection of both positive and negative ions of four toxic metabolites derived from 2,.....»»
Thunderbird Android client is K-9 Mail reborn, and it’s in solid beta
Android's longtime refuge for simple, snappy email is almost Thunderbird. Thunderbird's Android app, which is actually the K-9 Mail project reborn, is almost out. You can check it.....»»
Satellite data show massive bombs dropped in dangerous proximity to Gaza Strip hospitals in 2023
Satellite data on the proximity of hundreds of M-84 bomb craters to hospitals in the Gaza Strip suggest that, as of November 2023, hospitals were not being given special protection from indiscriminate bombing, as mandated by international humanitaria.....»»
Study proposes a new bias: The tendency to assume one has adequate information to make a decision
New experimental data support the idea that people tend to assume the information they have is adequate to comprehend a given situation, without considering that they might be lacking key information. Hunter Gehlbach of Johns Hopkins University and c.....»»
The legality of free music streaming app Musi may be settled as developer sues Apple
The legal status of the free music streaming app Musi has long been unclear – but the matter may now be settled, thanks to a lawsuit the developer has filed against Apple. Musi sourced its music from YouTube using a method it claims was perfectl.....»»