Microchip Technology confirms theft of employee data
US-based semiconductor manufacturer Microchip Technology has confirmed that the cyberattack it suffered in August 2024 resulted in the theft of data, including “employee contact information and some encrypted and hashed passwords.” The br.....»»
Providing performance information of peers is effective management tool if done in correct setting, study finds
More and more companies are gathering performance data on their employees and sharing that data among their staff. Their hope: that those employees who receive feedback that their own performance is lower than their colleagues' will be more motivated.....»»
Navigating crises: The financial adaptations of NGOs during the COVID-19 pandemic
Demand for NGO services usually increases in times of crisis. However, a new study led by Kaunas University of Technology (KTU) in Lithuania has found that the COVID-19 pandemic had a mixed impact on NGOs working in Lithuania, Croatia, Poland and the.....»»
Citizen scientist data help uncover the mysteries of a blue low-latitude aurora
Colorful auroras appeared around Japan's Honshu and Hokkaido islands on May 11, 2024, sparked by an intense magnetic storm. Usually, auroras observed at low latitudes appear red due to the emission of oxygen atoms. But on this day, a salmon pink auro.....»»
Apple Vision Pro has completely changed how Porsche unveils sports cars in two ways
It’s no secret that the team members at Porsche are fans of Apple technology. From embracing next-gen CarPlay to including Apple CEO Tim Cook in a keynote, the German car company has a special appreciation for Apple. Taking advantage of state-o.....»»
X-ray data-enhanced computational method can determine crystal structures of multiphase materials
A joint research team led by Yuuki Kubo and Shiji Tsuneyuki of the University of Tokyo has developed a new computational method that can efficiently determine the crystal structures of multiphase materials, powders that contain more than one type of.....»»
AI-based chatbot make recommendations for bioimage analysis
Scientists from Universidad Carlos III de Madrid (UC3M), together with a research team from Ericsson and the KTH Royal Institute of Technology in Sweden, have developed an artificial intelligence–based software program that can search for informati.....»»
"Exceptional" wildfires across Americas in 2024: EU monitor
Severe drought stoked rampant wildfires across North and South America this year and churned up record carbon pollution in Bolivia, Nicaragua and the Pantanal wetlands, according to new data from Europe's climate monitor......»»
MeerKAT confirms the gravitational wave background of the universe in record time
The universe is a turbulent place. Stars are exploding, neutron stars collide, and supermassive black holes are merging. All of these things and many more create gravitational waves. As a result, the cosmos is filled with a rippling sea of gravitatio.....»»
Bitdefender GravityZone XDR enhancements protect business data stored in the cloud
Bitdefender announced enhancements to its GravityZone XDR platform with the addition of its new Business Applications sensor, designed to protect corporate data hosted and stored in cloud-based productivity and collaboration applications. The sensor.....»»
Mitel MiCollab zero-day and PoC exploit unveiled
A zero-day vulnerability in the Mitel MiCollab enterprise collaboration suite can be exploited to read files containing sensitive data, watchTowr researcher Sonny Macdonald has disclosed, and followed up by releasing a proof-of-concept (PoC) exploit.....»»
SurePath AI Discover classifies AI use by intent and detects sensitive data violations
SurePath AI launched SurePath AI Discover, a new offering that provides visibility into a company’s employee use of public AI services. By classifying AI use by intent and identifying sensitive data violations, companies can better understand t.....»»
Preparing for Q-day: The essential role of cloud migration in securing enterprise data
As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This looming turning point—when quantum machines can break traditional encryption with ease—has the potential to u.....»»
Former Apple employees allegedly stole $152k through donation matching scam
An alleged donation theft scheme involving six former Apple employees, tax fraud, and an inside man funneling money away from charities robbed Apple of about $152k over three years.Apple ParkLike many big companies, Apple matches donations made by em.....»»
A third of people from Chicago carry concealed handguns in public before they reach middle age, 25-year study finds
Around a third (32%) of people who grew up in Chicago have carried a concealed firearm on the city streets at least once by the time they turn 40 years old, according to a major study of gun usage taking in a quarter of a century of data......»»
Study confirms two forms of longtooth groupers in Asia are separate species of fish
A team of marine biologists from the Japan Fisheries Research and Education Agency, the Kanagawa Prefectural Museum of Natural History, also in Japan, and the Vietnam Academy of Science and Technology, has found via genetic and physical study that tw.....»»
Two reasons to suggest the iPhone 17 may have Face ID embedded in the display
Apple has been granted another patent for technology that would allow it to have Face ID embedded in the display, enabling the company to reduce the size of the camera cutout. While Apple has been working on this for many years, there are a couple.....»»
Scan your iPhone for Pegasus spyware using a $1 app
A newly-released app lets you regularly scan your iPhone for Pegasus spyware – which can access almost all the data on a phone – for a one-off cost of just one dollar. A mobile security firm created the app, which allows you to scan your iPho.....»»
Product showcase: Securing Active Directory passwords with Specops Password Policy
Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a strong and unique password, significantly reducing the risk of unauthorized access and data breaches. These policies not on.....»»
Approaching the unexplored "plasma phase-space" with data science
Fusion energy is being researched and developed as a new source of electric power that will contribute to the realization of a carbon-neutral society. At the National Institute for Fusion Science, research on magnetically confined plasma is being con.....»»
Veeam Data Platform v12.3 encompasses three key objectives for enterprises
Veeam Software released Veeam Data Platform v12.3. This release encompasses three key objectives for enterprises: protecting identity and access management with support for backing up Microsoft Entra ID, powering proactive threat analysis with Recon.....»»