North Korea hackers use social media to target security researchers
Google finds use of bogus Twitter, LinkedIn profiles to identify vulnerabilities. Enlarge / Cyber threat from North Korea. North Korean hacker at the computer, on a background of binary code, the colors of the flag of the DPRK. DDoS attack (cred.....»»
Topological defects can trigger a transformation from insulating to conductive behavior in Mott materials
Researchers at Università Cattolica, Brescia campus, have discovered that the transition from insulating to conductive behavior in certain materials is driven by topological defects in the structure......»»
Resilience index needed to keep us within planet"s "safe operating space," say researchers
Researchers are calling for a 'resilience index' to be used as an indicator of policy success instead of the current focus on GDP. They say that GDP ignores the wider implications of development and provides no information on our ability to live with.....»»
Better education can mitigate post-harvest food losses, increase global food security
Better educating farmers and food processors about how to avoid post-harvest food losses—which amount to one-third of global food production, worth US$1 trillion annually—would reduce global food insecurity, according to researchers at McGill Uni.....»»
Fayetteville police positive about partnership with social workers
In 2021, the University of Arkansas School of Social Work partnered with the Fayetteville Police Department to pair officers with social workers trained to help people suffering mental crises. Initially, the officers were supportive of the effort but.....»»
Silver-silica composite catalyst inspired by geochemical cycling exhibits reversible local pH control
A research team led by Dr. Hyung-Suk Oh and Dr. Woong Hee Lee at the Clean Energy Research Center at Korea Institute of Science and Technology (KIST) has developed a silver-silica composite catalyst capable of reversible local pH control through a si.....»»
Biodiversity in the city: Designing urban spaces for humans and animals
Animals and plants also live and thrive on public squares. This creates opportunities for greater biodiversity and well-being for the human population. Researchers at the Technical University of Munich (TUM) have studied at 103 locations in Munich ho.....»»
IBM announces Autonomous Security for Cloud
IBM announced Autonomous Security for Cloud (ASC), an AI-powered solution from IBM Consulting designed to automate cloud security management and decision-making to help mitigate risk for organizations accelerating their cloud journey on Amazon Web Se.....»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
Moving graphene from the lab to fab: How 2D materials could transform everyday electronics
Graphene has lived up to its promise in the lab. Now, EU researchers are working on supporting its wider adoption in high-end electronics, photonics and sensors......»»
What is Bluesky, and should you join?
Bluesky is the hot new social network. But what exactly is it? Here's what you need to know about Bluesky......»»
Nature pays price for war in Israel"s north
Across northern Israel's lush, green nature reserves, the ecological toll of the war between Israel and Hezbollah militants is laid bare: wild boar hit by shrapnel, trees reduced to ashes and swathes of charred vegetation......»»
NIST report on hardware security risks reveals 98 failure scenarios
NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report hig.....»»
New infosec products of the week: November 15, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, BlackFog, Eurotech, Nirmata, Rakuten Viber, Syteca, and Vectra. Eurotech ReliaGATE 15A-14 enables organizations to meet regulatory standar.....»»
Using AI to drive cybersecurity risk scoring systems
In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for cybersecurity threats, and how AI is revolutionizing risk assessment and mana.....»»
AI’s impact on the future of web application security
In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-dri.....»»
Decline in West African coastal fish stocks threatens food security and livelihoods
Small-scale fisheries play a vital role in providing food and livelihoods for millions of people around the world, particularly in low-income countries in Africa. However, there is limited statistical data on the composition, abundance, and distribut.....»»
Climate change: Women"s role in the economy is key to a just transition
The realities of climate change are hitting home for many people living in the Global South. Food security, water access and health have been jeopardized by increased temperatures, extreme weather events and sea level rise......»»
Mathematical approach can predict crystal structure in hours instead of months
Researchers at New York University have devised a mathematical approach to predict the structures of crystals—a critical step in developing many medicines and electronic devices—in a matter of hours using only a laptop, a process that previously.....»»
Researchers shed light on the experiences of caregivers in Nunavut"s family service system
Researchers at the Umingmak Centre, a child advocacy center in Nunavut, and the University of Toronto's Ontario Institute for Studies in Education (OISE) have released a study that identifies systemic challenges in Nunavut's child welfare system—an.....»»
What determines support for EU-climate policy? Study reveals acceptance depends on inclusion of social policy measures
Climate change is one of the greatest challenges of our time, and the European Union has set itself ambitious targets to become climate-neutral by 2050. A new policy paper from the Cluster of Excellence "The Politics of Inequality" at the University.....»»