Phishing threats are increasingly convincing and evasive
In this Help Net Security video, Tonia Dudley, VP, CISO at Cofense, provides a look at the various changes seen in the phishing threat landscape. Dudley talks about the impact of credential phishing and business email compromise (BEC), which allow cy.....»»
Managing space debris through space law
It's becoming increasingly crowded in the orbits around Earth that are popular for space travel. And that's not just due to satellites—there's also more waste material, which is compromising safety. Ph.D. candidate Zhuang Tian is conducting researc.....»»
Global study shows demersal fishing affects ocean floor carbon storage
Scientists are growing increasingly concerned about the impact demersal fishing is having on climate change and the preservation of organic carbon stored in the seabed......»»
Novel metasurface enables temperature-adaptive radiative cooling
As the global energy crisis intensifies and climate change accelerates, finding sustainable solutions for energy management is increasingly urgent. One promising approach is passive radiative cooling, a technology that allows objects to cool by emitt.....»»
How to gamify cybersecurity preparedness
Organizations’ preparedness and resilience against threats isn’t keeping pace with cybercriminals’ advancements. Some CEOs still believe that cybersecurity requires episodic intervention rather than ongoing attention. That isn’t the reality f.....»»
The future of automotive cybersecurity: Treating vehicles as endpoints
The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, Principal.....»»
Viewpoint: In the face of DEI backlash, belonging plays a key role to future success
Diversity, equity and inclusion efforts have become increasingly visible in U.S. workplaces, especially over the past five years. However, DEI has recently come under attack, with companies scaling back their DEI plans......»»
You won"t be fooled by hysterical phishing emails, but you know people who will
Once again there's a new iCloud phishing email that is so poorly done that AppleInsider readers will be able to spot it, but will be shockingly effective to some susceptible to its hysteria, its appalling grammar, and its blinding font choices.Detail.....»»
Novel glass-forming liquid electrolyte shows glass transition across broad range
As the world shifts towards a more sustainable future, the development of advanced electrochemical devices, such as rechargeable batteries with higher energy densities and efficient electrodeposition capabilities, has become increasingly crucial. In.....»»
Protecting national interests: Balancing cybersecurity and operational realities
With cyber threats becoming increasingly sophisticated and targeting critical infrastructure, in this Help Net Security interview, David Ferbrache, managing director of Beyond Blue, discusses the current state of cybersecurity readiness and resilienc.....»»
Managing low-code/no-code security risks
Continuous threat exposure management (CTEM) – a concept introduced by Gartner – monitors cybersecurity threats continuously rather than intermittently. This five-stage framework (scoping, discovery, prioritization, validation, and mobili.....»»
How strategic litigation for asylum seekers can be effective
The rights of asylum seekers are under pressure. Nevertheless, politically this group has very little to gain. We can, therefore, expect a further rise in strategic litigation, a tactic that interest groups are increasingly using to protect the right.....»»
DEI policies work best when they are designed to include everyone and are backed by evidence, says researcher
As the U.S. becomes increasingly polarized, diversity, equity and inclusion—also known as DEI—efforts have been touted as a way to bridge social divides and promote a sense of belonging for everyone, especially for those who have been traditional.....»»
Opinion: AI should not be allowed to adjudicate cases in Canada"s Federal Court
Canadian society is progressing deeper into the digital age. Artificial intelligence (AI) technologies—like the generative AI ChatGPT and the legal platform Harvey—are increasingly shaping judicial processes and legal systems, including in the ad.....»»
Study reveals key strategies to combat urban heat vulnerability
A QUT study analyzing five decades of research and thousands of studies has identified five critical areas needed to tackle urban heat vulnerability (UHV), a growing issue impacting millions in increasingly heat-prone cities......»»
Cyber threats that shaped the first half of 2024
Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU) analyzed 3,438.....»»
Diverse crop rotations reduce risk of crop loss under poor growing conditions
Researchers at the U.S. Department of Agriculture's Agricultural Research Service (ARS) are responding to the increasingly uncertain climate. The warmer and more unpredictable weather has been a source of instability on U.S. farms. ARS agroecologists.....»»
Deepfakes: Seeing is no longer believing
The threat of deepfakes lies not in the technology itself, but in people’s natural tendency to trust what they see. As a result, deepfakes don’t need to be highly advanced or convincing to effectively spread misinformation and disinformat.....»»
The NIS2 Directive: How far does it reach?
The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»
Maintaining company confidentiality simultaneously hurts and helps workers" well-being
A hush has fallen over the workplace. At tech startups and banks, in doctors' offices and law firms, workers are increasingly being asked to keep secrets. These aren't personal confidences but organizational secrets about clients, proprietary technol.....»»
Old methods, new technologies drive fraud losses
GenAI, deepfakes and cybercrime are critical threats putting intensifying pressures on businesses, according to Experian. Top online security concerns for consumers According to the FTC, consumers reported losing more than $10 billion to fraud in 202.....»»