Recent whale deaths highlight risks from Antarctica"s booming krill fishery
Two humpback whales were found dead and another seriously injured this year in huge nets used to collect krill for fishmeal and omega-3 pills near Antarctica, The Associated Press has learned......»»
Ethical framework aims to counter risks of geoengineering research
As interest grows in geoengineering as a strategy for tackling global warming, the world's largest association of Earth and space scientists has launched an ethical framework as a guide to responsible decision-making and inclusive dialogue......»»
IBM Guardium Data Security Center protects hybrid cloud and AI
As hybrid cloud-, AI-, and quantum-related risks upend the traditional data security paradigm, IBM is launching IBM Guardium Data Security Center – allowing organizations to protect data in any environment, throughout its full lifecycle, and with.....»»
Study suggests frogs and toads will face new risks as water habitats dry up due to global warming
A small international team has found that anurans such as frogs and toads will be facing increased risks to their survival in the coming years due to water habitats drying up as a result of global warming......»»
The case of a robot shark in a marine park raises questions about animal welfare
After five years of renovation, Shenzhen's Xiaomeisha Sea World finally opened its doors to the public. But the marine park soon found itself the object of international discussion as it was revealed their advertised real whale shark was actually a r.....»»
Right whale population grows 4% but extinction remains a threat
One of the rarest species of whale in the world has increased slightly in population, encouraging conservationists to call on the federal government and the shipping and fishing industries to do more to bring the giant animals back from the brink of.....»»
Addressing online gender violence requires both culture and policy change
More and more of our lives are being spent on digital platforms. And, as we spend more time online, we are more vulnerable to a wide range of risks. This fact is particularly true for women and girls......»»
What to do if your iPhone or Android smartphone gets stolen?
A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their personal and professional lives stored on their phones, a fact that criminals are well aware of. Cybersecurity risks resulti.....»»
Android 15’s security and privacy features are the update’s highlight
New tools aim at phone snatchers, snooping kids or partners, and cell hijackers. Android 15 started rolling out to Pixel devices Tuesday and will arrive, through various third-par.....»»
Biden’s Withdrawal Made Containing War in the Middle East Harder
As tensions soar in the Middle East, the president’s lame duck status hinders efforts to manage the escalation of risks in the region.....»»
Okta helps protect business before, during and after authentication
Okta announced new Workforce Identity Cloud capabilities to address top security challenges such as unmanaged SaaS service accounts, governance risks, and identity verification. As part of a unified approach, these innovations help protect business b.....»»
Global north"s growing appetite for farmed salmon imperils communities" access to local fish, study warns
A paper published in Science Advances exposes the global aquaculture sector's growing dependence on wild fish. Despite industry claims to the contrary, these findings highlight how the growing appetite for expensive farmed salmon can leave coastal co.....»»
Product showcase: Secure and scale your network with NordLayer’s advanced security solutions
Cybersecurity threats have become increasingly prevalent and sophisticated in recent years, posing significant risks to businesses of all sizes. In 2023, there were 3,122 data breaches affecting approximately 349 million victims, highlighting the urg.....»»
AI affects everyone—including Indigenous people
Since artificial intelligence (AI) became mainstream over the past two years, many of the risks it poses have been widely documented. As well as fueling deep fake porn, threatening personal privacy and accelerating the climate crisis, some people bel.....»»
New iPhone SE 4 case leak highlights three things to expect
Apple leaker Sonny Dickson has posted an apparent image of a case designed for the upcoming 4, which is expected to launch next spring. Although the images don’t showcase any groundbreaking new details, they do highlight some things that we should.....»»
All upcoming PS5 games: 2024, 2025, and beyond
There are plenty of upcoming PlayStation 5 games to look forward to, and here we highlight the system's most anticipated titles......»»
On US coast, wind power foes embrace "Save the Whales" argument
Whether from real concern for marine animals or doubts about renewable energy, the anti-wind power movement has been growing along the US East Coast, with some trying to blame a surge in whale strandings on the growth of offshore energy projects......»»
Unlocking the power of cryptographic agility in a quantum world
In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by quantum computing. Cryptographic agility enables organizations to seamlessly tran.....»»
Save up to 35% with the Sony WH-CH520 Headphones!
The WH-CH520 Headphones feature up to 50 hours of battery life, custom EQ profiles, and more. The post Save up to 35% with the Sony WH-CH520 Headphones! appeared first on Phandroid. While the highlight of Sony’s audio gear selection.....»»
Qualys Enterprise TruRisk Management unifies asset inventory and risk factors
Qualys launched the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM). The solution enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data into actionable insights that.....»»
Widening talent pool in cyber with on-demand contractors
Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make.....»»