Security Bite: Here’s what malware your Mac can detect and remove
Ever wonder what malware macOS can detect and remove without help from third-party software? Apple continuously adds new malware detection rules to Mac’s built-in XProtect suite. While most of the rule names (signatures) are obfuscated, with a bit.....»»
"Living" ceramics utilize bacteria for gas sensing and carbon capture
A team of materials scientists and chemists at ETH Zürich has developed a way to make "living" ceramics that can detect small amounts of formaldehyde and capture carbon dioxide from the air. In their project, reported in the journal Advanced Materia.....»»
Biosensors mimic human olfactory system to discriminate between very similar odors
The human olfactory system discriminates between thousands of odors by interacting specifically with olfactory receptors on sensory neurons. Each receptor can detect several odorants at different intensities, and the same odorant can activate more th.....»»
Growing safer spuds: Removing toxins from potatoes
Scientists have discovered a way to remove toxic compounds from potatoes, making them safer to eat and easier to store. The breakthrough could cut food waste and enhance crop farming in space and other extreme environments......»»
Miniature sensor that detects toxic gas shows promising results in the lab
A team of scientists at UNSW Sydney have developed a highly sensitive miniature sensor that is able to detect low levels of the toxic gas nitrogen dioxide (NO2). The tiny, flexible sensor can detect the harmful gas in real-time without requiring an e.....»»
Chrome is getting a new AI-powered scam detection tool
A new feature coming to Google Chrome will leverage the power of AI to help detect potential scams on websites. The post Chrome is getting a new AI-powered scam detection tool appeared first on Phandroid. There are many websites out there.....»»
New infosec products of the week: December 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian unveiled a.....»»
AI is becoming the weapon of choice for cybercriminals
AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»
Why cybersecurity is critical to energy modernization
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»
ChatGPT"s Mac app gets a glowup with new coding and notetaking features
OpenAI releases Mac desktop ChatGPT features......»»
ChatGPT just got a bump to its coding powers
OpenAI announced Thursday that its ChatGPT desktop Mac UI can now collaborate with a wider range of coding and composition apps......»»
M4 Mac mini proves Apple has fixed its biggest mistakes of the past
Apple’s M4 Mac mini is a surprisingly and wildly successful product. Per our homepage poll, it’s readers’ favorite product of the year—by far. Why is it such a hit? Because it’s the strongest evidence yet that Apple has learned from past mi.....»»
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions.....»»
CISA orders federal agencies to secure their Microsoft cloud environments
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»
Astronomers detect new 1.9-second pulsar using FAST
Using the Five-hundred-meter Aperture Spherical radio Telescope (FAST) in China, astronomers have discovered a new pulsar with a spin period of about two seconds. The newly detected pulsar, designated PSR J1922+37, was found in the direction of open.....»»
First-of-its-kind study uses remote sensing to monitor plastic debris in rivers and lakes
A first-of-its-kind study from researchers at the University of Minnesota Twin Cities shows how remote sensing can help monitor and remove plastic debris from freshwater environments like the Mississippi River......»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Are threat feeds masking your biggest security blind spot?
Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind spo.....»»
Enpass simplifies compliance and security controls for password management
Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further enhancing.....»»
Netwrix 1Secure enhances protection against data and identity access risks
Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome the la.....»»
Ukrainian hacker gets prison for infostealer operations
Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service (MaaS)......»»