Teen in jail for "sarcastic" Facebook threat
A seemingly sarcastic Facebook comment has landed a 19-year-old Texan in jail for more than four months......»»
Man posing as teen YouTuber gets 17 years for horrific global sextortion scheme
Australian police called it "one of the worst sextortion cases in history." Enlarge (credit: Artur Debat | Moment) Content warning: The following story describes instances of animal abuse. An Australian man who.....»»
At 30, TV’s greatest teen drama remains as wonderful as you remember
Tragically canceled after just one season, My So-Called Life nonetheless became a hallmark of TV drama that launched the careers of Claire Danes and Jared Leto......»»
Dragos Platform updates streamline OT threat and vulnerability workflows
Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial and critical infrastructure organizations with even deeper and enriched visibility into all assets in thei.....»»
Hillstone Networks unveils StoneOS 5.5R11 to enhance threat protection
Hillstone Networks has launched the latest version of its operating system, StoneOS 5.5R11. This update includes over 200 new functionalities and improvements designed to enhance threat protection and facilitate enterprise network operations in an in.....»»
Mark Zuckerberg regrets not pushing back on Biden’s COVID “pressure” campaign
Facebook is "ready to push back" on government takedown requests, Meta CEO says. Enlarge / Mark Zuckerberg. (credit: Bloomberg / Contributor | Bloomberg) After years of bickering with the Biden administration about vacci.....»»
Half of enterprises suffer breaches despite heavy security investments
Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies t.....»»
New research shows that online ads have limited impact on consumer valuations for Facebook
Policymakers are increasingly debating the relative social costs and benefits of digital advertising. While ads typically benefit platforms and advertisers, do they disadvantage consumers? In a new study, researchers have analyzed advertising on Face.....»»
How engineered walnuts combat drought through grafting
Drought is a major threat to walnut production globally, often resulting in lower yields and weaker trees. While grafting has traditionally been used to improve the resilience of fruit and nut trees, the exact mechanisms of signal transfer between ro.....»»
A new malware threat to macOS adds to the data-stealing surge
Mac users face another macOS threat that aims to steal your data and targets x86_64 and Arm architectures......»»
These colorful diagrams show how air quality has changed in more than 100 countries since 1850
Air pollution is an unseen menace that poses a major threat to human health and the climate. We have created the air quality stripes, a visual tool that captures global air pollution trends, to bring this hidden threat into sharp focus......»»
Researcher: Young Black people are disproportionately strip-searched—ways the justice system treats them as a threat
A new report from the Children's Commissioner for England has found that 457 strip searches of children by police took place between July 2022 and June 2023. The report shows that Black children were four times more likely, when compared to national.....»»
Everyone can now cross-post from Instagram and Facebook to Threads
Back in May, Meta started testing the ability to cross-post from Instagram to Threads, and the company is now rolling this out to everyone. The feature also lets you cross-post from Facebook, continuing Meta’s integration of its three different.....»»
Fighting coastal erosion with electricity
New research from Northwestern University has systematically proven that a mild zap of electricity can strengthen a marine coastline for generations—greatly reducing the threat of erosion in the face of climate change and rising sea levels......»»
Bulwark of blooms: The lily"s secret armor against plant pathogens
Fusarium wilt is a severe threat to the global cut-flower industry, particularly impacting lilies. Caused by Fusarium oxysporum, this disease results in significant economic losses due to plant decay and death. Traditional breeding methods have strug.....»»
From embers to crisis: The expanding threat of wildfires under global warming
Globally, wildfires are on the rise, driven by climate change, which exacerbates droughts and high temperatures. These fires contribute significantly to carbon emissions and particulate matter (PM2.5), with severe consequences for both climate stabil.....»»
PostgreSQL databases under attack
Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua Security researchers on a honeypot system – starts with the threat actors brute-forcing access.....»»
OpenCTI: Open-source cyber threat intelligence platform
OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards. It features a modern web appl.....»»
Bali gives a snapshot of what "overtourism" looks like in the developing world
Barcelona residents marched against tourists in July after similar protests in Venice earlier in 2024. Recently, residents of Santorini in Greece were in uproar after a Facebook post reportedly asked them to stay home and make room for the thousands.....»»
GuidePoint Security releases Phishing as a Service
GuidePoint Security has launched a new Phishing as a Service (PhaaS) offering. Phishing remains one of the most common entry points for threat actors – according to CISA, over 90% of successful cyberattacks start with a phishing email. However, man.....»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»