The evolution of deception tactics from traditional to cyber warfare
Admiral James A. Winnefeld, USN (Ret.), is the former vice chairman of the Joint Chiefs of Staff and is an advisor to Acalvio Technologies. In this Help Net Security interview, he compares the strategies of traditional and cyber warfare, discusses th.....»»
Hubble captures intricacies of R Aquarii, a symbiotic binary star roughly 700 light-years from Earth
The NASA/ESA Hubble Space Telescope has provided a dramatic and colorful close-up look at one of the most rambunctious stars in our galaxy, weaving a huge spiral pattern among the stars. Hubble's images capture its details and its evolution is featur.....»»
Detroit 3 suppliers face dilemmas on rapidly growing China EV business
As Ford, General Motors, Stellantis and other traditional automakers lose ground in China, their suppliers are scrambling to fill the void and preserve positions in what is now the world’s largest auto market. .....»»
Lookout offers protection against social engineering and executive impersonation attacks
Lookout announced new features for its Mobile Threat Defense (MTD) solution, Lookout Mobile Endpoint Security. These advancements provide comprehensive protection against two fast-growing advanced social engineering tactics: smishing (SMS phishing) a.....»»
New passkey specifications will let users import and export them
Passkeys were introduced two years ago, and they replace traditional passwords with more secure authentication using a security key or biometrics. To make the technology even better, the FIDO Alliance published on Monday new specifications for passke.....»»
New venomous reptile species from the Late Triassic unearthed in Arizona
A new species of small, venomous reptile, Microzemiotes sonselaensis, has been discovered in the Late Triassic Chinle Formation in northeastern Arizona. The findings, recently published in PeerJ, shed new light on the evolution of venomous feeding st.....»»
Accelerated three-year medical school students found to perform as well as peers in traditional four-year programs
Graduates who went to medical school for three years performed equally well on tests of skill and knowledge as their peers who followed a four-year program, a new study shows......»»
Data breaches trigger increase in cyber insurance claims
Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents, according to Allianz. Cyber claims frequency exceeds €1 million The frequency of large cyber claims (>€1 mill.....»»
How nation-states exploit political instability to launch cyber operations
In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact of geopolitical tensions on the frequency and sophistication of cyberattacks. He explains how nation-states a.....»»
New insights into grain boundary kinetics challenge traditional views
Researchers from City University of Hong Kong (CityUHK), in collaboration with experts from local and overseas universities, have reshaped scientists' fundamental understanding of the kinetic processes in crystalline materials, throwing light on new.....»»
Protecting the Olympics from cyber-attacks is no mean feat of athleticism
Protecting the Olympics from cyber-attacks is no mean feat of athleticism.....»»
Cells From Different Species Can Exchange ‘Text Messages’ Using RNA
Long known as a messenger within cells, RNA is increasingly seen as life’s molecular communication system—even between organisms widely separated by evolution......»»
CISOs’ strategies for managing a growing attack surface
In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation. Carlsson highlights the challenges CISOs face today, including mai.....»»
Research shows dating apps, sites are leading to more diverse couples
The so-called "traditional" way of dating has changed drastically over time, especially in the last decade. While most couples used to meet through families and friends or local organizations like church, according to University of New Mexico Sociolo.....»»
Evolution in real time: Scientists predict—and witness—evolution in a 30-year marine snail experiment
Snails on a tiny rocky islet evolved before scientists' eyes. The marine snails were reintroduced after a toxic algal bloom wiped them out from the skerry. While the researchers intentionally brought in a distinct population of the same snail species.....»»
Harnessing quantum principles: Phased arrays within phased arrays for smarter, greener indoor optical wireless networks
Imagine a future where indoor wireless communication systems handle skyrocketing data demands and do so with unmatched reliability and speed. Traditional radio frequency (RF) technologies like Wi-Fi and Bluetooth are beginning to struggle, plagued by.....»»
Machine learning could improve extreme weather warnings
Because small changes in atmospheric and surface conditions can have large, difficult-to-predict effects on future weather, traditional weather forecasts are released only about 10 days in advance. A longer lead time could help communities better pre.....»»
EU adopts Cyber Resilience Act to secure connected products
The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products tha.....»»
DORA regulation’s nuts and bolts
The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial market,.....»»
Data loss incidents impact patient care
92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to mitiga.....»»
Using ChatGPT to make fake social media posts backfires on bad actors
OpenAI claims cyber threats are easier to detect when attackers use ChatGPT. Using ChatGPT to research cyber threats has backfired on bad actors, OpenAI revealed in a report analy.....»»