Tiger beetles fight off bat attacks with ultrasonic mimicry
Bats, as the main predator of night-flying insects, create a selective pressure that has led many of their prey to evolve an early warning system of sorts: ears uniquely tuned to high-frequency bat echolocation. To date, scientists have found at leas.....»»
Is there enough land on Earth to fight climate change and feed the world?
Capping global warming at 1.5°C is a tall order. Achieving that goal will not only require a massive reduction in greenhouse gas emissions from human activities, but also a substantial reallocation of land to support that effort and sustain the bios.....»»
Apple again supporting World Aids Day, donating $5 for every qualifying purchase
Apple is again supporting World Aids Day on December 1st, and will be donating $5 for every qualifying purchase between November 29 and December 8. This will be the 18th year in which Apple has supported The Global Fund, which seeks to fight HIV,.....»»
RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
Russia-aligned APT group RomCom was behind attacks that leveraged CVE-2024-9680, a remote code execution flaw in Firefox, and CVE-2024-49039, an elevation of privilege vulnerability in Windows Task Scheduler, as zero-days earlier this year. “Ch.....»»
First successful test of wild minke whales reveals they have ultrasonic hearing
A team of marine biologists from Norway, the U.S. and Denmark has conducted the first hearing test of a live baleen whale. For their study published in the journal Science, the group corralled a pair of wild minke whales and recorded their brain wave.....»»
"e-Drive": New gene drive reverses insecticide resistance in pests... then disappears
Insecticides have been used for centuries to counteract widespread pest damage to valuable food crops. Eventually, over time, beetles, moths, flies and other insects develop genetic mutations that render the insecticide chemicals ineffective......»»
Microsoft president asks Trump to “push harder” against Russian hacks
Brad Smith wants US to take a tougher approach to state-sponsored cyberattacks. Microsoft’s president has called on Donald Trump to “push harder” against cyber attacks from.....»»
2024 saw a surge in malicious free VPN apps
Cybercriminals increasingly use fake VPN apps to spread malware and launch other attacks. This is what's at stake......»»
Some older D-Link routers are vulnerable to attack
Older D-Link routers suffer a security flaw that exposes users to threats such as malware, DoS attacks, and more. See the reason why there is no fix......»»
Spatial interactomics tool maps protein interactions to fight lung cancer
As Ahmet F. Coskun and his team of researchers continue their mission to create a 3D atlas of the human body, mapping cells and tissues, they're making discoveries that could lead to better treatments for the most common type of lung cancer......»»
5 charged in “Scattered Spider,” one of the most profitable phishing scams ever
Phishing attacks were so well-orchestrated that they fooled some of the best in the business. Federal prosecutors have charged five men with running an extensive phishing scheme t.....»»
2,000 Palo Alto Networks devices compromised in latest attacks
Attackers have compromised around 2,000 Palo Alto Networks firewalls by leveraging the two recently patched zero-days (CVE-2024-0012 and CVE-2024-9474), Shadowserver Foundation’s internet-wide scanning has revealed. Compromised devices are pred.....»»
HP Enterprise Security Edition protects PC hardware and firmware from physical attacks
HP announced HP Enterprise Security Edition, a suite of security capabilities designed to enhance the physical security of HP business class PCs. HP Enterprise Security Edition includes multilayered safeguards to protect PC hardware and firmware from.....»»
Hornetsecurity DMARC Manager protects against fraud and phishing attacks
Hornetsecurity launched DMARC Manager, an advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud and im.....»»
The hidden disease risks of modern housing developments in rural Africa
Tamika Lunn went to Kenya looking for bats. Her task, as a postdoctoral researcher in the lab of U of A biologist Kristian Forbes, was to catch bats to understand if, when and why they carried viruses. A spillover of a bat virus to humans could lead.....»»
Ranchers again ask Colorado wildlife officials to delay release of next round of wolves
Colorado ranchers are renewing their demand for state wildlife officials to delay the release of more wolves until they finalize more programs to prevent attacks on livestock......»»
Netflix’s Mike Tyson vs. Jake Paul fight hit with severe technical glitches
Mike Tyson vs. Jake Paul may be one of Netflix's biggest sporting events to date, but the streamer has failed to keep it going without glitches......»»
Mike Tyson vs. Jake Paul: How to watch the fight live on Netflix
Mike Tyson vs. Jake Paul: How to watch the fight live on Netflix.....»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
Watch Jake Paul vs. Mike Tyson boxing match: start time, fight card, live-stream information
One of the biggest fights of the year goes down on Friday night when Jake Paul battles Mike Tyson in a boxing match. Find out how to stream the epic event......»»
USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»