Advertisements


Twitter sues hate-speech watchdog, following through on its litigation threat

Twitter has sued the Center for Countering Digital Hate (CCDH), a nonprofit group that has criticized the company's handling of hate speech, following through on a litigation threat that had been publicly revealed just hours before......»»

Category: topSource:  informationweekAug 1st, 2023

Missouri AG’s legal war against Media Matters shot down by federal judge

Judge: Missouri AG's actions chill speech about extremist content on Musk's X. Enlarge / Missouri Attorney General Andrew Bailey arrives to testify at House Homeland Security Committee hearing on Wednesday, January 10, 2024. (c.....»»

Category: topSource:  arstechnicaRelated NewsAug 26th, 2024

How engineered walnuts combat drought through grafting

Drought is a major threat to walnut production globally, often resulting in lower yields and weaker trees. While grafting has traditionally been used to improve the resilience of fruit and nut trees, the exact mechanisms of signal transfer between ro.....»»

Category: topSource:  theglobeandmailRelated NewsAug 26th, 2024

Tim Walz"s son Gus has a nonverbal learning disorder: What is that?

After his heartfelt reaction to his father's acceptance speech at the Democratic National Convention thrust him into the spotlight, 17-year-old Gus Walz has become one of the most high-profile people with nonverbal learning disorder......»»

Category: topSource:  physorgRelated NewsAug 26th, 2024

A new malware threat to macOS adds to the data-stealing surge

Mac users face another macOS threat that aims to steal your data and targets x86_64 and Arm architectures......»»

Category: topSource:  digitaltrendsRelated NewsAug 23rd, 2024

US sues RealPage, claims rental-pricing algorithm used by landlords is illegal

AG: Landlords use RealPage algorithm "to align their rents." Enlarge / US Attorney General Merrick Garland speaks during a news conference in Washington, DC, on Friday, August 23, 2024. (credit: Getty Images | Bloomberg).....»»

Category: topSource:  arstechnicaRelated NewsAug 23rd, 2024

These colorful diagrams show how air quality has changed in more than 100 countries since 1850

Air pollution is an unseen menace that poses a major threat to human health and the climate. We have created the air quality stripes, a visual tool that captures global air pollution trends, to bring this hidden threat into sharp focus......»»

Category: topSource:  physorgRelated NewsAug 23rd, 2024

How Twitter—now X—helps with understanding Canadian values and attitudes toward asylum seekers

The treatment of asylum seekers is an important issue for many countries as they grapple with polarized public views on the issue. Some policymakers focus on the need for border security to keep asylum-seekers out and "protect" their nations, while o.....»»

Category: topSource:  physorgRelated NewsAug 23rd, 2024

Researcher: Young Black people are disproportionately strip-searched—ways the justice system treats them as a threat

A new report from the Children's Commissioner for England has found that 457 strip searches of children by police took place between July 2022 and June 2023. The report shows that Black children were four times more likely, when compared to national.....»»

Category: topSource:  pcmagRelated NewsAug 22nd, 2024

Fighting coastal erosion with electricity

New research from Northwestern University has systematically proven that a mild zap of electricity can strengthen a marine coastline for generations—greatly reducing the threat of erosion in the face of climate change and rising sea levels......»»

Category: topSource:  physorgRelated NewsAug 22nd, 2024

Bulwark of blooms: The lily"s secret armor against plant pathogens

Fusarium wilt is a severe threat to the global cut-flower industry, particularly impacting lilies. Caused by Fusarium oxysporum, this disease results in significant economic losses due to plant decay and death. Traditional breeding methods have strug.....»»

Category: topSource:  physorgRelated NewsAug 21st, 2024

From embers to crisis: The expanding threat of wildfires under global warming

Globally, wildfires are on the rise, driven by climate change, which exacerbates droughts and high temperatures. These fires contribute significantly to carbon emissions and particulate matter (PM2.5), with severe consequences for both climate stabil.....»»

Category: topSource:  physorgRelated NewsAug 21st, 2024

PostgreSQL databases under attack

Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua Security researchers on a honeypot system – starts with the threat actors brute-forcing access.....»»

Category: securitySource:  netsecurityRelated NewsAug 21st, 2024

OpenCTI: Open-source cyber threat intelligence platform

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards. It features a modern web appl.....»»

Category: securitySource:  netsecurityRelated NewsAug 21st, 2024

Disney cancels The Acolyte after one season

Star Wars series was admittedly uneven, but didn't deserve the online hate it received. Enlarge / We have doubts that any amount of Force powers will bring the show back. (credit: YouTube/Disney+) In news that will del.....»»

Category: topSource:  arstechnicaRelated NewsAug 20th, 2024

Procreate defies AI trend, pledges “no generative AI” in its illustration app

Procreate CEO: "I really f—ing hate generative AI." Enlarge / Still of Procreate CEO James Cuda from a video posted to X. (credit: Procreate) On Sunday, Procreate announced that it will not incorporate generative AI in.....»»

Category: topSource:  arstechnicaRelated NewsAug 20th, 2024

GuidePoint Security releases Phishing as a Service

GuidePoint Security has launched a new Phishing as a Service (PhaaS) offering. Phishing remains one of the most common entry points for threat actors – according to CISA, over 90% of successful cyberattacks start with a phishing email. However, man.....»»

Category: securitySource:  netsecurityRelated NewsAug 20th, 2024

Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»

Category: securitySource:  netsecurityRelated NewsAug 20th, 2024

AI for application security: Balancing automation with human oversight

In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application security, exploring how it’s transforming threat detection and response. Wickert talks about integrating securi.....»»

Category: securitySource:  netsecurityRelated NewsAug 20th, 2024

UAW president uses DNC speech to threaten Stellantis, praise Harris

The union leader wore a shirt calling former President Donald Trump a scab and said workers will take action against Stellantis if it doesn't follow through on promises it made in last year's labor agreement......»»

Category: topSource:  autonewsRelated NewsAug 20th, 2024

Climate Change’s Latest Deadly Threat: Lightning Strikes

In rural India, stormy weather, a lack of knowledge, and scant protections are combining to kill thousands every year, with climate change likely to raise the threat as lightning becomes more common......»»

Category: gadgetSource:  wiredRelated NewsAug 19th, 2024