US gov’t will slap contractors with civil lawsuits for hiding breaches
Civil Cyber-Fraud Initiative mandates data-breach reporting for gov't contractors. (credit: Stephen Melkisethian) In a groundbreaking initiative announced by the Department of Justice this week, federal contractors will be sue.....»»
Three R.I. Grieco stores to pay $557K for deceptive sales
The combined sum three Rhode Island dealerships must pay for alleged deceptive trade includes $457,815 to customers and $100,000 to the Office of the Attorney General for costs of the investigation and lawsuits......»»
Data breaches must be reported within 4 days, says SEC
There have been many cases of US companies covering up serious personal data breaches for months at a time – often only admitting to them when an outside source learns of it. This isn’t possible in Europe, where the law requires unauthorized acc.....»»
Ex-intel officer says US hiding info on alien craft
We are not alone—and American authorities are covering up the evidence, a former US intelligence officer told a congressional committee on Wednesday......»»
Companies encounter months-long delays in filling critical security positions
A lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches, according to Swimlane. The research investigated the perceptions of cybersecurity among o.....»»
Forgotten tropical plants rediscovered after 100+ years with the help of community science
Deep in the tropical Andes are hiding plants that were discovered and then forgotten; plants that we knew almost nothing about. Now, thanks to the combined efforts of botanists from Germany, Ecuador, Peru and Costa Rica and amateur plant enthusiasts,.....»»
How to switch users on the lock screen in macOS Sonoma
If you have to share a Mac, then macOS Sonoma has the potential to confuse because of an elegant yet easily missable design choice on the lock screen. Here's how to use the new user switch feature in the fall.There are two other users hiding behind t.....»»
Political violence more acceptable in former Confederate states than Union and border states, research finds
Roughly 160 years after the end of the Civil War, division among residents of the North and South lingers, according to researchers......»»
Data breaches: Corporations want to make us pay, not spend money on security
IBM’s latest report on data breaches reveals attackers are now more interested in stealing personal data for identity theft than they are simply taking credit card details. It also found that big companies would rather just pass on the costs to co.....»»
The Supreme Court Should Back Firearms Restraints That Save Lives
Vast evidence shows firearms restrictions in civil protection orders save lives.....»»
Someone new will join the US military’s roster of launch contractors
Will Jeff Bezos's Blue Origin finally join the ranks of ULA and SpaceX? Enlarge / Nine main engines propel a SpaceX Falcon 9 rocket off its launch pad earlier this year. (credit: SpaceX) The US Space Force, long content.....»»
Temu and Shein lawsuits show reality of bitter fight for bargain shoppers
Temu has sued Shein in the United States, accusing its rival of violating antitrust laws by trying to monopolize suppliers and engaging in other allegedly illegal behavior......»»
What to do (and what not to do) after a data breach
Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at Skyhigh Security,.....»»
Walking the moral tightrope: Exploring the effect of the Trump presidency on the civil service
During his presidency, Donald Trump and members of his administration repeatedly accused federal civil servants of undermining their agenda through the "deep state." They sought to curtail career employees' workplace protections, sought to severely c.....»»
"Stunning" cache of gold coins found in Kentucky cornfield
A trove of more than 700 gold coins dating back to the US Civil War found buried in a cornfield in the state of Kentucky is being put up for sale and is expected to reap millions......»»
PSA: A simple solution to an annoying problem with podcasts and videos
You know those times when you realise an annoying problem has such a simple solution that you want to slap yourself for not thinking of it earlier? So blindingly obvious, in fact, that it seemed silly to even mention it to anyone else – until YouT.....»»
Study finds potentially harmful chemicals lingered in homes affected by Marshall Fire
Potentially harmful chemicals generated by the Marshall Fire in late 2021 may have lingered inside some Boulder County homes for weeks after the disaster—hiding in small particles of dust that residents could have mixed back into the air when they.....»»
Apple Vision Pro research and early work was hidden in plain sight
From patents for 'smart rings' to ones for projecting a Mac's desktop out onto the wall, Apple has been hiding Apple Vision Pro in plain sight for years.Why didn't we see what was right in front of our faces?Over the last decade, there must have been.....»»
How ransomware impacts the healthcare industry
Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, discusses how vi.....»»
French Apple Stores attacked by rioters in week-long civil unrest
An Apple Store has been caught up in ongoing riot in France, with the Strasbourg location ransacked by opportunist rioters on Friday.Strasbourg Apple StoreCivil unrest in Paris and other areas of France has led to a week of riots, with property damag.....»»
One third of security breaches go unnoticed by security professionals
While surface-level confidence around hybrid cloud security is high, with 94% of global respondents stating their security tools and processes provide them with complete visibility and insights into their IT infrastructure, the reality is nearly one.....»»