Wild tomato genome will benefit domesticated cousins
A team of researchers has assembled a reference genome for Solanum lycopersicoides, a wild relative of the cultivated tomato, and developed web-based tools to help plant researchers and breeders improve the crop......»»
Grand prize winner removed 20 Burmese pythons from the wild in Florida challenge
Grand prize winner removed 20 Burmese pythons from the wild in Florida challenge.....»»
Scientists quantify energetic costs of the migratory lifestyle in a free flying songbird
Millions of birds migrate every year to escape winter, but spending time in a warmer climate does not save them energy, according to research by the Max Planck Institute of Animal Behavior (MPI-AB). Using miniaturized loggers implanted in wild blackb.....»»
Primates bond for their own benefit: Study underlines the decisive role that females play
Female and male primates often form close bonds, but not purely out of affection. Close relationships usually evolve when there is a clear benefit for both parties, with protection and reproductive control playing key roles......»»
Scientists from 33 European countries join forces to generate reference genomes for the continent"s biological diversity
In a new publication, the European Reference Genome Atlas (ERGA) announces the success of its pilot project. This initiative assembled a large collaborative network of scientists and institutions across 33 countries to produce high-quality reference.....»»
5 games we want to see running on PS5 Pro: Black Myth, Stellar Blade, and more
From Black Myth: Wukong to Stellar Blade, there are many games that could benefit from PS5 Pro enhancements......»»
Researchers find evidence that bumblebees make the same memory errors as humans
Psychologists at the University of Stirling have carried out research that shows wild bumblebees make the same memory errors as humans......»»
Compliance frameworks and GenAI: The Wild West of security standards
In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional software. Unlike predictable software, GenAI introduces dynamic, evolving threats, requiring new strategies for d.....»»
watchOS 11: everything you need to know about the Apple Watch update
There are a number of new and updated tools for the Apple Watch in watchOS 11. Here are the features we like the most and how you can benefit from using them......»»
Ethics of biobanking for conservation: Researchers adjust ethical assessment tool for the use of genome research banks
In the face of the global biodiversity crisis, more and more biobanks are being set up to safeguard and potentially restore genetic diversity. Preserved tissue or cells allow scientists and conservationists to overcome spatial and even temporal fragm.....»»
Remembering where your meals came from key for a small bird’s survival
For small birds, remembering where the food is beats forgetting when it's gone. Enlarge (credit: BirdImages) It seems like common sense that being smart should increase the chances of survival in wild animals. Yet for a.....»»
GAZEploit could work out Vision Pro user passwords from watching their avatars [Fixed]
Security researchers came up with a pretty wild Vision Pro exploit. Dubbed GAZEploit, it’s a method of working out the passwords of Vision Pro users by watching the eye movements of their avatars during video calls. They’ve put together a YouT.....»»
Adobe Acrobat Reader has a serious security flaw — so patch now
A bug allows threat actors to launch malicious code on Acrobat Reader remotely, and it's already being used in the wild......»»
GAZEploit can work out Vision Pro user passwords from watching their avatars
Security researchers have come up with a pretty wild Vision Pro exploit. Dubbed GAZEploit, it’s a method of working out the passwords of Vision Pro users by watching the eye movements of their avatars during video calls. They’ve put together a.....»»
The olive tree"s blueprint: Key insights into high-quality oil production
A pivotal study has decoded the genetic basis of olive oil production, revealing a key regulatory mechanism that shapes oil biosynthesis. By mapping the olive tree's genome and metabolic pathways, researchers have identified how MYC2, a critical tran.....»»
Apple says new iPhone 16 design makes battery replacements easier
The iPhone 16 features a new internal design that comes with a big benefit to repairability. Apple says the iPhone 16 and iPhone 16 Plus have been “reengineered” to make battery service easier and offer improved performance and thermals. more.....»»
DNA demethylation boosts tomato resistance to gray mold, study finds
Postharvest decay in fruits, primarily caused by pathogenic fungi, remains a major obstacle to agricultural sustainability and food security. Despite advances in fungicides and storage technologies, losses remain substantial, especially in developing.....»»
Four plants eaten by gorillas, also used in traditional medicine, provide clues for new drug discovery
Four plants consumed by wild gorillas in Gabon and used by local communities in traditional medicine show antibacterial and antioxidant properties, find Leresche Even Doneilly Oyaba Yinda from the Interdisciplinary Medical Research Center of Francevi.....»»
Genomic analysis confirms the uniqueness of Iberian red deer in Europe
A genome study of more than 700 European red deer has identified four distribution areas on the continent (Norway, Scotland, Spain and Central Europe), each with their own genetic characteristics that need to be preserved.....»»
International team decodes the genome of the Greenland shark
The Greenland Shark (Somniosus microcephalus), an elusive dweller of the depths of the northern Atlantic and the Arctic Ocean, is the world's longest-living vertebrate, with an estimated lifespan of about 400 years......»»
Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes
September 2024 Patch Tuesday is here and Microsoft has delivered 79 fixes, including those for a handful of zero-days (CVE-2024-38217, CVE-2024-38226, CVE-2024-38014, CVE-2024-43461) exploited by attackers in the wild, and a Windows 10 code defect (C.....»»