The hackers, known as RedAlpha, have taken aim at organizations including Amnesty International, the International Federation for Human Rights, Radio Free Asia, the Mercator Institute for China Studies, and other think tanks and government and humanitarian groups around the world. The hackers’ impact remains unclear, but judging from the sheer length of the campaign, analysts […]
Monthly Archives: August 2022
Modern security demands an empathy-first approach to insiders
Insider risk can occur anywhere within a company, by anyone. It can come from former disgruntled employees stealing artificial intelligence trade secrets or someone poached by a competitor taking mobile chip design secrets on their way out the door. It can even come from the C-suite, as one company learned recently when its CFO accidentally […]
What to expect when you’re expecting an extra X or Y chromosome
Katie and her husband, Simon, had never heard of XXY, and their obstetrician wasn’t much help either. Also known as Klinefelter syndrome, XXY is a genetic condition that can cause infertility and other health issues; it occurs when a child, typically assigned male at birth, is born with an extra X chromosome in addition to […]
Award worth $100,000 up for grabs for one woman in STEM + other grants available
Peter Griffin, Editor. 16 August 2022, 11:16 am A desire to see more deep tech start-ups led by women has led venture capital firm Pacific Channel to offer the Women in STEM Commercialisation Award, available to academics looking to commercialise their research. The award is made up of $5,000 cash, a $50,000 investment from Pacific […]
1,900 Signal users’ phone numbers exposed by Twilio phishing
Enlarge / Signal’s security-minded messaging app is dealing with a third-party phishing attempt that exposed a small number of users’ phone numbers. Getty Images reader comments 9 with 9 posters participating Share this story A successful phishing attack at SMS services company Twilio may have exposed the phone numbers of roughly 1,900 users of the […]
Update Zoom for Mac now to avoid root-access vulnerability
Enlarge / A critical vulnerability in Zoom for Mac OS allowed unauthorized users to downgrade Zoom or even gain root access. It has been fixed, and users should update now. Getty Images reader comments 48 with 31 posters participating, including story author Share this story If you’re using Zoom on a Mac, it’s time for […]
Using technology to power the future of banking
It required us to roll out video conferencing globally to our employees in a span of a weekend, which is not for the faint of heart. When you think about the 200,000 employees that we have, we were able to roll this out at that pace, which speaks not just to the technical powers we […]
Innovation talk with Australian Military Bank
Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” Enis Huseyin, chief information officer at Australian Military Bank, talks about the bank’s cloud-based transformation journey and its initiative around open banking. Click here to continue. Source: MIT Technology Review
Cybersecurity in the cloud-first computing era with Ofir Israel from Check Point
Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” Ofir Israel, VP of threat prevention products at Check Point Software Technologies discusses cloud and security. The discussion covers data processing in the cloud, and prevention and detection of cyberthreats. Click here to continue. Source: MIT Technology Review
AI will reshape health care—we will determine if it’s for better or worse
Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” Health care organizations have many emerging opportunities to apply artificial intelligence in new ways. To do it right, AI in health care should always begin with a patient-centered approach. Click here to continue. Source: MIT Technology Review