Sunday, June 26, 2022

How quantum computing could change the world

How quantum computing could change the world | McKinsey & Company Good roundup of articles. None of them about quantum malware.

Social justice digital age

So check it out - digital capitalism means what? In leading the work, James will be connecting with a wide range of people thinking about and taking action on issues of social justice that emerge from, or engage with, digital technology. In his Medium blog, he sets out more of his thinking on how the work will progress.

Best spot treatment 2022

Best spot treatment 2022: Acne creams to clear pores and fight inflammation | The Independent: "These fast-acting, blemish-busting hydrocolloid patches exceeded our expectations and they’re a great affordable alternative to the pricier spot patches on the market."

Monday, June 20, 2022

What does #DigitalHealth mean to Oxford Open Digital Health? The newest #OpenAccess #medicaljournal has been developed to incorporate the latest guidelines and classifications from the World Health Organization. Learn more about the frameworks' inclusion: https://t.co/wzhtAddSb1

Check for PA? OxfordJournals (@Oxford Journals) Tweeted: What does #DigitalHealth mean to Oxford Open Digital Health? The newest #OpenAccess #medicaljournal has been developed to incorporate the latest guidelines and classifications from the World Health Organization. Learn more about the frameworks' inclusion: https://t.co/wzhtAddSb1 https://twitter.com/oxfordjournals/status/1534943498566176768?s=27&t=KtRnT4ii_6JOgIVtTwD3Ig

Sunday, June 19, 2022

One key problem has 1 in 4 expats ‘seriously considering’ or ‘planning’ to renounce U.S. citizenship

Google News - One key problem has 1 in 4 expats 'seriously considering' or 'planning' to renounce U.S. citizenship
https://www.cnbc.com/2022/06/17/1-in-4-expats-seriously-considering-renouncing-us-citizenship.html

Mind that satellite! The mission to clean up dangerous space junk

Mind that satellite! The mission to clean up dangerous space junk | Space | The Guardian: "More than 8,000 tonnes of space junk now circle the planet, a mix of spent rocket parts, dead satellites and fragments of hardware that are doing their best to defy the rule that what goes up must come down. Far above the drag of the atmosphere, old space kit can stay aloft for centuries, millennia even, where it can smash into other objects."

Saturday, June 18, 2022

The Unrecognized Prevalence of Primary Aldosteronism

The Unrecognized Prevalence of Primary Aldosteronism: A Cross-sectional Study: Annals of Internal Medicine: Vol 173, No 1: "These findings redefine the primary aldosteronism syndrome and implicate it in the pathogenesis of “essential” hypertension."

The Unrecognized Prevalence of Primary Aldosteronism - PMC

The Unrecognized Prevalence of Primary Aldosteronism - PMC: "To characterize the prevalence of nonsuppressible renin-independent aldosterone production, as well as biochemically overt primary aldosteronism, in relation to blood pressure."

Wednesday, June 15, 2022

Lifta still empty

The COVID-19 pandemic sparked a cyber-crime boom | Wealth Professional

The COVID-19 pandemic sparked a cyber-crime boom | Wealth Professional: "Figures from Canada's national anti-fraud agency shows increase in reports of cyber-related scams."

Why the fate of the metaverse could hang on its security | VentureBeat

Why the fate of the metaverse could hang on its security | VentureBeat: "Cyberattacks old and new will inevitably find their way into the metaverse, highlighting a requirement for immersive virtual worlds to provide strong security from their inception."

Navigating The Threat Landscape 2021 – From Ransomware to Botnets

Navigating%20The%20Threat%20Landscape%202021%20%u2013%20From%20Ransomware%20to%20Botnets: Newer botnets continue to emerge as old ones keep transforming to sidestep the current security solutions. This is because cyber-criminals see a new paradigm with botnets-as-a-service where bonnets can be leased/sold to corporations or individuals for nefarious uses and financial benefits.

THE DRIVERS OF TECH HARMS

What%20Drives%20Tech%u2019s%20Externalities%3F: "Technology’s greatest harms result from the interplay of three underlying drivers: 1) mental models, 2) structures, and 3) behaviors."

Here's why closing the skills gap is key to digitalization | World Economic Forum

Here's why closing the skills gap is key to digitalization | World Economic Forum: "The cybersecurity skills gap becomes more acute as new technologies create more complex digital supply chains."

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques: "The group’s primary motivation seems to be cyberespionage: the list of its victims includes high value targets such as government and educational institutions, religious movements, pro-democracy and human rights organizations in Hong Kong, Covid-19 research organizations, and the media, among others. However, the threat actor also seems to be financially motivated, as it also took aim at gambling and cryptocurrency companies."

Information Security (InfoSec): The Complete Guide

Information Security (InfoSec): The Complete Guide: "Although both security strategies, cybersecurity and information security cover different objectives and scopes with some overlap. Information security is a broader category of protections, covering cryptography, mobile computing, and social media. It is related to information assurance, used to protect information from non-person-based threats, such as server failures or natural disasters. In comparison, cybersecurity only covers Internet-based threats and digital data. Additionally, cybersecurity provides coverage for raw, unclassified data while information security does not."

Open source is becoming a national security risk

Chris Wysopal: Open source is becoming a national security risk | CSO Online: "And of those enterprise customers, 95% of those customers were using Java. So that just shows you how popular Java is; if there is another vulnerability like this in Java, it is going to be widespread. And 88% were using Log4j and 58% were using the vulnerable version."

Threat actor uses HP iLO rootkit to wipe servers - The Record by Recorded Future

Threat actor uses HP iLO rootkit to wipe servers - The Record by Recorded Future: "a first-of-its-kind rootkit that hides inside the firmware of HP iLO devices and which has been used in real-world attacks to wipe servers of Iranian organizations."

The Call for Applied Research on Offensive Security Tool Release | Chris Sanders

The Call for Applied Research on Offensive Security Tool Release | Chris Sanders: "Industry insiders and outsiders have debated the merits of sharing offensive tools since the 1980s. Proponents primarily argue that releasing offensive tools helps push defense forward by forcing preventive and detective adaptation. Detractors say that releasing these tools does more harm than good, with many organizations unable to adapt quickly enough to prevent damage."

State of Secrets Sprawl on GitHub - 2021 report - GitGuardian Blog

State of Secrets Sprawl on GitHub - 2021 report - GitGuardian Blog: "The State of Secrets Sprawl report, measures the exposure of secrets within public repositories on GitHub and how this serious threat is evolving year to year. Through the report we can show a 20% year-over-year increase with the number of secrets found in public GitHub. Interestingly, 15% of leaks on GitHub occur within public repositories owned by organizations and 85% of the leaks occur on developers’ personal repositories, this data clearly illustrates the complexity of secrets sprawl."

Bugs in Our Pockets: The Risks of Client-Side Scanning - Lawfare

Bugs in Our Pockets: The Risks of Client-Side Scanning - Lawfare: "The new proposal is client-side scanning, scanning content on a user’s device prior to its encryption or after decryption. Supporters of the technology argue that such scanning can uncover child sexual abuse material (CSAM) without putting people’s privacy at risk."

Action Fraud UK

Action Fraud: "Action Fraud has launched a national awareness campaign to urge the public to think twice before handing over money and personal information when booking holidays."

Monday, June 13, 2022

Watch Jean-Luc Godard read a stirring Hannah Arendt excerpt

Watch Jean-Luc Godard read a stirring Hannah Arendt excerpt
https://faroutmagazine.co.uk/watch-jean-luc-godard-read-hannah-arendt-excerpt/

Primary Hypertension vs Secondary Hypertension

Primary Hypertension vs Secondary Hypertension - PlushCare: "The difference between primary hypertension and secondary hypertension is the causes related to each. Primary hypertension does not have a definitive cause, while secondary hypertension has a known cause. Both primary and secondary hypertension result in high blood pressure."

Front End Service - Contracts Finder

Front End Service - Contracts Finder "UKVI's strategic ambition for FES (UK) is to create a streamlined, digitised and accessible application service ... and facilitate opportunities to generate revenue that align with customer demand."