• shop.battle.net
    The post Support CureDuchenne with The Reven Pack in World of Warcraft appeared first on Xbox Wire.
    0 Comments ·0 Shares ·112 Views
  • UK startup taps last-mile delivery algorithms to bring a nurse to you
    thenextweb.com
    Two years ago, the minds behind Testing for All a Covid-era at-home testing service launched a new startup. But instead of those dreaded antigen tests that make you feel like youre trying to tickle your brain with a cotton swab, the company delivers something much more comforting: a trained nurse or doctor.The London-basedventure is called Heim Health. Itworks with the private sector and the NHS to match patients with the best practitioners in their area. Once paired, the platform uses algorithms borrowed from delivery apps to map the fastest routes and schedule the most convenient time for the appointment. Less time wasted in traffic means more patients seen per shift. And Heim even ensures any necessary equipment shows up before your nurse does.Specialist care is becoming increasingly bottlenecked, with waiting lists at an all-time high and discharge delays keeping patients in hospital longer than they need, said Kelly Klifa, co-founder and CEO at Heim Health, and former founder of Testing for All (pictured top left).Our mission with Heim Health is to build the digital infrastructure needed to change this; revitalising community-based care and moving more healthcare from the hospital into the home through scalable modes of delivery.Register NowDuring the height of the pandemic, Klifa launched Testing for All alongside James Monico. It was the UKs only not-for-profit Covid testing service, delivering more than 1 million at-home tests. In 2022, the pair teamed up with entrepreneur Sasha Tory (pictured top right) to expand the concept to at-home healthcare.Today, Heim Health announced it has raised 2.2mn (2.5m) in seed funding. The round was led by Heal Capital and joined by Form Ventures, Portfolio Ventures and Houghton Street Ventures.This fresh capital will help Heim Health to fine-tune its algorithms and support a wider range of healthcare services, including furthering its work with the NHS. The company said its long-term mission is to ease pressure on hospitals and provide patients with better care.Heim is already getting good feedback, it said. According to the company, healthcare providers have seen patient waiting slashed up to 85% by using the platform. Story by Sin Geschwindt Sin is a climate and energy reporter at TNW. From nuclear fusion to escooters, he covers the length and breadth of Europe's clean tech ecos (show all) Sin is a climate and energy reporter at TNW. From nuclear fusion to escooters, he covers the length and breadth of Europe's clean tech ecosystem. He's happiest sourcing a scoop, investigating the impact of emerging technologies, and even putting them to the test. Sin has five years journalism experience and holds a dual degree in media and environmental science from the University of Cape Town, South Africa. Get the TNW newsletterGet the most important tech news in your inbox each week.Also tagged with
    0 Comments ·0 Shares ·87 Views
  • Security Bite: Why email security is still so bad
    9to5mac.com
    Its a little-known fact that before emails reach your inbox, they pass through a buffer designed to scan and block malicious content. However, over time, email providersespecially Gmailhave shifted their focus to just adding warning labels to those with suspicious links or attachments. This approach, best described as beating around the bush hasnt reduced threats much at all. Shockingly, 91% of all cyberattacks still originate from emails. So, what gives?9to5Mac Security Bite is exclusively brought to you by Mosyle,the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.First, lets look at how bad things currently are.In an earlier Security Bite, I discussed a study by web browser security startup SquareX that revealed just how little companies are doing to block malicious attachments and protect users.The team of researchers took several different types of malware samples, attached them to emails, and sent them through Proton Mail to addresses on iCloud Mail, Gmail, Outlook, Yahoo! Mail, and AOL, part of the Yahoo! group. Notably, if the emails were delivered successfully to the users, they might be vulnerable to any potential threat contained within those attachments.The table below summarizes the results of sending 7 of the 100 malicious samples to the various email providers, indicating whether the malicious attachment was delivered. If an email was undelivered, it is a sign that malware was detected when the email was being processed by the server, according to the study from SquareX.Table showing what malware samples passed which email providers scanners and were delivered successfully.Image: SquareXThe dilemmaInvesting in robust email security features may seem like the obvious critical part of protecting users. However, Ian Thornton-Trump, CISO with threat intelligence solutions firm Cyjax, told Forbes, this is akin to asking the free Wi-Fi at a Starbucks why are they not blocking more or all cyber attacks. He further explained that its tough to balance free and secure in the same sentence.Thornton-Trump argues that adding advanced email security features can be deeply problematic with false positives, which may involve the use of technical support resources to help or fixthat expense across millions of users on a free platform may be commercially untenable.Moreover, others argue that email providers are dragging their feet on something that could cost substantial resources and impact their bottom line. While not specifically framed as for blocking spam, iOS 18, iPadOS 18, and macOS 15 offer better categorization and summaries of emails, thanks to Apple Intelligence, making it easier to reduce clutter and identify whats important.Ill be interested to see if Apple ever integrates any other AI security features into the Mail app. Using Apple Intelligence to better warn users or outright remove malicious attachments and URLs from emails in real-time could be killer.Im curious to hear your thoughts. Please tell me you are not still using AOLAbout Security Bite: Security Bite is a weekly security-focused column on 9to5Mac. Every week, Arin Waichulis delivers insights on data privacy, uncovers vulnerabilities, or sheds light on emerging threats within Apples vast ecosystem of over 2 billion active devices to help you still safe.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comments ·0 Shares ·85 Views
  • 9to5Mac Daily: November 18, 2024 Next-gen AirTag, ChatGPT upgrades
    9to5mac.com
    Listen to a recap of the top stories of the day from9to5Mac. 9to5Mac Daily is availableon iTunes and Apples Podcasts app,Stitcher,TuneIn,Google Play, or through ourdedicated RSS feedfor Overcast and other podcast players.Sponsored by CardPointers: The best way to maximize your credit card rewards. 9to5Mac Daily listeners can exclusively save 50%.New episodes of 9to5Mac Daily are recorded every weekday. Subscribe to our podcast in Apple Podcast or your favorite podcast player to guarantee new episodes are delivered as soon as theyre available.Stories discussed in this episode:Listen & Subscribe:Subscribe to support Chance directly with 9to5Mac Daily Plus and unlock:Ad-free versions of every episodeBonus contentCatch up on 9to5Mac Daily episodes!Dont miss out on our other daily podcasts:Share your thoughts!Drop us a line at happyhour@9to5mac.com. You can also rate us in Apple Podcasts or recommend us in Overcast to help more people discover the show.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comments ·0 Shares ·91 Views
  • The CEO of Bluesky's Actual Name Means "Blue Sky" in Chinese
    futurism.com
    It was meant to be.Prophecy ForetoldTwitter alternative Bluesky has skyrocketed in popularity ever since Donald Trump was reelected as US president earlier this month. Over the last week alone, its user base doubled to 15 million users,then blew past 19.5 million.The small team behind the operation is racing to keep up with the serious influx."We as a team take pride in our ability to scale quickly," CEO Jay Graber told the New York Times in an interview. "But theres always some growing pains."Interestingly, Graber was practically destined for the job. Her mother, who grew up in China during the Cultural Revolution and moved to the United States in the 1980s, named her "Lantian" in Mandarin which literally translates to "blue sky."Bluer SkiesIn a Forbes profile last year, Graber recalled that her mother called her Lantian "because she wanted me to have boundless freedom. The opportunities she didn't have."The 33-year-old tech exec was already part of Bluesky's developer team when Parag Agrawal, who would go on to become the CEO of Twitter before getting fired by new owner Elon Musk, offered her the opportunity to lead the microblogging platform in 2021.The company, however, wasn't named after Graber. Bluesky founder Jack Dorsey, who also started Twitter, originally came up with the moniker in 2019,two years before Graber came on board.The social media landscape has gone through some tremendous changes since Graber took over the reins. Perhaps the biggest wildcard came when mercurial businessman Elon Musk acquired Twitter for a whopping $44 billion, quickly turning it into a largely unrecognizable echo chamber of hate speech and disinformation.Especially now that Musk has thrown his full weight behind president-elect Donald Trump, an unprecedented number of users are looking for new stomping grounds, including Bluesky.The exodus hit its peak the day after the presidential election, with more than 116,000 people deactivating their X accounts in the US, setting a new record.Meanwhile, Bluesky feels more vibrant than ever before.For her part, Graber has prioritized coming up with new features that actually further the interest of average users, like sorting new content using custom algorithms a far cry from X, where Musk has instructed staff to prioritize his own tweets and conservative content.Even when it comes to generative AI, Bluesky appears to be putting the interest of users first, with the company promising on Friday that it wouldn't leverage users' content to train large language models. That's a stark contrast to X, which went behind users' backs to reserve the right to use their tweets to train AI models whether they opt out or not."The state of most social platforms right now is that users are locked in and developers are locked out," Graber told the NYT. "We want to build something that makes sure users have the freedom to move and developers have the freedom to build."Share This Article
    0 Comments ·0 Shares ·95 Views
  • Scientists Say Aliens May Be Hiding in the Multiverse
    futurism.com
    "We may not live in the most likely of universes."Into the SETIverseScientists suggest that the reason why we have yet to find aliens could be that they're hiding in a parallel universe.As detailed in a new paper published in the journal Monthly Notices of the Royal Astronomical Society, a team led by Durham University astrophysicist Daniele Sorini devised a new take on the Drake equation.The equation was formulated by astronomer Frank Drake in the 1960s to estimate the number of active and detectable alien civilizations in our galaxy. It takes a number of factors into consideration, including the average rate of star formation, the potential number of habitable planets, and the proportion of them that could develop intelligent life.Sorini and his team, however, suggest reframing the equation by considering the possibility of parallel universes that may be more likely to host intelligent life than our own a galaxy-brained concept that could help explain why we have yet to make first contact.Darkest TimelineSorini's team suggests that some universes would have a more optimal density of dark energy, the mysterious stuff that scientists believe is driving the accelerated expansion of the universe.Specifically, they found that a universe where the density of dark energy allows for 27 percent of ordinary matter to be turned into stars would be most likely to allow for alien life to develop. That's compared to just 23 percent in our universe, meaning our universe is at a disadvantage for developing life."Surprisingly,"Sorini said in a statement about the paper, "we found that even a significantly higher dark energy density would still be compatible with life, suggesting we may not live in the most likely of universes,"Sure, the idea that aliens are hiding out in the multiverse is preposterous on its face, like the premise to a last-ditch Marvel sequel. But Sorini and his collaborators frame it as an effort to reconcile the more exotic implications of modern physics with the search for life beyond Earth and you have to admit that, at the very least, it's a fun idea."Understanding dark energy and the impact on our universe"It will be exciting to employ the model to explore the emergence of life across different universes and see whether some fundamental questions we ask ourselves about our own universe must be reinterpreted," coauthor and Universit de Genve cosmology professor Lucas Lombriser added.More on the multiverse: Dark Matter May Be a Deformed Mirror Universe, Scientists SayShare This Article
    0 Comments ·0 Shares ·94 Views
  • Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
    thehackernews.com
    Nov 19, 2024Ravie LakshmananCyber Espionage / Data BreachU.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.The adversaries, tracked as Salt Typhoon, breached the company as part of a "monthslong campaign" designed to harvest cellphone communications of "high-value intelligence targets." It's not clear what information was taken, if any, during the malicious activity."T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been impacted in any significant way, and we have no evidence of impacts to customer information," a spokesperson for the company was quoted as saying to The Wall Street Journal. "We will continue to monitor this closely, working with industry peers and the relevant authorities."With the latest development, T-Mobile has joined a list of major organizations like AT&T, Verizon, and Lumen Technologies that have been singled out as part of what appears to be a full-blown cyber espionage campaign.So far, the reports make no mention of the degree to which these attacks saw success, whether any kind of malware was installed, or what kinds of information they were after. Salt Typhoon's unauthorized access to Americans' cellular data records was previously disclosed by Politico.Last week, the U.S. government said its ongoing investigation into the targeting of commercial telecommunications infrastructure revealed a "broad and significant" hack orchestrated by the People's Republic of China (PRC)."PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders," it said.It further warned that the extent and scope of these compromises could grow as the probe continues.Salt Typhoon, which is also known as Earth Estries, FamousSparrow, GhostEmperor, and UNC2286, is said to have been active since at least 2020, according to Trend Micro. In August 2023, the spy crew was linked to a series of attacks aimed at government and technology industries based in the Philippines, Taiwan, Malaysia, South Africa, Germany, and the U.S.Analysis shows that the threat actors have methodically crafted their payloads and made use of an interesting combination of legitimate and bespoke tools and techniques to bypass defenses and maintain access to their targets."Earth Estries maintains persistence by continuously updating its tools and employs backdoors for lateral movement and credential theft," Trend Micro researchers Ted Lee, Leon M Chang, and Lenart Bermejo said in an exhaustive analysis published earlier this month."Data collection and exfiltration are performed using TrillClient, while tools like cURL are used for sending information to anonymized file-sharing services, employing proxies to hide backdoor traffic."The cybersecurity company said it observed two distinct attack chains employed by the group, indicating the tradecraft that Salt Typhoon has in its arsenal is broad as it's varied. Initial access to target networks is facilitated by exploiting vulnerabilities in outside-facing services or remote management utilities.In one set of attacks, the threat actor has been found taking advantage of vulnerable or misconfigured QConvergeConsole installations to deliver malware such as Cobalt Strike, a custom Go-based stealer called TrillClient, and backdoors like HemiGate and Crowdoor, a variant of SparrowDoor which has been previously put to use by another China-linked group called Tropic Trooper.Some of the other techniques include the use of PSExec to laterally install its backdoors and tools, and TrillClient to collect user credentials from web browser user-profiles and exfiltrate them to an attacker-controlled Gmail account via the Simple Mail Transfer Protocol (SMTP) to further its objectives.The second infection sequence, in contrast, is a lot more sophisticated, with the threat actors abusing susceptible Microsoft Exchange servers to implant the China Chopper web shell, which is then used to deliver Cobalt Strike, Zingdoor, and Snappybee (aka Deed RAT), a suspected successor to the ShadowPad malware."Delivery of these additional backdoors and tools is done either via a [command-and-control] server or by using cURL to download them from attacker-controlled servers," the researchers said. "These backdoor installations are also periodically replaced and updated.""The collection of documents of interest are done via RAR and are exfiltrated using cURL, with the data being sent to anonymized file sharing services."Also utilized in the attacks are programs like NinjaCopy to extract credentials and PortScan for network discovery and mapping. Persistence on the host is accomplished by means of scheduled tasks.In one case, Salt Typhoon is also believed to have repurposed a victim's proxy server to forward traffic to the actual command-and-control (C2) server in an attempt to conceal the malicious traffic.Trend Micro noted that one of the infected machines also harbored two additional backdoors named Cryptmerlin, which executes additional commands issued by a C2 server, and FuxosDoor, an Internet Information Services (IIS) implant that's deployed on a compromised Exchange Server and is also designed to run commands using cmd.exe."Our analysis of Earth Estries' persistent TTPs in prolonged cyber operations reveals a sophisticated and adaptable threat actor that employs various tools and backdoors, demonstrating not only technical capabilities, but also a strategic approach to maintaining access and control within compromised environments," the researchers said."Throughout their campaigns, Earth Estries has displayed a keen understanding of their target environments, by continually identifying exposed layers for re-entry. By using a combination of established tools and custom backdoors, they have created a multi-layered attack strategy that is difficult to detect and mitigate."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·90 Views
  • Warning: VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation
    thehackernews.com
    Nov 19, 2024Ravie LakshmananVulnerability / Data SecurityNow-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog. It was addressed by Progress Software back in February 2024."Progress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution," the agency said.Rhino Security Labs, which discovered and reported the flaw, said successful exploitation enables command execution on LoadMaster should an attacker have access to the administrator web user interface, granting them full access to the load balancer.CISA's addition of CVE-2024-1212 coincides with a warning from Broadcom that attackers are now exploiting two security flaws in the VMware vCenter Server, which were demonstrated at the Matrix Cup cybersecurity competition held in China earlier this year.The flaws, CVE-2024-38812 (CVSS score: 9.8) and CVE-2024-38813 (CVSS score: 7.5), were originally resolved in September 2024, although the company rolled out fixes for the former a second-time last month, stating the previous patches "did not fully address" the problem.CVE-2024-38812 - A heap-overflow vulnerability in the implementation of the DCERPC protocol that could permit a malicious actor with network access to obtain remote code execution CVE-2024-38813 - A privilege escalation vulnerability that could permit a malicious actor with network access to escalate privileges to rootWhile there are currently no details on the observed exploitation of these vulnerabilities in real-world attacks, CISA is recommending that Federal Civilian Executive Branch (FCEB) agencies remediate CVE-2024-1212 by December 9, 2024, to secure their networks.The development comes days after Sophos revealed that cybercrime actors are actively weaponizing a critical flaw in Veeam Backup & Replication (CVE-2024-40711, CVSS score: 9.8) to deploy a previously undocumented ransomware called Frag.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·92 Views
  • Dan Aykroyd Says Original Ghostbusters Cast Is Likely Retired
    screencrush.com
    It appears that we have seen the last of the old schoolGhostbusters on the big screen.Thats according to Dan Aykoyd, who co-created the franchise with the late Harold Ramis, and who appeared in the movies as Ghostbuster Ray Stanz. Speaking to theNew York Postabout his new TV showThe UnBelievable with Dan Aykroyd, the 72-year-old writer/star/vodka maven said that he believed the cast would not return for a fifth movie any time soon.I dont see that coming, he said in response to a question about whether he and GhostbustersstarBill Murray would appear in future installments.He added...I dont see where they would need us to carry it on ... Theyve got a whole new cast, and theyve got whole new ideas.SonySonyloading...READ MORE: We Ate All FourGhostbustersKrispy Kreme DonutsAykroyd, Murray, Ramis, and Ernie Hudson appeared in two hugely successfulGhostbusters films in the 1980s, both directed by the late Ivan Reitman. Then Reitman, Ramis, and Aykroyd spent years trying to get a thirdGhostbusters movie off the ground. It took decades for it to happen (and in the meantime, Paul Feig made a contentious reboot of the property, featuring a new cast of female comic stars like Kristen Wiig and Melissa McCarthy).When the third film finally got made in 2021, Reitmans son Jason Reitman took over the helm and mostly brought in a new cast, including Carrie Coon as Ramis characters daughter, and Finn Wolfhard and Mckenna Grace as her kids. The surviving Ghostbustersactors appeared in cameos at the end of the movie, and then they returned in larger roles for 2024sGhostbusters: Frozen Empire.In that film (directed by Gil Kenan, with Jason Reitman now serving as co-writer/producer), Coons family, plus Paul Rudd as their science teacher buddy, become New Yorks new Ghostbusters; Aykroyd, Murray, Hudson as well as Annie Potts, the Ghostbusters former secretary Janine, allshowed up in a few scenes to help them with their latest case.While all the O.G. stars survived Frozen Empiresbig final fight with an ice-related ghost, the movie also firmly established Coon, Rudd, and the rest of the new cast as the focal point of the franchise moving forward.If it moves forward;Frozen Empireonly grossed about $200 million worldwide against a reported budget of $100 million. Whether thats good enough to get another sequel made remains to be seen.In the meantime, Reitman and Kenan are currently developing a newGhostbusters animated series for Netflix. And wouldnt you know it?Ghostbusters: Frozen Empireis currently streaming on Netflix as well.Get our free mobile appThe Weirdest Ghostbusters Merchandise
    0 Comments ·0 Shares ·92 Views
  • Can You Name These Iconic TV Shows From Just One Freeze-Frame?
    screencrush.com
    Some of us will recall the days when TV show openings were like little shows themselvesthey set the tone, told a bit of the story, and even included a catchy theme song.Back then, you couldnt skip ahead unless you were time-shifting on your VCR (remember that?), and you might have even used that time to run to the kitchen for a snack.Skip Intro? Not When Theyre This Good!M*A*S*H Series Opening Sequence20th Century Fox Televisionloading...This iconic dramedy featured a haunting theme song and became the unofficial bedtime signal for a generation of kids. Keep scrolling to see if you guessed it right.These intros set the stage, introduced the characters, and even summarized some of the previous episodes.RELATED: Can You Identify These Iconic TV Show Homes?Something changed in the 90s. Seinfeld flipped the script when the show went completely open-less, with only a few funky bass chords to signal the start. Funnily enough, the show about nothing began with pretty much nothing.Fast forward to today, and with the advent of prestige TV (serious tone, high production value, complex storylines), opening sequences have become an art form in their own right.Series like True Detective, Game of Thrones, and The Crown have invested so much in their openings that some fans refuse to skip them (even though most streaming platforms now offer the option). Go big, or be forgotten.QUIZ: Can You Guess the Iconic TV Show From Just One Opening Freeze-Frame?Think youre the ultimate TV fan? How well do you know your classic TV intros? Put your knowledge to the test with our quiz. Well show you a freeze-frame from the opening credits of an iconic TV showtake your best guess, then scroll to see if you were right and watch the full opening. Good luck!Gallery Credit: Stephen LenzREAD MORE: 10 TV Shows Everyone Loves That Are Actually BadGet our free mobile app10 Once-Beloved TV Shows That Have Faded AwayThe history of television is littered with once-beloved series that are now all but forgotten.
    0 Comments ·0 Shares ·92 Views