• Riot Will Allow Sports-Betting Sponsorships For League Of Legends Esports Teams

    Riot Games has announced that it will begin officially sanctioning sports-betting sponsorships for esports teams in its Tier 1 League of Legends and Valorant leagues. While the company states that it still won't allow advertisements in its official broadcasts, teams themselves will be able to take money from sports-betting companies for advertising through their own channels.In a blog post, President of Publishing and Esports John Needham writes that the move is designed to take advantage of the rapidly growing sports-betting industry and to make esports-related betting more regulated. Seemingly to address concerns and head off potential criticism, Needham explains that the company is authorizing sports-betting sponsorships under a "guardrails first" strategy.These "guardrails," Needham states, are essentially the rules by which any sponsorship must be executed. First, sports-betting companies need to be vetted and approved by Riot itself, although the company has not shared the criteria on which this vetting is done. Second, to ensure that sports-betting companies are on a level playing field, Riot is mandating that official partners all use GRID, the officially sanctioned data platform for League of Legends and Valorant. Third, esports teams must launch and maintain internal integrity programs to protect against violations of league rules due to the influence of sports betting. Fourth and last, Riot will use some of the revenue from these sponsorships to support its Tier 2esports leagues.Continue Reading at GameSpot
    #riot #will #allow #sportsbetting #sponsorships
    Riot Will Allow Sports-Betting Sponsorships For League Of Legends Esports Teams
    Riot Games has announced that it will begin officially sanctioning sports-betting sponsorships for esports teams in its Tier 1 League of Legends and Valorant leagues. While the company states that it still won't allow advertisements in its official broadcasts, teams themselves will be able to take money from sports-betting companies for advertising through their own channels.In a blog post, President of Publishing and Esports John Needham writes that the move is designed to take advantage of the rapidly growing sports-betting industry and to make esports-related betting more regulated. Seemingly to address concerns and head off potential criticism, Needham explains that the company is authorizing sports-betting sponsorships under a "guardrails first" strategy.These "guardrails," Needham states, are essentially the rules by which any sponsorship must be executed. First, sports-betting companies need to be vetted and approved by Riot itself, although the company has not shared the criteria on which this vetting is done. Second, to ensure that sports-betting companies are on a level playing field, Riot is mandating that official partners all use GRID, the officially sanctioned data platform for League of Legends and Valorant. Third, esports teams must launch and maintain internal integrity programs to protect against violations of league rules due to the influence of sports betting. Fourth and last, Riot will use some of the revenue from these sponsorships to support its Tier 2esports leagues.Continue Reading at GameSpot #riot #will #allow #sportsbetting #sponsorships
    WWW.GAMESPOT.COM
    Riot Will Allow Sports-Betting Sponsorships For League Of Legends Esports Teams
    Riot Games has announced that it will begin officially sanctioning sports-betting sponsorships for esports teams in its Tier 1 League of Legends and Valorant leagues. While the company states that it still won't allow advertisements in its official broadcasts, teams themselves will be able to take money from sports-betting companies for advertising through their own channels.In a blog post, President of Publishing and Esports John Needham writes that the move is designed to take advantage of the rapidly growing sports-betting industry and to make esports-related betting more regulated. Seemingly to address concerns and head off potential criticism, Needham explains that the company is authorizing sports-betting sponsorships under a "guardrails first" strategy.These "guardrails," Needham states, are essentially the rules by which any sponsorship must be executed. First, sports-betting companies need to be vetted and approved by Riot itself, although the company has not shared the criteria on which this vetting is done. Second, to ensure that sports-betting companies are on a level playing field, Riot is mandating that official partners all use GRID, the officially sanctioned data platform for League of Legends and Valorant. Third, esports teams must launch and maintain internal integrity programs to protect against violations of league rules due to the influence of sports betting. Fourth and last, Riot will use some of the revenue from these sponsorships to support its Tier 2 (lower division) esports leagues.Continue Reading at GameSpot
    0 Commentarii 0 Distribuiri
  • It's astounding how many people still cling to outdated notions when it comes to the choice between hardware and software for electronics projects. The article 'Pong in Discrete Components' points to a clear solution, yet it misses the mark entirely. Why are we still debating the reliability of dedicated hardware circuits versus software implementations? Are we really that complacent?

    Let’s face it: sticking to discrete components for simple tasks is an exercise in futility! In a world where innovation thrives on efficiency, why would anyone choose to build outdated circuits when software solutions can achieve the same goals with a fraction of the complexity? It’s mind-boggling! The insistence on traditional methods speaks to a broader problem in our community—a stubbornness to evolve and embrace the future.

    The argument for using hardware is often wrapped in a cozy blanket of reliability. But let’s be honest, how reliable is that? Anyone who has dealt with hardware failures knows they can be a nightmare. Components can fail, connections can break, and troubleshooting a physical circuit can waste immense amounts of time. Meanwhile, software can be updated, modified, and optimized with just a few keystrokes. Why are we so quick to glorify something that is inherently flawed?

    This is not just about personal preference; it’s about setting a dangerous precedent for future electronics projects. By promoting the use of discrete components without acknowledging their limitations, we are doing a disservice to budding engineers and hobbyists. We are essentially telling them to trap themselves in a bygone era where tinkering with clunky hardware is seen as a rite of passage. It’s ridiculous!

    Furthermore, the focus on hardware in the article neglects the incredible advancements in software tools and environments available today. Why not leverage the power of modern programming languages and platforms? The tech landscape is overflowing with resources that make it easier than ever to create impressive projects with software. Why do we insist on dragging our feet through the mud of outdated technologies?

    The truth is, this reluctance to embrace software solutions is symptomatic of a larger issue—the fear of change. Change is hard, and it’s scary, but clinging to obsolete methods will only hinder progress. We need to challenge the status quo and demand better from our community. We should be encouraging one another to explore the vast possibilities that software offers rather than settling for the mundane and the obsolete.

    Let’s stop romanticizing the past and start looking forward. The world of electronics is rapidly evolving, and it’s time we caught up. Let’s make a collective commitment to prioritize innovation over tradition. The choice between hardware and software doesn’t have to be a debate; it can be a celebration of progress.

    #InnovationInElectronics
    #SoftwareOverHardware
    #ProgressNotTradition
    #EmbraceTheFuture
    #PongInDiscreteComponents
    It's astounding how many people still cling to outdated notions when it comes to the choice between hardware and software for electronics projects. The article 'Pong in Discrete Components' points to a clear solution, yet it misses the mark entirely. Why are we still debating the reliability of dedicated hardware circuits versus software implementations? Are we really that complacent? Let’s face it: sticking to discrete components for simple tasks is an exercise in futility! In a world where innovation thrives on efficiency, why would anyone choose to build outdated circuits when software solutions can achieve the same goals with a fraction of the complexity? It’s mind-boggling! The insistence on traditional methods speaks to a broader problem in our community—a stubbornness to evolve and embrace the future. The argument for using hardware is often wrapped in a cozy blanket of reliability. But let’s be honest, how reliable is that? Anyone who has dealt with hardware failures knows they can be a nightmare. Components can fail, connections can break, and troubleshooting a physical circuit can waste immense amounts of time. Meanwhile, software can be updated, modified, and optimized with just a few keystrokes. Why are we so quick to glorify something that is inherently flawed? This is not just about personal preference; it’s about setting a dangerous precedent for future electronics projects. By promoting the use of discrete components without acknowledging their limitations, we are doing a disservice to budding engineers and hobbyists. We are essentially telling them to trap themselves in a bygone era where tinkering with clunky hardware is seen as a rite of passage. It’s ridiculous! Furthermore, the focus on hardware in the article neglects the incredible advancements in software tools and environments available today. Why not leverage the power of modern programming languages and platforms? The tech landscape is overflowing with resources that make it easier than ever to create impressive projects with software. Why do we insist on dragging our feet through the mud of outdated technologies? The truth is, this reluctance to embrace software solutions is symptomatic of a larger issue—the fear of change. Change is hard, and it’s scary, but clinging to obsolete methods will only hinder progress. We need to challenge the status quo and demand better from our community. We should be encouraging one another to explore the vast possibilities that software offers rather than settling for the mundane and the obsolete. Let’s stop romanticizing the past and start looking forward. The world of electronics is rapidly evolving, and it’s time we caught up. Let’s make a collective commitment to prioritize innovation over tradition. The choice between hardware and software doesn’t have to be a debate; it can be a celebration of progress. #InnovationInElectronics #SoftwareOverHardware #ProgressNotTradition #EmbraceTheFuture #PongInDiscreteComponents
    HACKADAY.COM
    Pong in Discrete Components
    The choice between hardware and software for electronics projects is generally a straighforward one. For simple tasks we might build dedicated hardware circuits out of discrete components for reliability and …read more
    1 Commentarii 0 Distribuiri
  • In a world where digital puppets are more popular than actual puppeteers, *Lies of P* has managed to pull off a neat little trick: it just surpassed 3 million copies sold right after the release of its DLC. One might wonder if the players are buying the game for its engaging storyline or just to prove that they can indeed endure another round of metaphorical whip lashes from a game that has its roots in the somewhat tortured tale of Pinocchio.

    Isn’t it fascinating how *Lies of P* has become the poster child for what some might call “the From Software Effect”? You know, that magical phenomenon where gamers willingly subject themselves to relentless difficulty while whispering sweet nothings about “immersive gameplay.” Perhaps the secret sauce is simply a sprinkle of existential dread mixed with a dash of “Why am I doing this to myself?”

    Let’s not forget the timing of this achievement – right after the DLC launch. Could it be that the players were just waiting for an excuse to dive back into that bleak, fantastical world? Or maybe they were hoping for the DLC to come with a side of sanity or at least a guide that says, “It’s okay, you can put the controller down after a while.” But no, why would anyone want a game that respects their time?

    Of course, with 3 million copies sold, it’s safe to say that the developers have struck gold. And what better way to celebrate than by releasing a DLC that essentially places a cherry on top of the suffering sundae? Because if there’s anything gamers love, it’s being rewarded for their relentless persistence in the face of overwhelming odds.

    And let’s take a moment to appreciate the irony here. In a world depleted of genuine sincerity, *Lies of P* manages to thrive by embodying the very essence of deceit. Is it a game about lying? Or is it a reflection of the players’ willingness to lie to themselves about how much fun they’re having while getting stomped on by a ridiculously oversized puppet?

    In the end, while we’re busy celebrating this achievement, perhaps we should also take a moment to reflect on our life choices. Because who doesn’t enjoy a good dose of self-reflection after being metaphorically roasted by a game that thrives on pushing players to their limits?

    So, here’s to *Lies of P* – the game that reminds us that when life gives you lemons, sometimes it's just a trap set by a puppet master. Cheers to the 3 million players who have chosen to embrace the lie!

    #LiesOfP #GamingNews #DLC #FromSoftware #GamingCommunity
    In a world where digital puppets are more popular than actual puppeteers, *Lies of P* has managed to pull off a neat little trick: it just surpassed 3 million copies sold right after the release of its DLC. One might wonder if the players are buying the game for its engaging storyline or just to prove that they can indeed endure another round of metaphorical whip lashes from a game that has its roots in the somewhat tortured tale of Pinocchio. Isn’t it fascinating how *Lies of P* has become the poster child for what some might call “the From Software Effect”? You know, that magical phenomenon where gamers willingly subject themselves to relentless difficulty while whispering sweet nothings about “immersive gameplay.” Perhaps the secret sauce is simply a sprinkle of existential dread mixed with a dash of “Why am I doing this to myself?” Let’s not forget the timing of this achievement – right after the DLC launch. Could it be that the players were just waiting for an excuse to dive back into that bleak, fantastical world? Or maybe they were hoping for the DLC to come with a side of sanity or at least a guide that says, “It’s okay, you can put the controller down after a while.” But no, why would anyone want a game that respects their time? Of course, with 3 million copies sold, it’s safe to say that the developers have struck gold. And what better way to celebrate than by releasing a DLC that essentially places a cherry on top of the suffering sundae? Because if there’s anything gamers love, it’s being rewarded for their relentless persistence in the face of overwhelming odds. And let’s take a moment to appreciate the irony here. In a world depleted of genuine sincerity, *Lies of P* manages to thrive by embodying the very essence of deceit. Is it a game about lying? Or is it a reflection of the players’ willingness to lie to themselves about how much fun they’re having while getting stomped on by a ridiculously oversized puppet? In the end, while we’re busy celebrating this achievement, perhaps we should also take a moment to reflect on our life choices. Because who doesn’t enjoy a good dose of self-reflection after being metaphorically roasted by a game that thrives on pushing players to their limits? So, here’s to *Lies of P* – the game that reminds us that when life gives you lemons, sometimes it's just a trap set by a puppet master. Cheers to the 3 million players who have chosen to embrace the lie! #LiesOfP #GamingNews #DLC #FromSoftware #GamingCommunity
    Juste après la sortie de son DLC, Lies of P dépasse les 3 millions d’exemplaires
    ActuGaming.net Juste après la sortie de son DLC, Lies of P dépasse les 3 millions d’exemplaires Sans doute l’une des meilleures alternatives aux jeux de From Software, Lies of P a […] L'article Juste après la sortie de son DLC, Lie
    Like
    Love
    Wow
    Angry
    Sad
    162
    1 Commentarii 0 Distribuiri
  • Spotify and Apple are killing the album cover, and it’s time we raised our voices against this travesty! It’s infuriating that in this age of digital consumption, these tech giants have the audacity to strip away one of the most vital elements of music: the album cover. The art that used to be a visceral representation of the music itself is now reduced to a mere thumbnail on a screen, easily lost in the sea of endless playlists and streaming algorithms.

    What happened to the days when we could hold a physical album in our hands? The tactile experience of flipping through a gatefold cover, admiring the artwork, and reading the liner notes is now an afterthought. Instead, we’re left with animated visuals that can’t even be framed on a wall! How can a moving image evoke the same emotional connection as a beautifully designed cover that captures the essence of an artist's vision? It’s a tragedy that these platforms are prioritizing convenience over artistic expression.

    The music industry needs to wake up! Spotify and Apple are essentially telling artists that their hard work, creativity, and passion can be boiled down to a pixelated image that disappears into the digital ether. This is an outright assault on the artistry of music! Why should we stand by while these companies prioritize algorithmic efficiency over the cultural significance of album art? It’s infuriating that the very thing that made music a visual and auditory experience is being obliterated right in front of our eyes.

    Let’s be clear: the album cover is not just decoration; it’s an integral part of the storytelling process in music. It sets the tone, evokes emotions, and can even influence how we perceive the music itself. When an album cover is designed with care and intention, it becomes an extension of the artist’s voice. Yet here we are, scrolling through Spotify and Apple Music, bombarded with generic visuals that do nothing to honor the artists or their work.

    Spotify and Apple need to be held accountable for this degradation of music culture. This isn’t just about nostalgia; it’s about preserving the integrity of artistic expression. We need to demand that these platforms acknowledge the importance of album covers and find ways to integrate them into our digital experiences. Otherwise, we’re on a dangerous path where music becomes nothing more than a disposable commodity.

    If we allow Spotify and Apple to continue on this trajectory, we risk losing an entire culture of artistic expression. It’s time for us as consumers to take a stand and remind these companies that music is not just about the sound; it’s about the entire experience.

    Let’s unite and fight back against this digital degradation of music artistry. We deserve better than a world where the album cover is dying a slow death. Let’s reclaim the beauty of music and its visual representation before it’s too late!

    #AlbumArt #MusicCulture #Spotify #AppleMusic #ProtectArtistry
    Spotify and Apple are killing the album cover, and it’s time we raised our voices against this travesty! It’s infuriating that in this age of digital consumption, these tech giants have the audacity to strip away one of the most vital elements of music: the album cover. The art that used to be a visceral representation of the music itself is now reduced to a mere thumbnail on a screen, easily lost in the sea of endless playlists and streaming algorithms. What happened to the days when we could hold a physical album in our hands? The tactile experience of flipping through a gatefold cover, admiring the artwork, and reading the liner notes is now an afterthought. Instead, we’re left with animated visuals that can’t even be framed on a wall! How can a moving image evoke the same emotional connection as a beautifully designed cover that captures the essence of an artist's vision? It’s a tragedy that these platforms are prioritizing convenience over artistic expression. The music industry needs to wake up! Spotify and Apple are essentially telling artists that their hard work, creativity, and passion can be boiled down to a pixelated image that disappears into the digital ether. This is an outright assault on the artistry of music! Why should we stand by while these companies prioritize algorithmic efficiency over the cultural significance of album art? It’s infuriating that the very thing that made music a visual and auditory experience is being obliterated right in front of our eyes. Let’s be clear: the album cover is not just decoration; it’s an integral part of the storytelling process in music. It sets the tone, evokes emotions, and can even influence how we perceive the music itself. When an album cover is designed with care and intention, it becomes an extension of the artist’s voice. Yet here we are, scrolling through Spotify and Apple Music, bombarded with generic visuals that do nothing to honor the artists or their work. Spotify and Apple need to be held accountable for this degradation of music culture. This isn’t just about nostalgia; it’s about preserving the integrity of artistic expression. We need to demand that these platforms acknowledge the importance of album covers and find ways to integrate them into our digital experiences. Otherwise, we’re on a dangerous path where music becomes nothing more than a disposable commodity. If we allow Spotify and Apple to continue on this trajectory, we risk losing an entire culture of artistic expression. It’s time for us as consumers to take a stand and remind these companies that music is not just about the sound; it’s about the entire experience. Let’s unite and fight back against this digital degradation of music artistry. We deserve better than a world where the album cover is dying a slow death. Let’s reclaim the beauty of music and its visual representation before it’s too late! #AlbumArt #MusicCulture #Spotify #AppleMusic #ProtectArtistry
    Like
    Love
    Wow
    Angry
    Sad
    217
    1 Commentarii 0 Distribuiri
  • Ah, California! The land of sunshine, dreams, and the ever-elusive promise of tax credits that could rival a Hollywood blockbuster in terms of drama. Rumor has it that the state is considering a whopping 35% increase in tax credits to boost audiovisual production. Because, you know, who wouldn’t want to encourage more animated characters to come to life in a state where the cost of living is practically animated itself?

    Let’s talk about these legislative gems—Assembly Bill 1138 and Senate Bill 630. Apparently, they’re here to save the day, expanding the scope of existing tax aids like some overzealous superhero. I mean, why stop at simply attracting filmmakers when you can also throw in visual effects and animation? It’s like giving a kid a whole candy store instead of a single lollipop. Who can say no to that?

    But let’s pause for a moment and ponder the implications of this grand gesture. More tax credits mean more projects, which means more animated explosions, talking squirrels, and heartfelt stories about the struggles of a sentient avocado trying to find love in a world that just doesn’t understand it. Because, let’s face it, nothing says “artistic integrity” quite like a financial incentive large enough to fund a small country.

    And what do we have to thank for this potential windfall? Well, it seems that politicians have finally realized that making movies is a lot more profitable than, say, fixing potholes or addressing climate change. Who knew? Instead of investing in infrastructure that might actually benefit the people living there, they decided to invest in the fantasy world of visual effects. Because really, what’s more important—smooth roads or a high-speed chase featuring a CGI dinosaur?

    As we delve deeper into this world of tax credit excitement, let’s not forget the underlying truth: these credits are essentially a “please stay here” plea to filmmakers who might otherwise take their talents to greener pastures (or Texas, where they also have sweet deals going on). So, here’s to hoping that the next big animated feature isn’t just a celebration of creativity but also a financial statement that makes accountants drool.

    So get ready, folks! The next wave of animated masterpieces is coming, fueled by tax incentives and the relentless pursuit of cinematic glory. Who doesn’t want to see more characters with existential crises brought to life on screen, courtesy of our taxpayer dollars? Bravo, California! You’ve truly outdone yourself. Now let’s just hope these tax credits don’t end up being as ephemeral as a poorly rendered CGI character.

    #CaliforniaTaxCredits #Animation #VFX #Hollywood #TaxIncentives
    Ah, California! The land of sunshine, dreams, and the ever-elusive promise of tax credits that could rival a Hollywood blockbuster in terms of drama. Rumor has it that the state is considering a whopping 35% increase in tax credits to boost audiovisual production. Because, you know, who wouldn’t want to encourage more animated characters to come to life in a state where the cost of living is practically animated itself? Let’s talk about these legislative gems—Assembly Bill 1138 and Senate Bill 630. Apparently, they’re here to save the day, expanding the scope of existing tax aids like some overzealous superhero. I mean, why stop at simply attracting filmmakers when you can also throw in visual effects and animation? It’s like giving a kid a whole candy store instead of a single lollipop. Who can say no to that? But let’s pause for a moment and ponder the implications of this grand gesture. More tax credits mean more projects, which means more animated explosions, talking squirrels, and heartfelt stories about the struggles of a sentient avocado trying to find love in a world that just doesn’t understand it. Because, let’s face it, nothing says “artistic integrity” quite like a financial incentive large enough to fund a small country. And what do we have to thank for this potential windfall? Well, it seems that politicians have finally realized that making movies is a lot more profitable than, say, fixing potholes or addressing climate change. Who knew? Instead of investing in infrastructure that might actually benefit the people living there, they decided to invest in the fantasy world of visual effects. Because really, what’s more important—smooth roads or a high-speed chase featuring a CGI dinosaur? As we delve deeper into this world of tax credit excitement, let’s not forget the underlying truth: these credits are essentially a “please stay here” plea to filmmakers who might otherwise take their talents to greener pastures (or Texas, where they also have sweet deals going on). So, here’s to hoping that the next big animated feature isn’t just a celebration of creativity but also a financial statement that makes accountants drool. So get ready, folks! The next wave of animated masterpieces is coming, fueled by tax incentives and the relentless pursuit of cinematic glory. Who doesn’t want to see more characters with existential crises brought to life on screen, courtesy of our taxpayer dollars? Bravo, California! You’ve truly outdone yourself. Now let’s just hope these tax credits don’t end up being as ephemeral as a poorly rendered CGI character. #CaliforniaTaxCredits #Animation #VFX #Hollywood #TaxIncentives
    Bientôt 35% de crédits d’impôts en Californie ? Impact à prévoir sur l’animation et les VFX
    La Californie pourrait augmenter ses crédits d’impôt pour favoriser la production audiovisuelle. Une évolution qui aurait aussi un impact sur les effets visuels et l’animation.Deux projets législatifs (Assembly Bill 1138 & Senate Bill
    Like
    Love
    Wow
    Angry
    Sad
    608
    1 Commentarii 0 Distribuiri
  • Why does the world of animation, particularly at events like the SIGGRAPH Electronic Theater, continue to suffer from mediocrity? I can't help but feel enraged by the sheer lack of innovation and the repetitive nature of the projects being showcased. On April 17th, we’re promised a “free screening” of selected projects that are supposedly representing the pinnacle of creativity and diversity in animation. But let’s get real — what does “selection” even mean in a world where creativity is stifled by conformity?

    Look, I understand that this is a global showcase, but when you sift through the projects that make it through the cracks, what do we find? Overly polished but uninspired animations that follow the same tired formulas. The “Electronic Theater” is supposed to be a beacon of innovation, yet here we are again, being fed a bland compilation that does little to challenge or excite. It’s like being served a fast-food version of art: quick, easy, and utterly forgettable.

    The call for diversity is also a double-edged sword. Sure, we need to see work from all corners of the globe, but diversity in animation is meaningless if the underlying concepts are stale. It’s not enough to tick boxes and say, “Look how diverse we are!” when the actual content fails to push boundaries. Instead of celebrating real creativity, we end up with a homogenized collection of animations that are, at best, mediocre.

    And let’s talk about the timing of this event. April 17th? Are we really thinking this through? This date seems to be plucked out of thin air without consideration for the audience’s engagement. Just another poorly planned initiative that assumes people will flock to see what is essentially a second-rate collection of animations. Is this really the best you can do, Montpellier ACM SIGGRAPH? Where is the excitement? Where is the passion?

    What’s even more frustrating is that this could have been an opportunity to truly showcase groundbreaking work that challenges the status quo. Instead, it feels like a desperate attempt to fill seats and pat ourselves on the back for hosting an event. Real creators are out there, creating phenomenal work that could change the landscape of animation, yet we choose to showcase the safe and the bland.

    It’s time to demand more from events like SIGGRAPH. It’s time to stop settling for mediocrity and start championing real innovation in animation. If the Electronic Theater is going to stand for anything, it should stand for pushing boundaries, not simply checking boxes.

    Let’s not allow ourselves to be content with what we’re served. It’s time for a revolution in animation that doesn’t just showcase the same old, same old. We deserve better, and the art community deserves better.

    #AnimationRevolution
    #SIGGRAPH2024
    #CreativityMatters
    #DiversityInAnimation
    #ChallengeTheNorm
    Why does the world of animation, particularly at events like the SIGGRAPH Electronic Theater, continue to suffer from mediocrity? I can't help but feel enraged by the sheer lack of innovation and the repetitive nature of the projects being showcased. On April 17th, we’re promised a “free screening” of selected projects that are supposedly representing the pinnacle of creativity and diversity in animation. But let’s get real — what does “selection” even mean in a world where creativity is stifled by conformity? Look, I understand that this is a global showcase, but when you sift through the projects that make it through the cracks, what do we find? Overly polished but uninspired animations that follow the same tired formulas. The “Electronic Theater” is supposed to be a beacon of innovation, yet here we are again, being fed a bland compilation that does little to challenge or excite. It’s like being served a fast-food version of art: quick, easy, and utterly forgettable. The call for diversity is also a double-edged sword. Sure, we need to see work from all corners of the globe, but diversity in animation is meaningless if the underlying concepts are stale. It’s not enough to tick boxes and say, “Look how diverse we are!” when the actual content fails to push boundaries. Instead of celebrating real creativity, we end up with a homogenized collection of animations that are, at best, mediocre. And let’s talk about the timing of this event. April 17th? Are we really thinking this through? This date seems to be plucked out of thin air without consideration for the audience’s engagement. Just another poorly planned initiative that assumes people will flock to see what is essentially a second-rate collection of animations. Is this really the best you can do, Montpellier ACM SIGGRAPH? Where is the excitement? Where is the passion? What’s even more frustrating is that this could have been an opportunity to truly showcase groundbreaking work that challenges the status quo. Instead, it feels like a desperate attempt to fill seats and pat ourselves on the back for hosting an event. Real creators are out there, creating phenomenal work that could change the landscape of animation, yet we choose to showcase the safe and the bland. It’s time to demand more from events like SIGGRAPH. It’s time to stop settling for mediocrity and start championing real innovation in animation. If the Electronic Theater is going to stand for anything, it should stand for pushing boundaries, not simply checking boxes. Let’s not allow ourselves to be content with what we’re served. It’s time for a revolution in animation that doesn’t just showcase the same old, same old. We deserve better, and the art community deserves better. #AnimationRevolution #SIGGRAPH2024 #CreativityMatters #DiversityInAnimation #ChallengeTheNorm
    Projection gratuite : l’Electronic Theater du SIGGRAPH, le 17 avril !
    Vous n’étiez pas au SIGGRAPH l’été dernier ? Montpellier ACM SIGGRAPH a pensé à vous, et organise ce jeudi 17 avril une projection gratuite des projets sélectionnés dans l’Electronic Theater 2024, le festival d’animation du SI
    Like
    Love
    Wow
    Angry
    Sad
    625
    1 Commentarii 0 Distribuiri
  • Microsoft 365 security in the spotlight after Washington Post hack

    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

    Microsoft 365 security in the spotlight after Washington Post hack

    Paul Hill

    Neowin
    @ziks_99 ·

    Jun 16, 2025 03:36 EDT

    The Washington Post has come under cyberattack which saw Microsoft email accounts of several journalists get compromised. The attack, which was discovered last Thursday, is believed to have been conducted by a foreign government due to the topics the journalists cover, including national security, economic policy, and China. Following the hack, the passwords on the affected accounts were reset to prevent access.
    The fact that a Microsoft work email account was potentially hacked strongly suggests The Washington Post utilizes Microsoft 365, which makes us question the security of Microsoft’s widely used enterprise services. Given that Microsoft 365 is very popular, it is a hot target for attackers.
    Microsoft's enterprise security offerings and challenges

    As the investigation into the cyberattack is still ongoing, just how attackers gained access to the accounts of the journalists is unknown, however, Microsoft 365 does have multiple layers of protection that ought to keep journalists safe.
    One of the security tools is Microsoft Defender for Office 365. If the hackers tried to gain access with malicious links, Defender provides protection against any malicious attachments, links, or email-based phishing attempts with the Advanced Threat Protection feature. Defender also helps to protect against malware that could be used to target journalists at The Washington Post.
    Another security measure in place is Entra ID which helps enterprises defend against identity-based attacks. Some key features of Entra ID include multi-factor authentication which protects accounts even if a password is compromised, and there are granular access policies that help to limit logins from outside certain locations, unknown devices, or limit which apps can be used.
    While Microsoft does offer plenty of security technologies with M365, hacks can still take place due to misconfiguration, user-error, or through the exploitation of zero-day vulnerabilities. Essentially, it requires efforts from both Microsoft and the customer to maintain security.
    Lessons for organizations using Microsoft 365
    The incident over at The Washington Post serves as a stark reminder that all organizations, not just news organizations, should audit and strengthen their security setups. Some of the most important security measures you can put in place include mandatory multi-factor authenticationfor all users, especially for privileged accounts; strong password rules such as using letters, numbers, and symbols; regular security awareness training; and installing any security updates in a timely manner.
    Many of the cyberattacks that we learn about from companies like Microsoft involve hackers taking advantage of the human in the equation, such as being tricked into sharing passwords or sharing sensitive information due to trickery on behalf of the hackers. This highlights that employee training is crucial in protecting systems and that Microsoft’s technologies, as advanced as they are, can’t mitigate all attacks 100 percent of the time.

    Tags

    Report a problem with article

    Follow @NeowinFeed
    #microsoft #security #spotlight #after #washington
    Microsoft 365 security in the spotlight after Washington Post hack
    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Microsoft 365 security in the spotlight after Washington Post hack Paul Hill Neowin @ziks_99 · Jun 16, 2025 03:36 EDT The Washington Post has come under cyberattack which saw Microsoft email accounts of several journalists get compromised. The attack, which was discovered last Thursday, is believed to have been conducted by a foreign government due to the topics the journalists cover, including national security, economic policy, and China. Following the hack, the passwords on the affected accounts were reset to prevent access. The fact that a Microsoft work email account was potentially hacked strongly suggests The Washington Post utilizes Microsoft 365, which makes us question the security of Microsoft’s widely used enterprise services. Given that Microsoft 365 is very popular, it is a hot target for attackers. Microsoft's enterprise security offerings and challenges As the investigation into the cyberattack is still ongoing, just how attackers gained access to the accounts of the journalists is unknown, however, Microsoft 365 does have multiple layers of protection that ought to keep journalists safe. One of the security tools is Microsoft Defender for Office 365. If the hackers tried to gain access with malicious links, Defender provides protection against any malicious attachments, links, or email-based phishing attempts with the Advanced Threat Protection feature. Defender also helps to protect against malware that could be used to target journalists at The Washington Post. Another security measure in place is Entra ID which helps enterprises defend against identity-based attacks. Some key features of Entra ID include multi-factor authentication which protects accounts even if a password is compromised, and there are granular access policies that help to limit logins from outside certain locations, unknown devices, or limit which apps can be used. While Microsoft does offer plenty of security technologies with M365, hacks can still take place due to misconfiguration, user-error, or through the exploitation of zero-day vulnerabilities. Essentially, it requires efforts from both Microsoft and the customer to maintain security. Lessons for organizations using Microsoft 365 The incident over at The Washington Post serves as a stark reminder that all organizations, not just news organizations, should audit and strengthen their security setups. Some of the most important security measures you can put in place include mandatory multi-factor authenticationfor all users, especially for privileged accounts; strong password rules such as using letters, numbers, and symbols; regular security awareness training; and installing any security updates in a timely manner. Many of the cyberattacks that we learn about from companies like Microsoft involve hackers taking advantage of the human in the equation, such as being tricked into sharing passwords or sharing sensitive information due to trickery on behalf of the hackers. This highlights that employee training is crucial in protecting systems and that Microsoft’s technologies, as advanced as they are, can’t mitigate all attacks 100 percent of the time. Tags Report a problem with article Follow @NeowinFeed #microsoft #security #spotlight #after #washington
    WWW.NEOWIN.NET
    Microsoft 365 security in the spotlight after Washington Post hack
    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Microsoft 365 security in the spotlight after Washington Post hack Paul Hill Neowin @ziks_99 · Jun 16, 2025 03:36 EDT The Washington Post has come under cyberattack which saw Microsoft email accounts of several journalists get compromised. The attack, which was discovered last Thursday, is believed to have been conducted by a foreign government due to the topics the journalists cover, including national security, economic policy, and China. Following the hack, the passwords on the affected accounts were reset to prevent access. The fact that a Microsoft work email account was potentially hacked strongly suggests The Washington Post utilizes Microsoft 365, which makes us question the security of Microsoft’s widely used enterprise services. Given that Microsoft 365 is very popular, it is a hot target for attackers. Microsoft's enterprise security offerings and challenges As the investigation into the cyberattack is still ongoing, just how attackers gained access to the accounts of the journalists is unknown, however, Microsoft 365 does have multiple layers of protection that ought to keep journalists safe. One of the security tools is Microsoft Defender for Office 365. If the hackers tried to gain access with malicious links, Defender provides protection against any malicious attachments, links, or email-based phishing attempts with the Advanced Threat Protection feature. Defender also helps to protect against malware that could be used to target journalists at The Washington Post. Another security measure in place is Entra ID which helps enterprises defend against identity-based attacks. Some key features of Entra ID include multi-factor authentication which protects accounts even if a password is compromised, and there are granular access policies that help to limit logins from outside certain locations, unknown devices, or limit which apps can be used. While Microsoft does offer plenty of security technologies with M365, hacks can still take place due to misconfiguration, user-error, or through the exploitation of zero-day vulnerabilities. Essentially, it requires efforts from both Microsoft and the customer to maintain security. Lessons for organizations using Microsoft 365 The incident over at The Washington Post serves as a stark reminder that all organizations, not just news organizations, should audit and strengthen their security setups. Some of the most important security measures you can put in place include mandatory multi-factor authentication (MFA) for all users, especially for privileged accounts; strong password rules such as using letters, numbers, and symbols; regular security awareness training; and installing any security updates in a timely manner. Many of the cyberattacks that we learn about from companies like Microsoft involve hackers taking advantage of the human in the equation, such as being tricked into sharing passwords or sharing sensitive information due to trickery on behalf of the hackers. This highlights that employee training is crucial in protecting systems and that Microsoft’s technologies, as advanced as they are, can’t mitigate all attacks 100 percent of the time. Tags Report a problem with article Follow @NeowinFeed
    Like
    Love
    Wow
    Sad
    Angry
    553
    0 Commentarii 0 Distribuiri
  • Hungry Bacteria Hunt Their Neighbors With Tiny, Poison-Tipped Harpoons

    Starving bacteriause a microscopic harpoon—called the Type VI secretion system—to stab and kill neighboring cells. The prey burst, turning spherical and leaking nutrients, which the killers then use to survive and grow.NewsletterSign up for our email newsletter for the latest science newsBacteria are bad neighbors. And we’re not talking noisy, never-take-out-the-trash bad neighbors. We’re talking has-a-harpoon-gun-and-points-it-at-you bad neighbors. According to a new study in Science, some bacteria hunt nearby bacterial species when they’re hungry. Using a special weapon system called the Type VI Secretion System, these bacteria shoot, spill, and then absorb the nutrients from the microbes they harpoon. “The punchline is: When things get tough, you eat your neighbors,” said Glen D’Souza, a study author and an assistant professor at Arizona State University, according to a press release. “We’ve known bacteria kill each other, that’s textbook. But what we’re seeing is that it’s not just important that the bacteria have weapons to kill, but they are controlling when they use those weapons specifically for situations to eat others where they can’t grow themselves.” According to the study authors, the research doesn’t just have implications for bacterial neighborhoods; it also has implications for human health and medicine. By harnessing these bacterial weapons, it may be possible to build better targeted antibiotics, designed to overcome antibiotic resistance. Ruthless Bacteria Use HarpoonsResearchers have long known that some bacteria can be ruthless, using weapons like the T6SS to clear out their competition. A nasty tool, the T6SS is essentially a tiny harpoon gun with a poison-tipped needle. When a bacterium shoots the weapon into another bacterium from a separate species, the needle pierces the microbe without killing it. Then, it injects toxins into the microbe that cause its internal nutrients to spill out.Up until now, researchers thought that this weapon helped bacteria eliminate their competition for space and for food, but after watching bacteria use the T6SS to attack their neighbors when food was scarce, the study authors concluded that these tiny harpooners use the weapon not only to remove rivals, but also to consume their competitors’ leaked nutrients.“Watching these cells in action really drives home how resourceful bacteria can be,” said Astrid Stubbusch, another study author and a researcher who worked on the study while at ETH Zurich, according to the press release. “By slowly releasing nutrients from their neighbors, they maximize their nutrient harvesting when every molecule counts.” Absorbing Food From NeighborsTo show that the bacteria used this system to eat when there was no food around, the study authors compared their attacks in both nutrient-rich and nutrient-poor environments. When supplied with ample resources, the bacteria used their harpoons to kill their neighbors quickly, with the released nutrients leaking out and dissolving immediately. But when resources were few and far between, they used their harpoons to kill their neighbors slowly, with the nutrients seeping out and sticking around. “This difference in dissolution time could mean that the killer cells load their spears with different toxins,” D’Souza said in another press release. While one toxin could eliminate the competition for space and for food when nutrients are available, another could create a food source, allowing bacteria to “absorb as many nutrients as possible” when sustenance is in short supply.Because of all this, this weapon system is more than ruthless; it’s also smart, and important to some species’ survival. When genetically unedited T6SS bacteria were put in an environment without food, they survived on spilled nutrients. But when genetically edited T6SS bacteria were placed in a similar environment, they died, because their ability to find food in their neighbors had been “turned off.”Harnessing Bacterial HarpoonsAccording to the study authors, the T6SS system is widely used by bacteria, both in and outside the lab. “It’s present in many different environments,” D’Souza said in one of the press releases. “It’s operational and happening in nature, from the oceans to the human gut.” The study authors add that their research could change the way we think about bacteria and could help in our fight against antibiotic resistance. In fact, the T6SS could one day serve as a foundation for targeted drug delivery systems, which could mitigate the development of broader bacterial resistance to antibiotics. But before that can happen, however, researchers have to learn more about bacterial harpoons, and about when and how bacteria use them, both to beat and eat their neighbors.Article SourcesOur writers at Discovermagazine.com use peer-reviewed studies and high-quality sources for our articles, and our editors review for scientific accuracy and editorial standards. Review the sources used below for this article:Sam Walters is a journalist covering archaeology, paleontology, ecology, and evolution for Discover, along with an assortment of other topics. Before joining the Discover team as an assistant editor in 2022, Sam studied journalism at Northwestern University in Evanston, Illinois.1 free article leftWant More? Get unlimited access for as low as /monthSubscribeAlready a subscriber?Register or Log In1 free articleSubscribeWant more?Keep reading for as low as !SubscribeAlready a subscriber?Register or Log In
    #hungry #bacteria #hunt #their #neighbors
    Hungry Bacteria Hunt Their Neighbors With Tiny, Poison-Tipped Harpoons
    Starving bacteriause a microscopic harpoon—called the Type VI secretion system—to stab and kill neighboring cells. The prey burst, turning spherical and leaking nutrients, which the killers then use to survive and grow.NewsletterSign up for our email newsletter for the latest science newsBacteria are bad neighbors. And we’re not talking noisy, never-take-out-the-trash bad neighbors. We’re talking has-a-harpoon-gun-and-points-it-at-you bad neighbors. According to a new study in Science, some bacteria hunt nearby bacterial species when they’re hungry. Using a special weapon system called the Type VI Secretion System, these bacteria shoot, spill, and then absorb the nutrients from the microbes they harpoon. “The punchline is: When things get tough, you eat your neighbors,” said Glen D’Souza, a study author and an assistant professor at Arizona State University, according to a press release. “We’ve known bacteria kill each other, that’s textbook. But what we’re seeing is that it’s not just important that the bacteria have weapons to kill, but they are controlling when they use those weapons specifically for situations to eat others where they can’t grow themselves.” According to the study authors, the research doesn’t just have implications for bacterial neighborhoods; it also has implications for human health and medicine. By harnessing these bacterial weapons, it may be possible to build better targeted antibiotics, designed to overcome antibiotic resistance. Ruthless Bacteria Use HarpoonsResearchers have long known that some bacteria can be ruthless, using weapons like the T6SS to clear out their competition. A nasty tool, the T6SS is essentially a tiny harpoon gun with a poison-tipped needle. When a bacterium shoots the weapon into another bacterium from a separate species, the needle pierces the microbe without killing it. Then, it injects toxins into the microbe that cause its internal nutrients to spill out.Up until now, researchers thought that this weapon helped bacteria eliminate their competition for space and for food, but after watching bacteria use the T6SS to attack their neighbors when food was scarce, the study authors concluded that these tiny harpooners use the weapon not only to remove rivals, but also to consume their competitors’ leaked nutrients.“Watching these cells in action really drives home how resourceful bacteria can be,” said Astrid Stubbusch, another study author and a researcher who worked on the study while at ETH Zurich, according to the press release. “By slowly releasing nutrients from their neighbors, they maximize their nutrient harvesting when every molecule counts.” Absorbing Food From NeighborsTo show that the bacteria used this system to eat when there was no food around, the study authors compared their attacks in both nutrient-rich and nutrient-poor environments. When supplied with ample resources, the bacteria used their harpoons to kill their neighbors quickly, with the released nutrients leaking out and dissolving immediately. But when resources were few and far between, they used their harpoons to kill their neighbors slowly, with the nutrients seeping out and sticking around. “This difference in dissolution time could mean that the killer cells load their spears with different toxins,” D’Souza said in another press release. While one toxin could eliminate the competition for space and for food when nutrients are available, another could create a food source, allowing bacteria to “absorb as many nutrients as possible” when sustenance is in short supply.Because of all this, this weapon system is more than ruthless; it’s also smart, and important to some species’ survival. When genetically unedited T6SS bacteria were put in an environment without food, they survived on spilled nutrients. But when genetically edited T6SS bacteria were placed in a similar environment, they died, because their ability to find food in their neighbors had been “turned off.”Harnessing Bacterial HarpoonsAccording to the study authors, the T6SS system is widely used by bacteria, both in and outside the lab. “It’s present in many different environments,” D’Souza said in one of the press releases. “It’s operational and happening in nature, from the oceans to the human gut.” The study authors add that their research could change the way we think about bacteria and could help in our fight against antibiotic resistance. In fact, the T6SS could one day serve as a foundation for targeted drug delivery systems, which could mitigate the development of broader bacterial resistance to antibiotics. But before that can happen, however, researchers have to learn more about bacterial harpoons, and about when and how bacteria use them, both to beat and eat their neighbors.Article SourcesOur writers at Discovermagazine.com use peer-reviewed studies and high-quality sources for our articles, and our editors review for scientific accuracy and editorial standards. Review the sources used below for this article:Sam Walters is a journalist covering archaeology, paleontology, ecology, and evolution for Discover, along with an assortment of other topics. Before joining the Discover team as an assistant editor in 2022, Sam studied journalism at Northwestern University in Evanston, Illinois.1 free article leftWant More? Get unlimited access for as low as /monthSubscribeAlready a subscriber?Register or Log In1 free articleSubscribeWant more?Keep reading for as low as !SubscribeAlready a subscriber?Register or Log In #hungry #bacteria #hunt #their #neighbors
    WWW.DISCOVERMAGAZINE.COM
    Hungry Bacteria Hunt Their Neighbors With Tiny, Poison-Tipped Harpoons
    Starving bacteria (cyan) use a microscopic harpoon—called the Type VI secretion system—to stab and kill neighboring cells (magenta). The prey burst, turning spherical and leaking nutrients, which the killers then use to survive and grow. (Image Credit: Glen D'Souza/ASU/Screen shot from video)NewsletterSign up for our email newsletter for the latest science newsBacteria are bad neighbors. And we’re not talking noisy, never-take-out-the-trash bad neighbors. We’re talking has-a-harpoon-gun-and-points-it-at-you bad neighbors. According to a new study in Science, some bacteria hunt nearby bacterial species when they’re hungry. Using a special weapon system called the Type VI Secretion System (T6SS), these bacteria shoot, spill, and then absorb the nutrients from the microbes they harpoon. “The punchline is: When things get tough, you eat your neighbors,” said Glen D’Souza, a study author and an assistant professor at Arizona State University, according to a press release. “We’ve known bacteria kill each other, that’s textbook. But what we’re seeing is that it’s not just important that the bacteria have weapons to kill, but they are controlling when they use those weapons specifically for situations to eat others where they can’t grow themselves.” According to the study authors, the research doesn’t just have implications for bacterial neighborhoods; it also has implications for human health and medicine. By harnessing these bacterial weapons, it may be possible to build better targeted antibiotics, designed to overcome antibiotic resistance. Ruthless Bacteria Use HarpoonsResearchers have long known that some bacteria can be ruthless, using weapons like the T6SS to clear out their competition. A nasty tool, the T6SS is essentially a tiny harpoon gun with a poison-tipped needle. When a bacterium shoots the weapon into another bacterium from a separate species, the needle pierces the microbe without killing it. Then, it injects toxins into the microbe that cause its internal nutrients to spill out.Up until now, researchers thought that this weapon helped bacteria eliminate their competition for space and for food, but after watching bacteria use the T6SS to attack their neighbors when food was scarce, the study authors concluded that these tiny harpooners use the weapon not only to remove rivals, but also to consume their competitors’ leaked nutrients.“Watching these cells in action really drives home how resourceful bacteria can be,” said Astrid Stubbusch, another study author and a researcher who worked on the study while at ETH Zurich, according to the press release. “By slowly releasing nutrients from their neighbors, they maximize their nutrient harvesting when every molecule counts.” Absorbing Food From NeighborsTo show that the bacteria used this system to eat when there was no food around, the study authors compared their attacks in both nutrient-rich and nutrient-poor environments. When supplied with ample resources, the bacteria used their harpoons to kill their neighbors quickly, with the released nutrients leaking out and dissolving immediately. But when resources were few and far between, they used their harpoons to kill their neighbors slowly, with the nutrients seeping out and sticking around. “This difference in dissolution time could mean that the killer cells load their spears with different toxins,” D’Souza said in another press release. While one toxin could eliminate the competition for space and for food when nutrients are available, another could create a food source, allowing bacteria to “absorb as many nutrients as possible” when sustenance is in short supply.Because of all this, this weapon system is more than ruthless; it’s also smart, and important to some species’ survival. When genetically unedited T6SS bacteria were put in an environment without food, they survived on spilled nutrients. But when genetically edited T6SS bacteria were placed in a similar environment, they died, because their ability to find food in their neighbors had been “turned off.”Harnessing Bacterial HarpoonsAccording to the study authors, the T6SS system is widely used by bacteria, both in and outside the lab. “It’s present in many different environments,” D’Souza said in one of the press releases. “It’s operational and happening in nature, from the oceans to the human gut.” The study authors add that their research could change the way we think about bacteria and could help in our fight against antibiotic resistance. In fact, the T6SS could one day serve as a foundation for targeted drug delivery systems, which could mitigate the development of broader bacterial resistance to antibiotics. But before that can happen, however, researchers have to learn more about bacterial harpoons, and about when and how bacteria use them, both to beat and eat their neighbors.Article SourcesOur writers at Discovermagazine.com use peer-reviewed studies and high-quality sources for our articles, and our editors review for scientific accuracy and editorial standards. Review the sources used below for this article:Sam Walters is a journalist covering archaeology, paleontology, ecology, and evolution for Discover, along with an assortment of other topics. Before joining the Discover team as an assistant editor in 2022, Sam studied journalism at Northwestern University in Evanston, Illinois.1 free article leftWant More? Get unlimited access for as low as $1.99/monthSubscribeAlready a subscriber?Register or Log In1 free articleSubscribeWant more?Keep reading for as low as $1.99!SubscribeAlready a subscriber?Register or Log In
    Like
    Love
    Wow
    Sad
    Angry
    375
    2 Commentarii 0 Distribuiri
  • The stunning reversal of humanity’s oldest bias

    Perhaps the oldest, most pernicious form of human bias is that of men toward women. It often started at the moment of birth. In ancient Athens, at a public ceremony called the amphidromia, fathers would inspect a newborn and decide whether it would be part of the family, or be cast away. One often socially acceptable reason for abandoning the baby: It was a girl. Female infanticide has been distressingly common in many societies — and its practice is not just ancient history. In 1990, the Nobel Prize-winning economist Amartya Sen looked at birth ratios in Asia, North Africa, and China and calculated that more than 100 million women were essentially “missing” — meaning that, based on the normal ratio of boys to girls at birth and the longevity of both genders, there was a huge missing number of girls who should have been born, but weren’t. Sen’s estimate came before the truly widespread adoption of ultrasound tests that could determine the sex of a fetus in utero — which actually made the problem worse, leading to a wave of sex-selective abortions. These were especially common in countries like India and China; the latter’s one-child policy and old biases made families desperate for their one child to be a boy. The Economist has estimated that since 1980 alone, there have been approximately 50 million fewer girls born worldwide than would naturally be expected, which almost certainly means that roughly that nearly all of those girls were aborted for no other reason than their sex. The preference for boys was a bias that killed in mass numbers.But in one of the most important social shifts of our time, that bias is changing. In a great cover story earlier this month, The Economist reported that the number of annual excess male births has fallen from a peak of 1.7 million in 2000 to around 200,000, which puts it back within the biologically standard birth ratio of 105 boys for every 100 girls. Countries that once had highly skewed sex ratios — like South Korea, which saw almost 116 boys born for every 100 girls in 1990 — now have normal or near-normal ratios. Altogether, The Economist estimated that the decline in sex preference at birth in the past 25 years has saved the equivalent of 7 million girls. That’s comparable to the number of lives saved by anti-smoking efforts in the US. So how, exactly, have we overcome a prejudice that seemed so embedded in human society?Success in school and the workplaceFor one, we have relaxed discrimination against girls and women in other ways — in school and in the workplace. With fewer limits, girls are outperforming boys in the classroom. In the most recent international PISA tests, considered the gold standard for evaluating student performance around the world, 15-year-old girls beat their male counterparts in reading in 79 out of 81 participating countries or economies, while the historic male advantage in math scores has fallen to single digits. Girls are also dominating in higher education, with 113 female students at that level for every 100 male students. While women continue to earn less than men, the gender pay gap has been shrinking, and in a number of urban areas in the US, young women have actually been outearning young men. Government policies have helped accelerate that shift, in part because they have come to recognize the serious social problems that eventually result from decades of anti-girl discrimination. In countries like South Korea and China, which have long had some of the most skewed gender ratios at birth, governments have cracked down on technologies that enable sex-selective abortion. In India, where female infanticide and neglect have been particularly horrific, slogans like “the Daughter, Educate the Daughter” have helped change opinions. A changing preferenceThe shift is being seen not just in birth sex ratios, but in opinion polls — and in the actions of would-be parents.Between 1983 and 2003, The Economist reported, the proportion of South Korean women who said it was “necessary” to have a son fell from 48 percent to 6 percent, while nearly half of women now say they want daughters. In Japan, the shift has gone even further — as far back as 2002, 75 percent of couples who wanted only one child said they hoped for a daughter.In the US, which allows sex selection for couples doing in-vitro fertilization, there is growing evidence that would-be parents prefer girls, as do potential adoptive parents. While in the past, parents who had a girl first were more likely to keep trying to have children in an effort to have a boy, the opposite is now true — couples who have a girl first are less likely to keep trying. A more equal futureThere’s still more progress to be made. In northwest of India, for instance, birth ratios that overly skew toward boys are still the norm. In regions of sub-Saharan Africa, birth sex ratios may be relatively normal, but post-birth discrimination in the form of poorer nutrition and worse medical care still lingers. And course, women around the world are still subject to unacceptable levels of violence and discrimination from men.And some of the reasons for this shift may not be as high-minded as we’d like to think. Boys around the world are struggling in the modern era. They increasingly underperform in education, are more likely to be involved in violent crime, and in general, are failing to launch into adulthood. In the US, 20 percent of American men between 25 and 34 still live with their parents, compared to 15 percent of similarly aged women. It also seems to be the case that at least some of the increasing preference for girls is rooted in sexist stereotypes. Parents around the world may now prefer girls partly because they see them as more likely to take care of them in their old age — meaning a different kind of bias against women, that they are more natural caretakers, may be paradoxically driving the decline in prejudice against girls at birth.But make no mistake — the decline of boy preference is a clear mark of social progress, one measured in millions of girls’ lives saved. And maybe one Father’s Day, not too long from now, we’ll reach the point where daughters and sons are simply children: equally loved and equally welcomed.A version of this story originally appeared in the Good News newsletter. Sign up here!See More:
    #stunning #reversal #humanitys #oldest #bias
    The stunning reversal of humanity’s oldest bias
    Perhaps the oldest, most pernicious form of human bias is that of men toward women. It often started at the moment of birth. In ancient Athens, at a public ceremony called the amphidromia, fathers would inspect a newborn and decide whether it would be part of the family, or be cast away. One often socially acceptable reason for abandoning the baby: It was a girl. Female infanticide has been distressingly common in many societies — and its practice is not just ancient history. In 1990, the Nobel Prize-winning economist Amartya Sen looked at birth ratios in Asia, North Africa, and China and calculated that more than 100 million women were essentially “missing” — meaning that, based on the normal ratio of boys to girls at birth and the longevity of both genders, there was a huge missing number of girls who should have been born, but weren’t. Sen’s estimate came before the truly widespread adoption of ultrasound tests that could determine the sex of a fetus in utero — which actually made the problem worse, leading to a wave of sex-selective abortions. These were especially common in countries like India and China; the latter’s one-child policy and old biases made families desperate for their one child to be a boy. The Economist has estimated that since 1980 alone, there have been approximately 50 million fewer girls born worldwide than would naturally be expected, which almost certainly means that roughly that nearly all of those girls were aborted for no other reason than their sex. The preference for boys was a bias that killed in mass numbers.But in one of the most important social shifts of our time, that bias is changing. In a great cover story earlier this month, The Economist reported that the number of annual excess male births has fallen from a peak of 1.7 million in 2000 to around 200,000, which puts it back within the biologically standard birth ratio of 105 boys for every 100 girls. Countries that once had highly skewed sex ratios — like South Korea, which saw almost 116 boys born for every 100 girls in 1990 — now have normal or near-normal ratios. Altogether, The Economist estimated that the decline in sex preference at birth in the past 25 years has saved the equivalent of 7 million girls. That’s comparable to the number of lives saved by anti-smoking efforts in the US. So how, exactly, have we overcome a prejudice that seemed so embedded in human society?Success in school and the workplaceFor one, we have relaxed discrimination against girls and women in other ways — in school and in the workplace. With fewer limits, girls are outperforming boys in the classroom. In the most recent international PISA tests, considered the gold standard for evaluating student performance around the world, 15-year-old girls beat their male counterparts in reading in 79 out of 81 participating countries or economies, while the historic male advantage in math scores has fallen to single digits. Girls are also dominating in higher education, with 113 female students at that level for every 100 male students. While women continue to earn less than men, the gender pay gap has been shrinking, and in a number of urban areas in the US, young women have actually been outearning young men. Government policies have helped accelerate that shift, in part because they have come to recognize the serious social problems that eventually result from decades of anti-girl discrimination. In countries like South Korea and China, which have long had some of the most skewed gender ratios at birth, governments have cracked down on technologies that enable sex-selective abortion. In India, where female infanticide and neglect have been particularly horrific, slogans like “the Daughter, Educate the Daughter” have helped change opinions. A changing preferenceThe shift is being seen not just in birth sex ratios, but in opinion polls — and in the actions of would-be parents.Between 1983 and 2003, The Economist reported, the proportion of South Korean women who said it was “necessary” to have a son fell from 48 percent to 6 percent, while nearly half of women now say they want daughters. In Japan, the shift has gone even further — as far back as 2002, 75 percent of couples who wanted only one child said they hoped for a daughter.In the US, which allows sex selection for couples doing in-vitro fertilization, there is growing evidence that would-be parents prefer girls, as do potential adoptive parents. While in the past, parents who had a girl first were more likely to keep trying to have children in an effort to have a boy, the opposite is now true — couples who have a girl first are less likely to keep trying. A more equal futureThere’s still more progress to be made. In northwest of India, for instance, birth ratios that overly skew toward boys are still the norm. In regions of sub-Saharan Africa, birth sex ratios may be relatively normal, but post-birth discrimination in the form of poorer nutrition and worse medical care still lingers. And course, women around the world are still subject to unacceptable levels of violence and discrimination from men.And some of the reasons for this shift may not be as high-minded as we’d like to think. Boys around the world are struggling in the modern era. They increasingly underperform in education, are more likely to be involved in violent crime, and in general, are failing to launch into adulthood. In the US, 20 percent of American men between 25 and 34 still live with their parents, compared to 15 percent of similarly aged women. It also seems to be the case that at least some of the increasing preference for girls is rooted in sexist stereotypes. Parents around the world may now prefer girls partly because they see them as more likely to take care of them in their old age — meaning a different kind of bias against women, that they are more natural caretakers, may be paradoxically driving the decline in prejudice against girls at birth.But make no mistake — the decline of boy preference is a clear mark of social progress, one measured in millions of girls’ lives saved. And maybe one Father’s Day, not too long from now, we’ll reach the point where daughters and sons are simply children: equally loved and equally welcomed.A version of this story originally appeared in the Good News newsletter. Sign up here!See More: #stunning #reversal #humanitys #oldest #bias
    WWW.VOX.COM
    The stunning reversal of humanity’s oldest bias
    Perhaps the oldest, most pernicious form of human bias is that of men toward women. It often started at the moment of birth. In ancient Athens, at a public ceremony called the amphidromia, fathers would inspect a newborn and decide whether it would be part of the family, or be cast away. One often socially acceptable reason for abandoning the baby: It was a girl. Female infanticide has been distressingly common in many societies — and its practice is not just ancient history. In 1990, the Nobel Prize-winning economist Amartya Sen looked at birth ratios in Asia, North Africa, and China and calculated that more than 100 million women were essentially “missing” — meaning that, based on the normal ratio of boys to girls at birth and the longevity of both genders, there was a huge missing number of girls who should have been born, but weren’t. Sen’s estimate came before the truly widespread adoption of ultrasound tests that could determine the sex of a fetus in utero — which actually made the problem worse, leading to a wave of sex-selective abortions. These were especially common in countries like India and China; the latter’s one-child policy and old biases made families desperate for their one child to be a boy. The Economist has estimated that since 1980 alone, there have been approximately 50 million fewer girls born worldwide than would naturally be expected, which almost certainly means that roughly that nearly all of those girls were aborted for no other reason than their sex. The preference for boys was a bias that killed in mass numbers.But in one of the most important social shifts of our time, that bias is changing. In a great cover story earlier this month, The Economist reported that the number of annual excess male births has fallen from a peak of 1.7 million in 2000 to around 200,000, which puts it back within the biologically standard birth ratio of 105 boys for every 100 girls. Countries that once had highly skewed sex ratios — like South Korea, which saw almost 116 boys born for every 100 girls in 1990 — now have normal or near-normal ratios. Altogether, The Economist estimated that the decline in sex preference at birth in the past 25 years has saved the equivalent of 7 million girls. That’s comparable to the number of lives saved by anti-smoking efforts in the US. So how, exactly, have we overcome a prejudice that seemed so embedded in human society?Success in school and the workplaceFor one, we have relaxed discrimination against girls and women in other ways — in school and in the workplace. With fewer limits, girls are outperforming boys in the classroom. In the most recent international PISA tests, considered the gold standard for evaluating student performance around the world, 15-year-old girls beat their male counterparts in reading in 79 out of 81 participating countries or economies, while the historic male advantage in math scores has fallen to single digits. Girls are also dominating in higher education, with 113 female students at that level for every 100 male students. While women continue to earn less than men, the gender pay gap has been shrinking, and in a number of urban areas in the US, young women have actually been outearning young men. Government policies have helped accelerate that shift, in part because they have come to recognize the serious social problems that eventually result from decades of anti-girl discrimination. In countries like South Korea and China, which have long had some of the most skewed gender ratios at birth, governments have cracked down on technologies that enable sex-selective abortion. In India, where female infanticide and neglect have been particularly horrific, slogans like “Save the Daughter, Educate the Daughter” have helped change opinions. A changing preferenceThe shift is being seen not just in birth sex ratios, but in opinion polls — and in the actions of would-be parents.Between 1983 and 2003, The Economist reported, the proportion of South Korean women who said it was “necessary” to have a son fell from 48 percent to 6 percent, while nearly half of women now say they want daughters. In Japan, the shift has gone even further — as far back as 2002, 75 percent of couples who wanted only one child said they hoped for a daughter.In the US, which allows sex selection for couples doing in-vitro fertilization, there is growing evidence that would-be parents prefer girls, as do potential adoptive parents. While in the past, parents who had a girl first were more likely to keep trying to have children in an effort to have a boy, the opposite is now true — couples who have a girl first are less likely to keep trying. A more equal futureThere’s still more progress to be made. In northwest of India, for instance, birth ratios that overly skew toward boys are still the norm. In regions of sub-Saharan Africa, birth sex ratios may be relatively normal, but post-birth discrimination in the form of poorer nutrition and worse medical care still lingers. And course, women around the world are still subject to unacceptable levels of violence and discrimination from men.And some of the reasons for this shift may not be as high-minded as we’d like to think. Boys around the world are struggling in the modern era. They increasingly underperform in education, are more likely to be involved in violent crime, and in general, are failing to launch into adulthood. In the US, 20 percent of American men between 25 and 34 still live with their parents, compared to 15 percent of similarly aged women. It also seems to be the case that at least some of the increasing preference for girls is rooted in sexist stereotypes. Parents around the world may now prefer girls partly because they see them as more likely to take care of them in their old age — meaning a different kind of bias against women, that they are more natural caretakers, may be paradoxically driving the decline in prejudice against girls at birth.But make no mistake — the decline of boy preference is a clear mark of social progress, one measured in millions of girls’ lives saved. And maybe one Father’s Day, not too long from now, we’ll reach the point where daughters and sons are simply children: equally loved and equally welcomed.A version of this story originally appeared in the Good News newsletter. Sign up here!See More:
    Like
    Love
    Wow
    Sad
    Angry
    525
    0 Commentarii 0 Distribuiri
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Commentarii 0 Distribuiri
Sponsorizeaza Paginile