We know that women often feel disenfranchised when it comes to mainstream medicine. Goop and the rest of the wellness industry has tapped into that frustration and exploited it for profit.
UN human rights experts have slammed the Japanese government for the alleged exploitation of “tens of thousands” of workers, as well as migrants and the homeless, said to be cleaning up the mangled Fukushima nuclear plant. In a three-way joint statement, released Thursday via the United Nations, the human rights experts detailed their deep concern […]
Enlarge / A US Air Force MQ-9 Reaper awaits maintenance December 8, 2016, at Creech Air Force Base, Nevada. Training materials for the Reaper Aircraft Maintenance Unit were stolen by a hacker exploiting a Netgear router. (credit: U.S. Air Force photo by Senior Airman Christian Clausen) In May, a hacker perusing vulnerable systems with the […]
Enlarge (credit: Lisa Cooper / Flickr) It’s not every day someone develops a malware attack that, with one click, exploits separate zero-day vulnerabilities in two widely different pieces of software. It’s even rarer that a careless mistake burns such a unicorn before it can be used. Researchers say that’s precisely happened to malicious PDF document […]
Enlarge (credit: Lisa Brewster / Flickr) Microsoft on Tuesday patched two Windows vulnerabilities that attackers are actively exploiting in the wild to install malicious apps on the computers of unwitting users. The first vulnerability resides in the VBScript Engine included in all currently supported versions of Windows. A so-called use-after-free flaw involving the way the […]
FERTILITY clinics are ignoring the health of women having IVF treatment, giving them heavy doses of drugs and potentially putting lives at risk, a conference will be told this week. The outdated treatments involve drugs which could be replaced with newer, safer alternatives, experts will say.
Last night Facebook announced bans against Cambridge Analytica, its parent company and several individuals for allegedly sharing and keeping data that they had promised to delete. This data reportedly included information siphoned from hundreds of thousands of Amazon Mechanical Turkers who were paid to use a “personality prediction app” that collected data from them and […]
Enlarge (credit: Armin Kübelbeck) Developers of Ethereum, the world’s No. 2 digital currency by market capitalization, have closed a serious security hole that allowed virtually anyone with an Internet connection to manipulate individual users’ access to the publicly accessible ledger. So-called eclipse attacks work by preventing a cryptocurrency user from connecting to honest peers. Attacker-controlled […]
Enlarge / A screenshot of the malicious Excel document spreading a Flash zeroday. (credit: Talos) An increasingly sophisticated hacking group is exploiting a zero-day vulnerability in Adobe’s Flash Player that lets them take full control of infected machines, researchers said Friday. The critical, use-after-free vulnerability, which is indexed as CVE-2018-4877, resides in the latest version […]
Enlarge / Fastest to hack, maybe? (credit: T-Mobile USA) A bug disclosed and patched last week by T-Mobile in a Web application interface allowed anyone to query account information by simply providing a phone number. That includes customer e-mail addresses, device identification data, and even the answers to account security questions. The bug, which was […]