world news Top 5 Moments From The Supreme Court's 1st Week Of Livestreaming Arguments By feeds.scpr.org Published On :: Sat, 09 May 2020 06:00:36 -0700 The Supreme Court justices heard oral arguments remotely this week, and for the first time the arguments were streamed live to the public.; Credit: Saul Loeb/AFP via Getty Images Christina Peck and Nina Totenberg | NPRFor the first time in its 231-year history, the Supreme Court justices heard oral arguments remotely by phone and made the audio available live. The new setup went off largely without difficulties, but produced some memorable moments, including one justice forgetting to unmute and an ill-timed bathroom break. Here are the top five can't-miss moments from this week's history-making oral arguments. A second week of arguments begin on Monday at 10 a.m. ET. Here's a rundown of the cases and how to listen. 1. Justice Clarence Thomas speaks ... a lot Supreme Court oral arguments are verbal jousting matches. The justices pepper the lawyers with questions, interrupting counsel repeatedly and sometimes even interrupting each other. Justice Clarence Thomas, who has sat on the bench for nearly 30 years, has made his dislike of the chaotic process well known, at one point not asking a question for a full decade. But with no line of sight, the telephone arguments have to be rigidly organized, and each justice, in order of seniority, has an allotted 2 minutes for questioning. It turn out that Thomas, second in seniority, may just have been waiting his turn. Rather than passing, as had been expected, he has been Mr. Chatty Cathy, using every one of his turns at bat so far. Thomas broke a year-long silence on Monday in a trademark case testing whether a company can trademark by adding .com to a generic term. In this case, Booking.com. "Could Booking acquire an 800 number, for example, that's a vanity number — 1-800-BOOKING, for example?" Thomas asked. 2. The unstoppable RBG Justice Ruth Bader Ginsburg participated in Wednesday's argument from the hospital. In pain during Tuesday's arguments, the 87-year-old underwent non-surgical treatment for a gall bladder infection at Johns Hopkins Hospital later that day, according to a Supreme Court press release. But she was ferocious on Wednesday morning, calling in from her hospital room in a case testing the Trump administration's new rule expanding exemptions from Obamacare's birth control mandate for nonprofits and some for-profit companies that have religious or moral objections to birth control. "The glaring feature" of the Trump administration's new rules, is that they "toss to the winds entirely Congress' instruction that women need and shall have seamless, no-cost, comprehensive coverage," she said. 3. Who flushed? During Wednesday's second oral argument, Barr v. American Association of Political Consultants, a case in which the justices weighed a First Amendment challenge to a federal rule than bans most robocalls, something very unexpected happened. Partway through lawyer Roman Martinez's argument time, a toilet flush could be distinctly heard. Martinez seemed unperturbed and continued speaking in spite of the awkward moment. The flush quickly picked up steam online, becoming the first truly viral moment from the court's new livestream oral arguments. 4. Hello, where are you? Justice Sonia Sotomayor, considered one of the most tech-savvy of the justices, experienced a couple of technical difficulties with her mute button. In both Monday and Tuesday arguments, the first time she was at bat, there were prolonged pauses, prompting Chief Justice John Roberts to call, "Justice Sotomayor?" a few times before she hopped on with a brief, "Sorry, Chief," before launching into her questions. By Wednesday she seemed to have gotten used to the new format, but the trouble then jumped to Thomas, who was entirely missing in action when his turn came. He ultimately went out of order Wednesday morning. 5. Running over time Oral arguments usually run one hour almost exactly, with lawyers for each side having 30 minutes to make their case. In an attempt to stick as closely as possible to that format, the telephone rules allocate 2 minutes of questioning to each justice for each round of questioning. Chief Justice John Roberts spent the week jumping into exchanges, cutting off both lawyers and justices in the process, to keep the proceedings on track. Even so the arguments ran longer than usual. But in Wednesday's birth control case, oral arguments went a whopping 40 minutes longer than expected. Justice Alito, for his part, hammered the lawyer challenging the Trump administration's new birth control rules for more than seven minutes, without interruption from the chief justice. Referencing a decision he wrote in 2014, Alito said that "Hobby Lobby held that if a person sincerely believes that it is immoral to perform an act that has the effect of enabling another person to commit an immoral act, the federal court does not have the right to say that this person is wrong on the question of moral complicity. That is precisely the question here." Christina Peck is NPR's legal affairs intern. Copyright 2020 NPR. To see more, visit https://www.npr.org. This content is from Southern California Public Radio. View the original story at SCPR.org. Full Article
world news How The Approval Of The Birth Control Pill 60 Years Ago Helped Change Lives By feeds.scpr.org Published On :: Sat, 09 May 2020 07:00:21 -0700 Birth control pills in 1976 in New York. The birth control pill was approved by the FDA 60 years ago this week.; Credit: /Bettmann/Getty Images Sarah McCammon | NPRUpdated at 9:44 a.m. ET As a young woman growing up in a poor farming community in Virginia in the 1940 and '50s, with little information about sex or contraception, sexuality was a frightening thing for Carole Cato and her female friends. "We lived in constant fear, I mean all of us," she said. "It was like a tightrope. always wondering, is this going to be the time [I get pregnant]?" Cato, 78, now lives in Columbia, S.C. She grew up in the years before the birth control pill was approved by the U.S. Food and Drug Administration, on May 9, 1960. She said teenage girls in her community were told very little about how their bodies worked. "I was very fortunate; I did not get pregnant, but a lot of my friends did. And of course, they just got married and went into their little farmhouses," she said. "But I just felt I just had to get out." At 23, Cato married a widower who already had seven children. They decided seven was enough. By that time, Cato said, the pill allowed the couple to avoid having more babies — and she eventually was able to go on to college. "It was just like going from night to day, as far as the freedom of it," Cato said. "And to know that I had control, that I had choice, that I controlled my body. It gave me a whole new lease on life." Loretta Ross, an activist and visiting women's studies professor at Smith College, was among the first generation of young women to have access to the birth control pill throughout their reproductive years. Ross, now 66, said by the time she came of age around 1970, the pill was giving young women more control over their fertility than previous generations had enjoyed. "We could talk about having sex – not without consequences, because there were still STDS ... but at the same time, with more freedom than our foremothers had," Ross said. "So it changed the world." For all it's done for women, Ross said that the pill has a complex and controversial history; it was first tested on low-income women in Puerto Rico. Ross said the pill also has limitations; she'd like to see it made available over the counter, as it is in some countries – not to mention, a pill for men. When the pill was approved in 1960, women had few relatively few contraceptive options, and the pill offered more reliability and convenience than methods like condoms or diaphragms, said Dr. Eve Espey, chair of the Department of Ob/Gyn and Family Planning at the University of New Mexico. "There was a huge, pent-up desire for a truly effective form of contraception, which had been lacking up to that point," Espey said. By 1965, she said, 40% of young married women were on the pill. For Pat Fishback, now 80 and living in Richmond, Va., the newly-available pill allowed her to delay having children in her early 20s until she'd been married for a couple of years. "It also made having children a positive experience," Fishback said. "Because we had actually, emotionally and intellectually, gotten to the point where we really desired to have children." It took a bit longer for unmarried women to gain widespread access to the pill and other forms of contraception: Linda Gordon, 80, a historian at New York University, remembers the stigma around single women and contraception at the time. "When I was in college, a number of women had a wedding ring – a gold ring –that we would pass around and use when we wanted to go see a doctor to get fitted for a diaphragm," Gordon said. "In other words, there were people finding their way to do that, even then." The pill also gave rise to a variety of other forms of hormonal contraception, many of which are popular today, Gordon said. According to the Centers for Disease Control and Prevention, nearly 13% of American women of reproductive age use the pill — making it the second most popular form of contraception, after female sterilization. Gordon said that 60 years after the pill's approval, contraception remains a contentious political issue. Just this week, the U.S. Supreme Court heard arguments in a case involving the birth control mandate in the Affordable Care Act. A decision on whether some institutions with religious or moral objections can deny contraceptive coverage to their employees is expected in the months to come. Copyright 2020 NPR. To see more, visit https://www.npr.org. This content is from Southern California Public Radio. View the original story at SCPR.org. Full Article
world news What to do if your Twitter account has been hacked By feedproxy.google.com Published On :: Fri, 20 Mar 2020 10:30:58 +0000 Losing access to your account can be stressful, but there are steps you can take to get it back – and to avoid getting hacked again The post What to do if your Twitter account has been hacked appeared first on WeLiveSecurity Full Article Cybersecurity
world news Keep calm and carry on working (remotely) By feedproxy.google.com Published On :: Fri, 20 Mar 2020 16:00:25 +0000 How can employees stay motivated and productive while teleworking during the COVID-19 crisis? The post Keep calm and carry on working (remotely) appeared first on WeLiveSecurity Full Article COVID-19
world news Week in security with Tony Anscombe By feedproxy.google.com Published On :: Fri, 20 Mar 2020 18:50:38 +0000 How to transition to a remote workforce in a safe manner – How to protect yourself from COVID-19 scams – Stantinko's miner caught using new obfuscation techniques The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Full Article
world news The good, the bad and the plain ugly By feedproxy.google.com Published On :: Mon, 23 Mar 2020 14:15:03 +0000 A prolific ransomware gang vows to dial back its campaigns and spare healthcare organizations altogether during the COVID-19 crisis. It’s no cause for celebration. The post The good, the bad and the plain ugly appeared first on WeLiveSecurity Full Article COVID-19
world news Microsoft warns of two Windows zero‑day flaws By feedproxy.google.com Published On :: Tue, 24 Mar 2020 14:24:02 +0000 Updates for the critical-rated vulnerabilities, which are being actively exploited in the wild, are still weeks away The post Microsoft warns of two Windows zero‑day flaws appeared first on WeLiveSecurity Full Article Vulnerability
world news Public health vs. personal privacy: Choose only one? By feedproxy.google.com Published On :: Wed, 25 Mar 2020 19:05:58 +0000 As the world turns to technology to track and contain the COVID-19 pandemic, could this spell the end of digital privacy rights? The post Public health vs. personal privacy: Choose only one? appeared first on WeLiveSecurity Full Article COVID-19
world news HPE issues fix to stop some SSDs from self‑destructing By feedproxy.google.com Published On :: Thu, 26 Mar 2020 12:43:47 +0000 If left unpatched, a firmware flaw in some enterprise-class solid-state drives could make data on them unrecoverable as early as this fall The post HPE issues fix to stop some SSDs from self‑destructing appeared first on WeLiveSecurity Full Article data protection
world news 6 tips for safe and secure remote working By feedproxy.google.com Published On :: Thu, 26 Mar 2020 19:30:53 +0000 Getting cybersecurity right in the work-from-home world can feel daunting. ESET Chief Security Evangelist Tony Anscombe shares 6 best practices that will steer you in the right direction. The post 6 tips for safe and secure remote working appeared first on WeLiveSecurity Full Article COVID-19
world news What happens when the global supply chain breaks? By feedproxy.google.com Published On :: Fri, 27 Mar 2020 12:30:14 +0000 If we can’t secure the supply chain, eventually everything else will break The post What happens when the global supply chain breaks? appeared first on WeLiveSecurity Full Article COVID-19
world news Week in security with Tony Anscombe By feedproxy.google.com Published On :: Fri, 27 Mar 2020 15:00:08 +0000 What COVID-19 may mean for privacy rights – Managing supply-chain risks – Two Windows zero-days remain unpatched The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Full Article
world news Work from home: Videoconferencing with security in mind By feedproxy.google.com Published On :: Mon, 30 Mar 2020 15:02:46 +0000 With COVID-19 concerns canceling face-to-face meetings, be aware of the security risks of videoconferencing and how to easily overcome them The post Work from home: Videoconferencing with security in mind appeared first on WeLiveSecurity Full Article COVID-19
world news Have you backed up your smartphone lately? By feedproxy.google.com Published On :: Tue, 31 Mar 2020 09:30:06 +0000 With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that your personal information remains safe The post Have you backed up your smartphone lately? appeared first on WeLiveSecurity Full Article Mobile Security
world news Coronavirus con artists continue to spread infections of their own By feedproxy.google.com Published On :: Wed, 01 Apr 2020 12:00:39 +0000 The scam machine shows no signs of slowing down, as fraudsters dispense bogus health advice, peddle fake testing kits and issue malware-laced purchase orders The post Coronavirus con artists continue to spread infections of their own appeared first on WeLiveSecurity Full Article COVID-19
world news Marriott hacked again, 5.2 million guests affected By feedproxy.google.com Published On :: Wed, 01 Apr 2020 14:42:13 +0000 Bad actors accessed a range of personally identifiable information, including names, dates of birth and a lot more The post Marriott hacked again, 5.2 million guests affected appeared first on WeLiveSecurity Full Article Cybersecurity
world news Work from home: Securing RDP and remote access By feedproxy.google.com Published On :: Thu, 02 Apr 2020 20:30:25 +0000 As work from home is the new norm in the coronavirus era, you’re probably thinking of enabling remote desktop connections for your off-site staff. Here’s how to do it securely. The post Work from home: Securing RDP and remote access appeared first on WeLiveSecurity Full Article COVID-19
world news Zoom’s privacy and security woes in the spotlight By feedproxy.google.com Published On :: Fri, 03 Apr 2020 20:30:19 +0000 The seemingly insatiable demand among people and businesses alike helps reveal a rash of privacy and security issues facing the platform The post Zoom’s privacy and security woes in the spotlight appeared first on WeLiveSecurity Full Article COVID-19
world news Week in security with Tony Anscombe By feedproxy.google.com Published On :: Fri, 03 Apr 2020 21:00:37 +0000 Staying safe from coronavirus-themed scams – Securing remote desktop connections – The security risks of videoconferencing The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Full Article
world news What to do you if your phone is lost or stolen By feedproxy.google.com Published On :: Mon, 06 Apr 2020 09:30:43 +0000 Losing your smartphone can be expensive, but the cost of the device may not be the final price you’ll be paying The post What to do you if your phone is lost or stolen appeared first on WeLiveSecurity Full Article Mobile Security
world news 600,000 people affected in email provider breach By feedproxy.google.com Published On :: Tue, 07 Apr 2020 14:31:40 +0000 The users' personal data are now up for grabs on the dark web for anywhere between US$3,500 and US$22,000 worth of bitcoin The post 600,000 people affected in email provider breach appeared first on WeLiveSecurity Full Article Cybersecurity
world news Top tips for videoconferencing security By feedproxy.google.com Published On :: Wed, 08 Apr 2020 14:39:31 +0000 ESET Chief Security Evangelist Tony Anscombe shares advice on how to keep your virtual meet-ups private and safe while you're holed up at home during the pandemic The post Top tips for videoconferencing security appeared first on WeLiveSecurity Full Article COVID-19
world news Ever needed a Zoom password? Probably not. But why not? By feedproxy.google.com Published On :: Thu, 09 Apr 2020 20:15:30 +0000 With Zoom – and Zoom-bombing – being all the rage, here’s why the app’s default password settings may be leaving the backdoor wide open The post Ever needed a Zoom password? Probably not. But why not? appeared first on WeLiveSecurity Full Article COVID-19
world news Zoom security: Getting the settings right By feedproxy.google.com Published On :: Fri, 10 Apr 2020 11:00:48 +0000 Here’s how you can greatly improve your Zoom privacy and security in a few simple steps The post Zoom security: Getting the settings right appeared first on WeLiveSecurity Full Article COVID-19
world news Week in security with Tony Anscombe By feedproxy.google.com Published On :: Fri, 10 Apr 2020 12:07:14 +0000 What to know about passwords in Zoom - What to do if your phone goes missing - Email provider hacked The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Full Article
world news Is “global privacy” an oxymoron? By feedproxy.google.com Published On :: Tue, 14 Apr 2020 09:30:27 +0000 While in France, a citizen of Brazil who resides in California books a bungee jump in New Zealand. Is it a leap of faith into the unknown, for both the operator and the thrill-seeker? The post Is “global privacy” an oxymoron? appeared first on WeLiveSecurity Full Article Privacy
world news Americans report US$13 million in losses from coronavirus scams By feedproxy.google.com Published On :: Tue, 14 Apr 2020 15:51:04 +0000 The median loss to fraudulent schemes that exploit the global health crisis is almost US$600 The post Americans report US$13 million in losses from coronavirus scams appeared first on WeLiveSecurity Full Article COVID-19
world news Half a million Zoom accounts for sale on the dark web By feedproxy.google.com Published On :: Thu, 16 Apr 2020 07:34:01 +0000 Even accounts belonging to banks and educational institutions were found on lists plastered across various hacker forums The post Half a million Zoom accounts for sale on the dark web appeared first on WeLiveSecurity Full Article Password
world news Apple releases mobility data to help combat COVID‑19 By feedproxy.google.com Published On :: Thu, 16 Apr 2020 17:15:20 +0000 The tool, which comes after a similar effort by Google, looks at how people’s traveling behavior has changed since the start of the pandemic The post Apple releases mobility data to help combat COVID‑19 appeared first on WeLiveSecurity Full Article COVID-19
world news Scams, lies, and coronavirus By feedproxy.google.com Published On :: Fri, 17 Apr 2020 09:30:54 +0000 Scams demanding bitcoin on pain of infecting you with the coronavirus gain their fair share of shine among schemes with a thin veneer of plausibility The post Scams, lies, and coronavirus appeared first on WeLiveSecurity Full Article COVID-19
world news Week in security with Tony Anscombe By feedproxy.google.com Published On :: Fri, 17 Apr 2020 12:30:30 +0000 Sextortion-meets-coronavirus scams - The financial loss from coronavirus-themed fraud in America - Is the time ripe for one global set of data privacy rules? The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Full Article
world news Hey there! Are you using WhatsApp? Your account may be hackable By feedproxy.google.com Published On :: Mon, 20 Apr 2020 09:30:38 +0000 Can someone take control of your WhatsApp account by just knowing your phone number? We ran a small test to find out. The post Hey there! Are you using WhatsApp? Your account may be hackable appeared first on WeLiveSecurity Full Article Social Media
world news Work from home: Should your digital assistant be on or off? By feedproxy.google.com Published On :: Mon, 20 Apr 2020 13:00:50 +0000 Being at your beck and call is central to the "personality" of your digital friend, but there are situations when the device could use some time off The post Work from home: Should your digital assistant be on or off? appeared first on WeLiveSecurity Full Article COVID-19
world news How gamification can boost your cybersecurity training By feedproxy.google.com Published On :: Tue, 21 Apr 2020 09:30:44 +0000 Security is not a game, but learning about it could be – here’s why adding the fun factor can help employees become more cyber-aware The post How gamification can boost your cybersecurity training appeared first on WeLiveSecurity Full Article Cybersecurity
world news Serious flaws found in multiple smart home hubs: Is your device among them? By feedproxy.google.com Published On :: Wed, 22 Apr 2020 07:30:01 +0000 In worst-case scenarios, some vulnerabilities could even allow attackers to take control over the central units and all peripheral devices connected to them The post Serious flaws found in multiple smart home hubs: Is your device among them? appeared first on WeLiveSecurity Full Article Vulnerability
world news Buying a secondhand device? Here’s what to keep in mind By feedproxy.google.com Published On :: Wed, 22 Apr 2020 09:30:34 +0000 If you’re trying to be responsible towards the planet, also be responsible to yourself and take these steps so that the device doesn’t end up costing you more than you’ve saved The post Buying a secondhand device? Here’s what to keep in mind appeared first on WeLiveSecurity Full Article Cybersecurity
world news Following ESET’s discovery, a Monero mining botnet is disrupted By feedproxy.google.com Published On :: Thu, 23 Apr 2020 09:30:57 +0000 ESET researchers discover, and play a key role in the disruption of, a 35,000-strong botnet spreading in Latin America via compromised USB drives The post Following ESET’s discovery, a Monero mining botnet is disrupted appeared first on WeLiveSecurity Full Article Malware
world news iOS Mail app flaws may have left iPhone users vulnerable for years By feedproxy.google.com Published On :: Thu, 23 Apr 2020 17:54:22 +0000 A pair of vulnerabilities in the default email app on iOS devices is believed to have been exploited against high-profile targets The post iOS Mail app flaws may have left iPhone users vulnerable for years appeared first on WeLiveSecurity Full Article Vulnerability
world news Week in security with Tony Anscombe By feedproxy.google.com Published On :: Fri, 24 Apr 2020 13:00:13 +0000 ESET research into vulnerabilities in smart home hubs – Discovering and disrupting a botnet in Latin America – Digital assistants in the work-from-home era The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Full Article
world news Microsoft Teams flaw could let attackers hijack accounts By feedproxy.google.com Published On :: Mon, 27 Apr 2020 16:55:34 +0000 Microsoft plugs a security hole that could have enabled attackers to weaponize a GIF in order to hijack Teams accounts and steal data The post Microsoft Teams flaw could let attackers hijack accounts appeared first on WeLiveSecurity Full Article Vulnerability
world news Grandoreiro: How engorged can an EXE get? By feedproxy.google.com Published On :: Tue, 28 Apr 2020 09:30:06 +0000 Another in our occasional series demystifying Latin American banking trojans The post Grandoreiro: How engorged can an EXE get? appeared first on WeLiveSecurity Full Article Malware
world news ESET Threat Report By feedproxy.google.com Published On :: Wed, 29 Apr 2020 12:00:04 +0000 A view of the Q1 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report appeared first on WeLiveSecurity Full Article Cybersecurity
world news Sextortion scammers still shilling with stolen passwords By feedproxy.google.com Published On :: Thu, 30 Apr 2020 09:30:00 +0000 The email includes the potential victim’s password as evidence of a hack, but there is more than meets the eye The post Sextortion scammers still shilling with stolen passwords appeared first on WeLiveSecurity Full Article Scams
world news It’s no time to let your guard down as coronavirus fraud remains a threat By feedproxy.google.com Published On :: Fri, 01 May 2020 09:30:34 +0000 Scammers rehash old campaigns, create credit card-stealing websites and repurpose information channels to milk the COVID-19 crisis for all it's worth The post It’s no time to let your guard down as coronavirus fraud remains a threat appeared first on WeLiveSecurity Full Article COVID-19
world news Week in security with Tony Anscombe By feedproxy.google.com Published On :: Fri, 01 May 2020 16:12:57 +0000 ESET's new Threat Report is out – Another deep dive into Latin American banking trojans – More coronavirus-themed scams The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Full Article
world news Ghost blogging platform servers hacked to mine cryptocurrency By feedproxy.google.com Published On :: Mon, 04 May 2020 14:33:18 +0000 Ghost wasn’t the only victim of break-ins over the weekend that exploited critical holes in infrastructure automation software for which patches were available The post Ghost blogging platform servers hacked to mine cryptocurrency appeared first on WeLiveSecurity Full Article Cybersecurity Uncategorized
world news Professional data leakage: How did that security vendor get my personal data? By feedproxy.google.com Published On :: Tue, 05 May 2020 09:30:55 +0000 …and why are they selling it to other security vendors and product testers? The post Professional data leakage: How did that security vendor get my personal data? appeared first on WeLiveSecurity Full Article Privacy
world news Almost a million WordPress websites targeted in massive campaign By feedproxy.google.com Published On :: Wed, 06 May 2020 19:18:12 +0000 An unknown threat actor is exploiting vulnerabilities in plugins for which patches have been available for months, or even years The post Almost a million WordPress websites targeted in massive campaign appeared first on WeLiveSecurity Full Article Vulnerability
world news 5 common password mistakes you should avoid By feedproxy.google.com Published On :: Thu, 07 May 2020 09:30:12 +0000 Password recycling or using easy-to-guess passwords are just two common mistakes you may be making when protecting your digital accounts The post 5 common password mistakes you should avoid appeared first on WeLiveSecurity Full Article Password
world news Digital transformation could be accelerated by COVID‑19 By feedproxy.google.com Published On :: Thu, 07 May 2020 12:30:04 +0000 The pandemic has highlighted the need for businesses to act with alacrity and prepare for the long haul – and to do so with cybersecurity in mind The post Digital transformation could be accelerated by COVID‑19 appeared first on WeLiveSecurity Full Article COVID-19