and Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 24 May 2024 13:11:17 +0000 As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond? Full Article
and The murky world of password leaks – and how to check if you’ve been hit By www.welivesecurity.com Published On :: Mon, 03 Jun 2024 09:30:00 +0000 Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look Full Article
and Arid Viper poisons Android apps with AridSpy By www.welivesecurity.com Published On :: Thu, 13 Jun 2024 09:29:00 +0000 ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine Full Article
and How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 14 Jun 2024 11:58:03 +0000 The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app Full Article
and Hacktivism is evolving – and that could be bad news for organizations everywhere By www.welivesecurity.com Published On :: Wed, 19 Jun 2024 09:30:00 +0000 Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat Full Article
and Hijacked: How hacked YouTube channels spread scams and malware By www.welivesecurity.com Published On :: Mon, 01 Jul 2024 09:30:00 +0000 Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform Full Article
and Buying a VPN? Here’s what to know and look for By www.welivesecurity.com Published On :: Tue, 25 Jun 2024 09:30:00 +0000 VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes Full Article
and AI in the workplace: The good, the bad, and the algorithmic By www.welivesecurity.com Published On :: Tue, 02 Jul 2024 09:30:00 +0000 While AI can liberate us from tedious tasks and even eliminate human error, it's crucial to remember its weaknesses and the unique capabilities that humans bring to the table Full Article
and Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 28 Jun 2024 13:13:12 +0000 Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year Full Article
and Social media and teen mental health – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Thu, 04 Jul 2024 14:31:24 +0000 Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick? Full Article
and Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4) By www.welivesecurity.com Published On :: Wed, 10 Jul 2024 09:30:00 +0000 As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds? Full Article
and Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android By www.welivesecurity.com Published On :: Mon, 22 Jul 2024 09:00:00 +0000 ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos Full Article
and Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 26 Jul 2024 11:57:23 +0000 Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files Full Article
and AI and automation reducing breach costs – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 02 Aug 2024 11:30:15 +0000 Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies Full Article
and NGate Android malware relays NFC traffic to steal cash By www.welivesecurity.com Published On :: Thu, 22 Aug 2024 09:00:00 +0000 Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM Full Article
and How regulatory standards and cyber insurance inform each other By www.welivesecurity.com Published On :: Wed, 21 Aug 2024 09:00:00 +0000 Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with Full Article
and Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5) By www.welivesecurity.com Published On :: Mon, 26 Aug 2024 09:00:00 +0000 The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure Full Article
and PWA phishing on Android and iOS – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 23 Aug 2024 09:00:00 +0000 Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security Full Article
and 6 common Geek Squad scams and how to defend against them By www.welivesecurity.com Published On :: Wed, 11 Sep 2024 09:00:00 +0000 Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks Full Article
and Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023 By www.welivesecurity.com Published On :: Thu, 26 Sep 2024 09:00:00 +0000 ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine Full Article
and Understanding cyber-incident disclosure By www.welivesecurity.com Published On :: Wed, 18 Sep 2024 09:02:40 +0000 Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help Full Article
and Don’t panic and other tips for staying safe from scareware By www.welivesecurity.com Published On :: Wed, 25 Sep 2024 09:00:00 +0000 Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics Full Article
and Separating the bee from the panda: CeranaKeeper making a beeline for Thailand By www.welivesecurity.com Published On :: Wed, 02 Oct 2024 13:00:00 +0000 ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia Full Article
and Cyber insurance, human risk, and the potential for cyber-ratings By www.welivesecurity.com Published On :: Tue, 08 Oct 2024 09:00:00 +0000 Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? Full Article
and Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships By www.welivesecurity.com Published On :: Mon, 14 Oct 2024 09:00:00 +0000 The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry Full Article
and Google Voice scams: What are they and how do I avoid them? By www.welivesecurity.com Published On :: Mon, 21 Oct 2024 09:00:00 +0000 Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers Full Article
and CloudScout: Evasive Panda scouting cloud services By www.welivesecurity.com Published On :: Mon, 28 Oct 2024 10:00:00 +0000 ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services Full Article
and Random String Utility By blogs.mathworks.com Published On :: Fri, 07 Oct 2022 13:01:26 +0000 Will's pick this week is Random String Utility by Dan Couture. This is an oldie but a goodie. This submission is from 2012 but still works just fine in R2022b (another testament to the... read more >> Full Article Picks
and Statistical visualization functions and “Open in MATLAB Online” By blogs.mathworks.com Published On :: Sat, 27 Jan 2024 16:27:05 +0000 Jiro's Pick this week is dabarplot, daviolinplot, daboxplot by Povilas Karvelis.Today, I'd like to highlight a couple of things in this post.Statistical visualization functions"Open in MATLAB Online"... read more >> Full Article Picks Utility
and Airtel, Secure Meters to offer Narrow Band-IoT services By cio.economictimes.indiatimes.com Published On :: Tue, 25 Apr 2023 07:11:03 +0530 "IoT is one of the fastest-growing business segments for Airtel Business. This venture into NB-IoT strengthens our credentials as the largest cellular IoT player in the country and places us as a partner of choice for Discoms looking to invest in smart meters," said Ajay Chitkara, director and CEO, Airtel Business. Full Article
and TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India By cio.economictimes.indiatimes.com Published On :: Wed, 21 Jun 2023 08:22:21 +0530 The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP). Full Article
and Project Wave: Indian Bank joins hands with NeSL to roll out digital services By cio.economictimes.indiatimes.com Published On :: Mon, 03 Jul 2023 08:41:26 +0530 The digital services will reduce the turn-around time of the bank guarantee issuance and delivery to the beneficiary from an industry average of 3-4 working days to a few minutes. Full Article
and Leveraging data in your AI strategy: Gopichand Katragadda, Myelin Foundry By cio.economictimes.indiatimes.com Published On :: Wed, 13 Sep 2023 17:20:47 +0530 As organizations harness the power of data, they can unlock new possibilities and drive transformative initiatives. Katragadda's insights make it abundantly clear that data is the cornerstone of any AI strategy. Full Article
and Simplify and accelerate your cloud journey: Genie Yuan, Couchbase By cio.economictimes.indiatimes.com Published On :: Thu, 23 Nov 2023 13:40:02 +0530 As the cloud becomes an integral part of the business infrastructure, the need for a streamlined, accelerated approach to cloud adoption coupled with consistency in technology stacks is more pronounced than ever. Genie Yuan, Regional VP and Head of Field Engineering for APJ at Couchbase, shares key insights. Full Article
and Navigating data localization laws in an evolving business landscape By cio.economictimes.indiatimes.com Published On :: Wed, 29 Nov 2023 16:09:00 +0530 As the digital economy expands, so does the volume of data generated and stored within India. This presents an opportunity for the government to implement data localization policies to safeguard sensitive data, protect national security, and promote the growth of the domestic IT industry and related sectors. Full Article
and Cisco opens first India plant: Excited about India as a market and export hub, says CEO Chuck Robbins By cio.economictimes.indiatimes.com Published On :: Fri, 04 Oct 2024 11:38:34 +0530 Cisco’s new facility at Chennai will manufacture Network Convergence System (NCS) 540 Series of routers. Full Article
and Union Bank of India and Zoho Mark Digital Transformation Success with Leadership Meet By cio.economictimes.indiatimes.com Published On :: Tue, 15 Oct 2024 12:06:17 +0530 The partnership between Union Bank of India and Zoho began in 2021 after the merger of Andhra Bank and Corporation Bank with Union Bank of India, which significantly expanded its operations. Full Article
and IBM drives manufacturing's digital shift with AI, IoT, and sustainability focus By cio.economictimes.indiatimes.com Published On :: Fri, 18 Oct 2024 11:07:57 +0530 IBM Executive Director Rajesh Parameswaran outlines key trends and strategies to transform manufacturing through technology. Full Article
and Bandhan Financial Services acquires global IT company Genisys By cio.economictimes.indiatimes.com Published On :: Tue, 05 Nov 2024 10:50:48 +0530 Bandhan Financial Services Ltd (BFSL), promoter of Bandhan Bank, has ventured into the IT sector by acquiring Genisys group of companies for nearly Rs 100 crore. This strategic move aims to leverage technology for business solutions and enhance shareholder value. Genisys, specializing in AI-enabled solutions for various sectors, will operate under BFSL with expanded capabilities. Full Article
and Amazon CEO Andy Jassy explains why he hates bureaucracy By cio.economictimes.indiatimes.com Published On :: Wed, 06 Nov 2024 10:32:13 +0530 Amazon CEO Andy Jassy, in a recent internal meeting, outlined the company's strategy to reduce management layers, aiming to eliminate bureaucracy and foster a more agile and innovative culture. Citing the rapidly evolving tech landscape, Jassy emphasized the need for faster decision-making and increased individual ownership. Full Article
and LinkedIn cuts over 700 jobs, exits China app as demand wavers By cio.economictimes.indiatimes.com Published On :: Tue, 09 May 2023 09:25:27 +0530 LinkedIn, which has 20,000 employees, has grown revenue each quarter during the last year, but it joins other major technology companies including its parent in laying off workers amid a weakening global economic outlook. Full Article
and Brands and creators debate on the future of Meta's Threads as engagement dips By cio.economictimes.indiatimes.com Published On :: Mon, 24 Jul 2023 09:44:54 +0530 New data apps tracking firm Sensor Tower indicates the hype has died down and Threads has seen a 20% decrease in active users and a 50% reduction in time spent on the app, from 20 minutes to 10 minutes. Full Article
and Why Elon Musk rebranded Twitter as X By cio.economictimes.indiatimes.com Published On :: Tue, 25 Jul 2023 09:49:27 +0530 Since taking over Twitter last November, Tesla chief Elon Musk has transformed it. From selling the verified badge for $8 a month to letting creators monetise their content, Musk has revamped many things at the microblogging site, except for its iconic bird logo. That, however, is about to change. Full Article
and NASA sees Hurricane Newton approaching landfall in Baja California, Mexico By esciencenews.com Published On :: Tue, 06 Sep 2016 22:42:27 +0000 NASA's Terra satellite and a NASA animation of imagery from NOAA's GOES-West satellite provided views of Hurricane Newton as it neared landfall in Baja California, Mexico, today, Sept. 6. read more Full Article Earth & Climate
and NIST and Navy tests suggest telecom networks could back up GPS time signals By esciencenews.com Published On :: Fri, 09 Sep 2016 19:38:03 +0000 Precision time signals sent through the Global Positioning System (GPS) synchronize cellphone calls, time-stamp financial transactions, and support safe travel by aircraft, ship, train and car. read more Full Article Earth & Climate
and DPDPA and client data: Banks now fret over liability By cio.economictimes.indiatimes.com Published On :: Tue, 24 Oct 2023 09:05:20 +0530 Bank CEOs are tapping top legal minds, alerting their compliance teams, and discussing with each other to spot the pitfalls of the Digital Personal Data Protection Act (DPDPA) - a statute under which hundreds of crores of fines can be imposed on organisations for breaches. Full Article
and How Karza Technologies makes due diligence and onboarding simpler for banks & NBFCs By cio.economictimes.indiatimes.com Published On :: Mon, 28 Feb 2022 13:48:28 +0530 One of the key pillars of growth for the Indian economy are small and medium-sized businesses, which generate roughly 30 percent of the countrys GDP and provide jobs to over 110 million people. Full Article
and How the renewed data protection landscape impact BPO industry By cio.economictimes.indiatimes.com Published On :: Thu, 17 Mar 2022 09:07:52 +0530 With the increased focus on data security and privacy, BPO service providers will need to restructure their data compliance plan ahead of time. This is not only to ensure that the soon-to-be-updated rules are implemented in a timely manner but also to improve customer service efficiency and increase the firm's general reputation. Full Article
and AI has made testing tools and systems more responsive and agile By cio.economictimes.indiatimes.com Published On :: Thu, 19 May 2022 08:36:24 +0530 Managers in Industry 4.0 will need risk management skills, says Rekha Sethi, director-general of AIMA Full Article
and Godrej & Boyce uses AI, ML, and analytics to improve product quality and reduce defects By cio.economictimes.indiatimes.com Published On :: Mon, 27 Mar 2023 08:00:00 +0530 G&B has deployed over 80 RPA bots to automate manual processes across the value chain. This has resulted in productivity improvement, reduction in errors and improvement of employee experience. Full Article