uri

Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4)

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?




uri

Should ransomware payments be banned? – Week in security with Tony Anscombe

Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective?




uri

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike




uri

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats




uri

Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe

Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files




uri

AI and automation reducing breach costs – Week in security with Tony Anscombe

Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies




uri

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards




uri

Black Hat USA 2024: All eyes on election security

In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated




uri

Black Hat USA 2024 recap – Week in security with Tony Anscombe

Unsurprisingly, many discussions revolved around the implications of the CrowdStrike outage, including the lessons it may have offered for bad actors




uri

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme




uri

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




uri

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security




uri

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become




uri

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams




uri

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one




uri

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends




uri

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.




uri

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process




uri

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices




uri

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years




uri

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms




uri

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week




uri

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry




uri

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities




uri

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship




uri

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year




uri

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories




uri

TRAI suggests MIB to design a suitable PLI scheme for STB manufacturing

The Telecom Regulatory Authority of India (TRAI) has recommended that linear set-top boxes (STBs) be included in the PLI scheme to promote local manufacturing in the television broadcasting sector. The TRAI has also suggested conducting periodic reviews of indigenous components, factoring in local components in determining localisation levels under the PLI scheme, and reviewing investment outlays required for MSME manufacturing for selected equipment.




uri

LTTS partners Palo Alto Network on 5G, OT security offerings

The new MSSP agreement will provide a managed service offering for Palo Alto Networks Zero Trust OT Security solution, allowing customers to outsource the management of their OT security to LTTS.




uri

IBM drives manufacturing's digital shift with AI, IoT, and sustainability focus

IBM Executive Director Rajesh Parameswaran outlines key trends and strategies to transform manufacturing through technology.




uri

Measuring forces in the DNA molecule

DNA, our genetic material, normally has the structure of a twisted rope ladder. Experts call this structure a double helix. Among other things, it is stabilized by stacking forces between base pairs. Scientists at the Technical University of Munich (TUM) have succeeded at measuring these forces for the very first time on the level of single base pairs. This new knowledge could help to construct precise molecular machines out of DNA.

read more



  • Physics & Chemistry

uri

During drought, dry air can stress plants more than dry soil

Newly published research by Indiana University scientists finds that low relative humidity in the atmosphere is a significant, growing and often under-appreciated cause of plant stress in hot, dry weather conditions.

read more



  • Earth & Climate

uri

Member Event: Horticulturist Walking Tour of Garden Conifers, Dec. 20

To celebrate the winter solstice, please join Andrew Doran, Director of Collections, for a behind-the scenes walking tour of conifer (cone-bearing) plants in the Garden. You will explore the diversity of conifers including pines, spruces, firs, hemlocks, redwoods and cypresses to name a few. We will have light refreshments and introductions before heading into the Garden.Learn more and register here




uri

India added 71 megawatt IT data center during Jan-Jun, demand projected to be strong: Savills

While major absorption has been recorded in hyperscalers across major cities, colocation services followed closely witnessing significant growth. This shift, as per Savills, can be attributed to factors such as high capital expenditure and operating expense.




uri

Digi Yatra operates on principle of privacy by design, brings convenience & security: CEO Digi Yatra Foundation

“We have already crossed 7 million users on the Digi Yatra app. Every day, around 30,000 new users are enrolling in the system. In terms of usage, Digi Yatra has been used more than 30 lakh times across airports in India, and this number continues to grow rapidly.”




uri

Etihad Airways: Assuring special service levels for high-flying guests

A BT cloud-based virtual contact centre helps Etihad deliver own-language service excellence to guests from 37 countries




uri

63% of HR professionals cite data privacy and security as top AI concerns: Survey

A new survey of over 500 HR professionals, titled "HR Report on AI: Insights on HR’s Readiness and Risk Management" reveals that while 63% are concerned about data privacy and security related to AI, 40% of organisations lack clear policies governing its use. This highlights a critical need for HR to establish guidelines and training for responsible AI adoption to mitigate risks and leverage its potential benefits.




uri

Security at Mahakumbh to feature advanced technology including AI: UP DGP

Prashant Kumar on Tuesday said the security arrangements at the Mahakumbh Mela will be equipped with advanced technology, including the use of Artificial Intelligence (AI). After a review meeting on preparations for the Mahakumbh Mela with Chief Secretary Manoj Kumar Singh, the DGP told reporters, "Our control room will have data of around 1 million suspicious individuals, and we will closely monitor all types of anti-social elements."




uri

Digital payments show strong uptick buoyed by wider adoption of credit during festive season

During this year’s festive season sales, credit cards and credit-based payment instruments like pay-later products saw a significant increase, according to industry reports. Transactions rose by 35-50% compared to last year, with a large share being made through credit cards, EMIs, and pay-later options. Unified Payments Interface (UPI) remained the dominant payment method, with a 34% rise in transactions and over 500 million daily payments recorded.




uri

Study highlights serious security threat to many internet users

RIVERSIDE, Calif. -- Researchers at the University of California, Riverside have identified a weakness in the Transmission Control Protocol (TCP) of all Linux operating systems since late 2012 that enables attackers to hijack users' internet communications completely remotely.

read more



  • Mathematics & Economics

uri

New data bill’s mandate could pose security risk, say social media platforms

For users in India between 13 and 18 years of age, apps may now have to get parental consent by verifying the identity of the children and their parents.. The Digital Personal Data Protection bill defines children as those below 18 years, which is above the global threshold. Users above 13 years of age, for example, are typically allowed on many social media platforms.




uri

Building the government-to-citizen (G2C) value chain with cloud-first-security-first approach

The government will need to start by assessing and uplifting the digital posture of each concerned department, further enabling an interconnected ecosystem of government, private, and peering parties, and offering seamless and secure last mile for government-to- citizen services and support. All this while keeping the citizen’s data and identity safe.




uri

Generative AI biggest weapon and tool for cybersecurity: Microsoft's Brad Smith

Addressing cybersecurity attack concerns raised by generative AI, Smith said that there will be an increasing number of organisations and governments that will use the technology to develop cybersecurity threats.




uri

Cybersecurity firms CrowdStrike, Okta shares jump after better-than-expected earnings

CrowdStrike beat estimates when it reported late on Wednesday that its revenue jumped 37% to $731.6 million while adjusted net income more than doubled to $180 million in the second quarter on strong growth in subscriptions to its cloud-based data and identity protection services.




uri

MP govt to hire pvt agencies for cloud services for data security

Urban Development Minister Kailash Vijayvargiya said the decision has been taken to ensure smooth cloud services in each department of the state and to ensure the safety of the government's data.




uri

Keeping consumers heart healthy during the holidays

As a cardiologist, I am continuously telling my patients about the importance of heart health. While many people wait until the new year to focus on their health, the holiday season provides the perfect time for them to make a conscious effort to eat items that are heart healthy.




uri

Keeping healthy grains in focus during the holidays

It's that time of year, the most wonderful time of year. The time for family, friends and, of course, food. Thanksgiving has come and gone, and so have the leftovers. Now we're in the throes of the holiday season with more gatherings every weekend.




uri

Ingredion launches clean-label texturizers in the U.S.

Made from citrus peels, the Fibertex CF line is designed to improve snack and bakery textures.




uri

Tips for truck fleet utilization and driver safety during COVID-19 pandemic

The transport of food and health/sanitary items such as cleaning supplies and paper towels have placed significant strains on the supply chain. Food distributors have to scrutinize significant preventative measures needed to ensure the health and safety of customers, drivers, and everyone that is in contact with goods that are transported and delivered.




uri

Exclusive interview: Q&A with Routific on SMBs during COVID-19

Snack Food & Wholesale Bakery recently was able to talk to Marc Kuo, CEO and co-founder, Routific, about SMBs and non-traditional delivery methods during the COVID-19 pandemic.