ea Preventative defense tactics in the real world By www.welivesecurity.com Published On :: Mon, 17 Jun 2024 09:30:00 +0000 Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack Full Article
ea How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 14 Jun 2024 11:58:03 +0000 The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app Full Article
ea My health information has been stolen. Now what? By www.welivesecurity.com Published On :: Thu, 20 Jun 2024 09:30:00 +0000 As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records Full Article
ea Hijacked: How hacked YouTube channels spread scams and malware By www.welivesecurity.com Published On :: Mon, 01 Jul 2024 09:30:00 +0000 Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform Full Article
ea ESET Threat Report H1 2024 By www.welivesecurity.com Published On :: Thu, 27 Jun 2024 09:30:00 +0000 A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Full Article
ea The long-tail costs of a data breach – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 21 Jun 2024 11:54:09 +0000 Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents Full Article
ea Cyber insurance as part of the cyber threat mitigation strategy By www.welivesecurity.com Published On :: Wed, 26 Jun 2024 11:31:29 +0000 Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies Full Article
ea Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 28 Jun 2024 13:13:12 +0000 Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year Full Article
ea 5 common Ticketmaster scams: How fraudsters steal the show By www.welivesecurity.com Published On :: Tue, 09 Jul 2024 09:30:00 +0000 Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account Full Article
ea Social media and teen mental health – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Thu, 04 Jul 2024 14:31:24 +0000 Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick? Full Article
ea The tap-estry of threats targeting Hamster Kombat players By www.welivesecurity.com Published On :: Tue, 23 Jul 2024 09:00:00 +0000 ESET researchers have discovered threats abusing the success of the Hamster Kombat clicker game Full Article
ea How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Sun, 21 Jul 2024 07:24:11 +0000 A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats Full Article
ea Beyond the blue screen of death: Why software updates matter By www.welivesecurity.com Published On :: Fri, 19 Jul 2024 16:20:11 +0000 The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them. Full Article
ea Building cyber-resilience: Lessons learned from the CrowdStrike incident By www.welivesecurity.com Published On :: Tue, 23 Jul 2024 12:23:39 +0000 Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances Full Article
ea Beware of fake AI tools masking very real malware threats By www.welivesecurity.com Published On :: Mon, 29 Jul 2024 09:00:00 +0000 Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants Full Article
ea The cyberthreat that drives businesses towards cyber risk insurance By www.welivesecurity.com Published On :: Wed, 31 Jul 2024 09:00:00 +0000 Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide Full Article
ea AI and automation reducing breach costs – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 02 Aug 2024 11:30:15 +0000 Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies Full Article
ea Why tech-savvy leadership is key to cyber insurance readiness By www.welivesecurity.com Published On :: Wed, 07 Aug 2024 09:00:00 +0000 Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage Full Article
ea The great location leak: Privacy risks in dating apps By www.welivesecurity.com Published On :: Mon, 12 Aug 2024 14:51:08 +0000 What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance? Full Article
ea NGate Android malware relays NFC traffic to steal cash By www.welivesecurity.com Published On :: Thu, 22 Aug 2024 09:00:00 +0000 Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM Full Article
ea How regulatory standards and cyber insurance inform each other By www.welivesecurity.com Published On :: Wed, 21 Aug 2024 09:00:00 +0000 Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with Full Article
ea Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5) By www.welivesecurity.com Published On :: Mon, 26 Aug 2024 09:00:00 +0000 The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure Full Article
ea In plain sight: Malicious ads hiding in search results By www.welivesecurity.com Published On :: Tue, 03 Sep 2024 09:00:00 +0000 Sometimes there’s more than just an enticing product offer hiding behind an ad Full Article
ea Stealing cash using NFC relay – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Wed, 28 Aug 2024 14:01:52 +0000 The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become Full Article
ea ESET Research Podcast: HotPage By www.welivesecurity.com Published On :: Thu, 05 Sep 2024 09:26:54 +0000 ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver Full Article
ea AI security bubble already springing leaks By www.welivesecurity.com Published On :: Mon, 16 Sep 2024 09:00:00 +0000 Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one Full Article
ea ESET Research Podcast: EvilVideo By www.welivesecurity.com Published On :: Tue, 17 Sep 2024 09:00:00 +0000 ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos Full Article
ea Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 18 Oct 2024 12:10:04 +0000 The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year Full Article
ea ESET Research Podcast: CosmicBeetle By www.welivesecurity.com Published On :: Thu, 24 Oct 2024 09:00:00 +0000 Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world Full Article
ea How to remove your personal information from Google Search results By www.welivesecurity.com Published On :: Wed, 30 Oct 2024 10:00:00 +0000 Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results. Full Article
ea Life on a crooked RedLine: Analyzing the infamous infostealer’s backend By www.welivesecurity.com Published On :: Fri, 08 Nov 2024 10:00:00 +0000 Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules Full Article
ea Jane Goodall: Reasons for hope | Starmus highlights By www.welivesecurity.com Published On :: Wed, 06 Nov 2024 14:48:17 +0000 The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity Full Article
ea Learning programming through game building By blogs.mathworks.com Published On :: Fri, 12 Aug 2022 19:00:15 +0000 Jiro's Pick this week is AstroVolley Courseware by Paul Huxel.Back in my undergraduate studies (many, many years ago), I took a Pascal programming course, and it was the first official programming... read more >> Full Article Picks
ea Delhi HC issues notice to Telecom Department on accused judge's plea By cio.economictimes.indiatimes.com Published On :: Tue, 21 Mar 2023 08:50:43 +0530 Two former high court judges - SN Shukla of the Allahabad High Court and Quddusi of the Odisha High Court - have been charged by the CBI in the case. The agency had produced intercepted phone calls between the two judges as part of its charge sheet filed last July. It had also named other people in the alleged bribery scandal. Full Article
ea Ericsson, Intel team up on 5G development in Malaysia with eye on enterprise use cases By cio.economictimes.indiatimes.com Published On :: Tue, 04 Apr 2023 14:45:40 +0530 Amongst the areas that Ericsson and Intel have identified for collaboration is the joint development of enterprise use cases in selected verticals such as manufacturing, transport and logistics. Full Article
ea Indus Towers pushes Vi to clear dues, may not allow any new payment plan By cio.economictimes.indiatimes.com Published On :: Fri, 28 Apr 2023 07:48:30 +0530 At its fiscal fourth quarter earnings call Thursday, Indus' top management said that while Vi has started clearing 90-100% of current dues, the tower company is closely monitoring the telco's payment patterns and its funding situation to recover its accumulated past dues as per the agreed schedule. Full Article
ea Malicious IoT botnet traffic targeting telecoms networks increases 5x over 2022: Nokia By cio.economictimes.indiatimes.com Published On :: Thu, 08 Jun 2023 11:38:00 +0530 The number of IoT devices (bots) engaged in botnet-driven DDoS attacks rose from around 200,000 a year ago to approximately 1 million devices, generating more than 40% of all DDoS traffic today, according to the report. Full Article
ea TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India By cio.economictimes.indiatimes.com Published On :: Wed, 21 Jun 2023 08:22:21 +0530 The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP). Full Article
ea Want to be data-driven? Treat data as a product By cio.economictimes.indiatimes.com Published On :: Sat, 19 Aug 2023 10:41:00 +0530 In today’s data-obsessed era, treating data as you would treat your consumer products can help you realize true value from your investments. Whether individual teams piece together the data and technologies they need or centralized teams extract, cleanse, and aggregate data – the challenges plaguing data managers are many, even if not the same. Full Article
ea Fostering gender diversity: Women leaders in data science share insights By cio.economictimes.indiatimes.com Published On :: Wed, 13 Sep 2023 17:34:22 +0530 Leading women data scientists and AI leaders talk about fostering more female candidates in the industry and navigating the challenges associated with it. Full Article
ea From data chaos to data value — the undeniable case for data streaming By cio.economictimes.indiatimes.com Published On :: Tue, 03 Oct 2023 18:08:38 +0530 Data mess isn’t anybody’s fault. The situation many businesses find themselves in today is based on decisions made decades ago. It’s part of our IT legacy. And we have to deal with it. Full Article
ea Data-driven hiring practices, nearly double-digit pay hikes to mark 2024 By cio.economictimes.indiatimes.com Published On :: Mon, 01 Jan 2024 10:38:22 +0530 Employees want workplace flexibility, a greater emphasis on diversity, and impartial hiring processes, while companies are eager to provide fair, engaging and streamlined candidate experiences to attract and retain top talent, according to experts. Full Article
ea ETCIO Data Strategy Summit ‘24: Keynote speakers on finding the right fit with AI By cio.economictimes.indiatimes.com Published On :: Wed, 21 Aug 2024 13:52:08 +0530 Rajeev Chandrasekhar, Former Union Minister of Electronics and IT, and Raghu Krishnananda, Chief Product and Technology Officer at Myntra, highlighted the trends and case studies impacting consumers and enterprises alike. Full Article
ea Data mesh in the real world: Adaptability vs Feasibility By cio.economictimes.indiatimes.com Published On :: Wed, 21 Aug 2024 15:37:50 +0530 As businesses continue to explore and adapt Data Mesh, balancing its potential benefits with the realities of execution will be key to realizing its full value, say Data leaders at the ETCIO Data Strategy Summit 2024. Full Article
ea How leaders bring in real business impact of data in enterprises By cio.economictimes.indiatimes.com Published On :: Wed, 21 Aug 2024 17:32:30 +0530 Harnessing data is a multifaceted endeavor including CX, privacy, modernization, etc. Industry leaders talk about how data can drive substantial business impact while navigating the inherent challenges. Full Article
ea After Karnataka, UP gears up to develop global capability centres By cio.economictimes.indiatimes.com Published On :: Sat, 05 Oct 2024 11:43:41 +0530 These centres serve as innovation hubs for key business functions such as product development, artificial intelligence (AI), data analytics, and cybersecurity within the state. Full Article
ea Sayed Peerzade to spearhead Jio’s cloud revolution as Executive Vice President By cio.economictimes.indiatimes.com Published On :: Tue, 08 Oct 2024 11:21:42 +0530 In this new role, he will focus on advancing AI and cloud technologies, leveraging his extensive experience to drive innovation within the organization. Full Article
ea Union Bank of India and Zoho Mark Digital Transformation Success with Leadership Meet By cio.economictimes.indiatimes.com Published On :: Tue, 15 Oct 2024 12:06:17 +0530 The partnership between Union Bank of India and Zoho began in 2021 after the merger of Andhra Bank and Corporation Bank with Union Bank of India, which significantly expanded its operations. Full Article
ea Krutrim AI business head Ravi Jain resigns By cio.economictimes.indiatimes.com Published On :: Thu, 17 Oct 2024 10:29:53 +0530 Ola Krutrim is an AI startup, which has formed a series of strategic partnerships with global majors like Arm and Untether AI for the development of CPU and AI chips, platforms, and systems. Full Article
ea LTIMindtree won its largest deal in history due to AI approach: COO By cio.economictimes.indiatimes.com Published On :: Mon, 21 Oct 2024 11:21:45 +0530 In the second quarter ending September of the ongoing fiscal year 2025, LTIMindtree closed several multi-year projects including a $200 million-plus deal from a US-based manufacturer. The total order intake for the three-month period was flat year-on-year at $1.3 billion, down 7% from previous quarter. Full Article