to Buying a VPN? Here’s what to know and look for By www.welivesecurity.com Published On :: Tue, 25 Jun 2024 09:30:00 +0000 VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes Full Article
to The long-tail costs of a data breach – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 21 Jun 2024 11:54:09 +0000 Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents Full Article
to Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 28 Jun 2024 13:13:12 +0000 Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year Full Article
to Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills By www.welivesecurity.com Published On :: Tue, 16 Jul 2024 09:30:00 +0000 These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity Full Article
to Social media and teen mental health – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Thu, 04 Jul 2024 14:31:24 +0000 Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick? Full Article
to HotPage: Story of a signed, vulnerable, ad-injecting driver By www.welivesecurity.com Published On :: Thu, 18 Jul 2024 09:30:00 +0000 A study of a sophisticated Chinese browser injector that leaves more doors open! Full Article
to Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4) By www.welivesecurity.com Published On :: Wed, 10 Jul 2024 09:30:00 +0000 As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds? Full Article
to Should ransomware payments be banned? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 12 Jul 2024 12:30:20 +0000 Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective? Full Article
to How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Sun, 21 Jul 2024 07:24:11 +0000 A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats Full Article
to Beware of fake AI tools masking very real malware threats By www.welivesecurity.com Published On :: Mon, 29 Jul 2024 09:00:00 +0000 Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants Full Article
to Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 26 Jul 2024 11:57:23 +0000 Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files Full Article
to The cyberthreat that drives businesses towards cyber risk insurance By www.welivesecurity.com Published On :: Wed, 31 Jul 2024 09:00:00 +0000 Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide Full Article
to AI and automation reducing breach costs – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 02 Aug 2024 11:30:15 +0000 Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies Full Article
to Why tech-savvy leadership is key to cyber insurance readiness By www.welivesecurity.com Published On :: Wed, 07 Aug 2024 09:00:00 +0000 Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage Full Article
to Top 6 Craigslist scams: Don’t fall for these tricks By www.welivesecurity.com Published On :: Mon, 12 Aug 2024 09:00:00 +0000 Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun Full Article
to Black Hat USA 2024 recap – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 09 Aug 2024 13:53:46 +0000 Unsurprisingly, many discussions revolved around the implications of the CrowdStrike outage, including the lessons it may have offered for bad actors Full Article
to NGate Android malware relays NFC traffic to steal cash By www.welivesecurity.com Published On :: Thu, 22 Aug 2024 09:00:00 +0000 Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM Full Article
to How a BEC scam cost a company $60 million – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 16 Aug 2024 11:01:54 +0000 Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme Full Article
to How regulatory standards and cyber insurance inform each other By www.welivesecurity.com Published On :: Wed, 21 Aug 2024 09:00:00 +0000 Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with Full Article
to Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5) By www.welivesecurity.com Published On :: Mon, 26 Aug 2024 09:00:00 +0000 The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure Full Article
to PWA phishing on Android and iOS – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 23 Aug 2024 09:00:00 +0000 Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security Full Article
to Stealing cash using NFC relay – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Wed, 28 Aug 2024 14:01:52 +0000 The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become Full Article
to Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 06 Sep 2024 10:25:42 +0000 The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams Full Article
to 6 common Geek Squad scams and how to defend against them By www.welivesecurity.com Published On :: Wed, 11 Sep 2024 09:00:00 +0000 Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks Full Article
to Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023 By www.welivesecurity.com Published On :: Thu, 26 Sep 2024 09:00:00 +0000 ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine Full Article
to CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 13 Sep 2024 10:21:33 +0000 ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends Full Article
to Time to engage: How parents can help keep their children safe on Snapchat By www.welivesecurity.com Published On :: Tue, 24 Sep 2024 09:00:00 +0000 Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app Full Article
to FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 20 Sep 2024 11:03:10 +0000 With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process Full Article
to Gamaredon's operations under the microscope – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 27 Sep 2024 13:26:04 +0000 ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years Full Article
to Telekopye transitions to targeting tourists via hotel booking scam By www.welivesecurity.com Published On :: Thu, 10 Oct 2024 08:55:00 +0000 ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms Full Article
to The complexities of attack attribution – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 04 Oct 2024 11:55:10 +0000 Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week Full Article
to Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes By www.welivesecurity.com Published On :: Tue, 15 Oct 2024 09:00:00 +0000 Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details Full Article
to GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 11 Oct 2024 13:28:05 +0000 ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities Full Article
to Don't become a statistic: Tips to help keep your personal data off the dark web By www.welivesecurity.com Published On :: Tue, 29 Oct 2024 10:00:00 +0000 You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it Full Article
to Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 18 Oct 2024 12:10:04 +0000 The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year Full Article
to Tony Fadell: Innovating to save our planet | Starmus highlights By www.welivesecurity.com Published On :: Mon, 28 Oct 2024 10:30:00 +0000 As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts Full Article
to How to remove your personal information from Google Search results By www.welivesecurity.com Published On :: Wed, 30 Oct 2024 10:00:00 +0000 Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results. Full Article
to Month in security with Tony Anscombe – October 2024 edition By www.welivesecurity.com Published On :: Thu, 31 Oct 2024 14:29:10 +0000 Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories Full Article
to Bouncing Rod Simulator By blogs.mathworks.com Published On :: Mon, 20 Feb 2023 14:00:09 +0000 Jiro's Pick this week is Bouncing Rod Simulator by Matthew Sheen.As a mechanical engineer, I love simulating physical phenomena. When you have equations of motion, you can easily simulate them in... read more >> Full Article Picks
to MCmatlab: A Monte Carlo simulation for photon transport in 3D voxel space By blogs.mathworks.com Published On :: Tue, 13 Jun 2023 14:43:09 +0000 Today, I am inviting Temo, who is from the academic discipline marketing team, and he looks after the physics discipline. He will share his Pick from the field of optics.This week's Pick is MCmatlab... read more >> Full Article Picks
to Delhi HC issues notice to Telecom Department on accused judge's plea By cio.economictimes.indiatimes.com Published On :: Tue, 21 Mar 2023 08:50:43 +0530 Two former high court judges - SN Shukla of the Allahabad High Court and Quddusi of the Odisha High Court - have been charged by the CBI in the case. The agency had produced intercepted phone calls between the two judges as part of its charge sheet filed last July. It had also named other people in the alleged bribery scandal. Full Article
to Airtel upgrading infrastructure to support digital transformation in India: Ajay Chitkara By cio.economictimes.indiatimes.com Published On :: Tue, 28 Mar 2023 07:27:16 +0530 “Earlier, there used to be the largest companies who were there to solve the customers’ problems. But now there are hundreds of startups that are coming up. We need to make sure we work together with them and build an ecosystem with them. We share with them our issues, and they come back and build the products with us together. And then we help them scale,” he said. Full Article
to TRAI suggests MIB to design a suitable PLI scheme for STB manufacturing By cio.economictimes.indiatimes.com Published On :: Sat, 01 Apr 2023 14:42:22 +0530 The Telecom Regulatory Authority of India (TRAI) has recommended that linear set-top boxes (STBs) be included in the PLI scheme to promote local manufacturing in the television broadcasting sector. The TRAI has also suggested conducting periodic reviews of indigenous components, factoring in local components in determining localisation levels under the PLI scheme, and reviewing investment outlays required for MSME manufacturing for selected equipment. Full Article
to Airtel, Secure Meters to offer Narrow Band-IoT services By cio.economictimes.indiatimes.com Published On :: Tue, 25 Apr 2023 07:11:03 +0530 "IoT is one of the fastest-growing business segments for Airtel Business. This venture into NB-IoT strengthens our credentials as the largest cellular IoT player in the country and places us as a partner of choice for Discoms looking to invest in smart meters," said Ajay Chitkara, director and CEO, Airtel Business. Full Article
to Indus Towers pushes Vi to clear dues, may not allow any new payment plan By cio.economictimes.indiatimes.com Published On :: Fri, 28 Apr 2023 07:48:30 +0530 At its fiscal fourth quarter earnings call Thursday, Indus' top management said that while Vi has started clearing 90-100% of current dues, the tower company is closely monitoring the telco's payment patterns and its funding situation to recover its accumulated past dues as per the agreed schedule. Full Article
to Govt should allot spectrum directly to enterprises for private networks: Voice By cio.economictimes.indiatimes.com Published On :: Thu, 08 Jun 2023 12:48:00 +0530 However, telecom operators associations COAI recently said private 5G network deployments by system integrators may lead to operational inefficiencies, capital burden, and eventually prove to be counter-productive. Full Article
to BSNL issues purchase order to TCS, ITI for 1 lakh 4G sites: Report By cio.economictimes.indiatimes.com Published On :: Sat, 10 Jun 2023 08:38:24 +0530 On Wednesday, the Union Cabinet approved the third revival package for the telecom PSU worth Rs 89,047 crores which also includes the allotment of 4G/5G spectrum through equity infusion. Full Article
to Global cellular IoT connections to cross 6 billion mark in 2030: Counterpoint By cio.economictimes.indiatimes.com Published On :: Mon, 12 Jun 2023 14:40:44 +0530 The widespread adoption of cellular connectivity will also contribute to a further reduction in prices for cellular-connected devices, making them more competitive against alternative non-cellular connectivity technologies like LoRa, Sigfox and Wi-SUN, Shah said. Full Article
to TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India By cio.economictimes.indiatimes.com Published On :: Wed, 21 Jun 2023 08:22:21 +0530 The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP). Full Article
to LTTS partners Palo Alto Network on 5G, OT security offerings By cio.economictimes.indiatimes.com Published On :: Sat, 01 Jul 2023 10:32:51 +0530 The new MSSP agreement will provide a managed service offering for Palo Alto Networks Zero Trust OT Security solution, allowing customers to outsource the management of their OT security to LTTS. Full Article