ng

On Supporting Science in Ukraine One Year After the Invasion

As the one-year anniversary of the war in Ukraine approaches, NAS President Marcia McNutt and the presidents of the national science academies of Poland and Ukraine urge the scientific community around the world to continue helping scientists from and in Ukraine, and to plan for the post-war recovery of science there.




ng

Preventing Sexual Harassment and Reducing Harm by Addressing Abuses of Power in Higher Education Institutions

Pulling from research and institutional examples, the Remediation Working Group of the Action Collaborative on Preventing Sexual Harassment in Higher Education has published a paper that examines the types of power differentials in academia, how abuses of power can take the form of sexual harassment, and strategies for preventing and remediating such abuses.




ng

NAS President Marcia McNutt to Speak at AAAS Annual Meeting - Several National Academies Projects Will Also Be Featured

National Academy of Sciences President Marcia McNutt will deliver a lecture on the future of the research enterprise this week at the AAAS Annual Meeting. The meeting will also feature sessions and presentations focused on National Academies reports and projects.




ng

Research and Higher Education Institutions in the Next 75 Years — Symposium Proceedings

The National Academies of Sciences, Engineering, and Medicine have released a new proceedings of a symposium that explored how research and higher education institutions should transform in the next 75 years to better address complex global challenges such as responding to pandemics, advancing innovation, and building and nurturing research capacity.




ng

Employing ‘Serious Gaming’ to Explore Challenges and Solutions in the Gulf of Mexico

The Gulf of Mexico region faces numerous complex challenges, from extreme weather events to potential offshore oil spills. The National Academies’ Gulf Research Program is enlisting serious gaming as part of its strategy to help the region prepare and respond.




ng

G-7 Science Academies Call for Actions to Improve Climate Change Decision-Making, Protect Ocean Biodiversity, and Support Well-Being of Older People

Today the science academies of the G-7 nations released statements calling on their governments to address systemic risks and improve decision-making related to climate change, restore and recover ocean biodiversity, and deliver better health and well-being for aging populations.




ng

Moving to Evidence-Based Elections

In a new NAE Perspective, authors Barbara B. Simons and Poorvi L. Vora argue that systematic manual examination of ballots, rigorous ballot accounting procedures, and public compliance audits would increase election transparency and are urgently needed.




ng

National Nuclear Security Administration Cannot Continue With ‘Business as Usual’ in the Shifting Supercomputing Landscape, Says New Report

The National Nuclear Security Administration needs to fundamentally rethink the strategy for its next generation of high-performance computing and cannot continue with ‘business as usual’ through shifting technical and geopolitical landscapes. Advanced computing capabilities help the NNSA ensure that the U.S. maintains a safe, secure, and reliable nuclear stockpile.




ng

Statement on New York Times Article Regarding Sackler Family Donations to NAS

The news article suggests that the donations from the Sacklers presented a conflict of interest for the National Academies’ studies on chronic pain, opioid use, and ways to combat the opioid epidemic. The Sackler funds were never used to support an advisory study on these issues.




ng

The Untapped Potential of Computing and Cognition in Tackling Climate Change

A new NAE Perspective by Adiba M. Proma, Robert M. Wachter, and Ehsan Hoque discusses how helping people change their behaviors may be where technology can have its greatest impact on climate change.




ng

U.S. Should Begin Laying the Foundation for New and Advanced Nuclear Reactors, Says New Report

New nuclear reactor concepts could help the U.S. meet its long-term climate goals, but a range of technical, regulatory, economic, and societal challenges must first be overcome. A new report provides recommendations to start laying the foundation required for advanced reactors to become a viable part of the U.S. energy system.




ng

Tackling Inequities in Emerging Technologies

Read highlights from a recent webinar hosted by the National Academies’ New Voices program, which explored how to make developments in emerging technologies more equitable in multiple fields including artificial intelligence, biotechnology, and energy.




ng

Gaps in the Systems That Support NIH-Funded Research Using Nonhuman Primates Are Undermining U.S. Biomedical Research and Public Health Readiness, Says New Report

Research funded by NIH that uses nonhuman primates is critical to the nation’s ability to respond adequately to public health emergencies and carry out high-impact biomedical research, but gaps in the systems that support research using these animal models are undermining national health emergency readiness.




ng

Untangling the hiring dilemma: How security solutions free up HR processes

The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?




ng

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings




ng

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders




ng

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?




ng

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?




ng

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability




ng

The job hunter’s guide: Separating genuine offers from scams

$90,000/year, full home office, and 30 days of paid leave for a junior data analyst – what's not to like? Except that these kinds of job offers are only intended to trick unsuspecting victims into giving up their data.




ng

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat




ng

Buying a VPN? Here’s what to know and look for

VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes




ng

The long-tail costs of a data breach – Week in security with Tony Anscombe

Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents




ng

No room for error: Don’t get stung by these common Booking.com scams

From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation




ng

Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe

Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year




ng

Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills

These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity




ng

HotPage: Story of a signed, vulnerable, ad-injecting driver

A study of a sophisticated Chinese browser injector that leaves more doors open!




ng

Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4)

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?




ng

Hello, is it me you’re looking for? How scammers get your phone number

Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters.




ng

The tap-estry of threats targeting Hamster Kombat players

ESET researchers have discovered threats abusing the success of the Hamster Kombat clicker game




ng

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos




ng

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances




ng

Phishing targeting Polish SMBs continues via ModiLoader

ESET researchers detected multiple, widespread phishing campaigns targeting SMBs in Poland during May 2024, distributing various malware families




ng

Beware of fake AI tools masking very real malware threats

Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants




ng

AI and automation reducing breach costs – Week in security with Tony Anscombe

Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies




ng

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards




ng

Be careful what you pwish for – Phishing in PWA applications

ESET analysts dissect a novel phishing method tailored to Android and iOS users




ng

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?




ng

NGate Android malware relays NFC traffic to steal cash

Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM




ng

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




ng

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors




ng

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security




ng

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

Demystifying CVE-2024-7262 and CVE-2024-7263




ng

In plain sight: Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad




ng

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become




ng

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one




ng

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help




ng

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.




ng

Time to engage: How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app




ng

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process