ng On Supporting Science in Ukraine One Year After the Invasion By Published On :: Wed, 15 Feb 2023 05:00:00 GMT As the one-year anniversary of the war in Ukraine approaches, NAS President Marcia McNutt and the presidents of the national science academies of Poland and Ukraine urge the scientific community around the world to continue helping scientists from and in Ukraine, and to plan for the post-war recovery of science there. Full Article
ng Preventing Sexual Harassment and Reducing Harm by Addressing Abuses of Power in Higher Education Institutions By Published On :: Thu, 16 Feb 2023 05:00:00 GMT Pulling from research and institutional examples, the Remediation Working Group of the Action Collaborative on Preventing Sexual Harassment in Higher Education has published a paper that examines the types of power differentials in academia, how abuses of power can take the form of sexual harassment, and strategies for preventing and remediating such abuses. Full Article
ng NAS President Marcia McNutt to Speak at AAAS Annual Meeting - Several National Academies Projects Will Also Be Featured By Published On :: Mon, 27 Feb 2023 05:00:00 GMT National Academy of Sciences President Marcia McNutt will deliver a lecture on the future of the research enterprise this week at the AAAS Annual Meeting. The meeting will also feature sessions and presentations focused on National Academies reports and projects. Full Article
ng Research and Higher Education Institutions in the Next 75 Years — Symposium Proceedings By Published On :: Wed, 01 Mar 2023 05:00:00 GMT The National Academies of Sciences, Engineering, and Medicine have released a new proceedings of a symposium that explored how research and higher education institutions should transform in the next 75 years to better address complex global challenges such as responding to pandemics, advancing innovation, and building and nurturing research capacity. Full Article
ng Employing ‘Serious Gaming’ to Explore Challenges and Solutions in the Gulf of Mexico By Published On :: Mon, 06 Mar 2023 05:00:00 GMT The Gulf of Mexico region faces numerous complex challenges, from extreme weather events to potential offshore oil spills. The National Academies’ Gulf Research Program is enlisting serious gaming as part of its strategy to help the region prepare and respond. Full Article
ng G-7 Science Academies Call for Actions to Improve Climate Change Decision-Making, Protect Ocean Biodiversity, and Support Well-Being of Older People By Published On :: Tue, 07 Mar 2023 05:00:00 GMT Today the science academies of the G-7 nations released statements calling on their governments to address systemic risks and improve decision-making related to climate change, restore and recover ocean biodiversity, and deliver better health and well-being for aging populations. Full Article
ng Moving to Evidence-Based Elections By Published On :: Thu, 16 Mar 2023 04:00:00 GMT In a new NAE Perspective, authors Barbara B. Simons and Poorvi L. Vora argue that systematic manual examination of ballots, rigorous ballot accounting procedures, and public compliance audits would increase election transparency and are urgently needed. Full Article
ng National Nuclear Security Administration Cannot Continue With ‘Business as Usual’ in the Shifting Supercomputing Landscape, Says New Report By Published On :: Thu, 13 Apr 2023 04:00:00 GMT The National Nuclear Security Administration needs to fundamentally rethink the strategy for its next generation of high-performance computing and cannot continue with ‘business as usual’ through shifting technical and geopolitical landscapes. Advanced computing capabilities help the NNSA ensure that the U.S. maintains a safe, secure, and reliable nuclear stockpile. Full Article
ng Statement on New York Times Article Regarding Sackler Family Donations to NAS By Published On :: Mon, 23 Apr 2023 04:00:00 GMT The news article suggests that the donations from the Sacklers presented a conflict of interest for the National Academies’ studies on chronic pain, opioid use, and ways to combat the opioid epidemic. The Sackler funds were never used to support an advisory study on these issues. Full Article
ng The Untapped Potential of Computing and Cognition in Tackling Climate Change By Published On :: Tue, 25 Apr 2023 04:00:00 GMT A new NAE Perspective by Adiba M. Proma, Robert M. Wachter, and Ehsan Hoque discusses how helping people change their behaviors may be where technology can have its greatest impact on climate change. Full Article
ng U.S. Should Begin Laying the Foundation for New and Advanced Nuclear Reactors, Says New Report By Published On :: Thu, 27 Apr 2023 04:00:00 GMT New nuclear reactor concepts could help the U.S. meet its long-term climate goals, but a range of technical, regulatory, economic, and societal challenges must first be overcome. A new report provides recommendations to start laying the foundation required for advanced reactors to become a viable part of the U.S. energy system. Full Article
ng Tackling Inequities in Emerging Technologies By Published On :: Thu, 04 May 2023 04:00:00 GMT Read highlights from a recent webinar hosted by the National Academies’ New Voices program, which explored how to make developments in emerging technologies more equitable in multiple fields including artificial intelligence, biotechnology, and energy. Full Article
ng Gaps in the Systems That Support NIH-Funded Research Using Nonhuman Primates Are Undermining U.S. Biomedical Research and Public Health Readiness, Says New Report By Published On :: Thu, 04 May 2023 04:00:00 GMT Research funded by NIH that uses nonhuman primates is critical to the nation’s ability to respond adequately to public health emergencies and carry out high-impact biomedical research, but gaps in the systems that support research using these animal models are undermining national health emergency readiness. Full Article
ng Untangling the hiring dilemma: How security solutions free up HR processes By www.welivesecurity.com Published On :: Tue, 21 May 2024 09:30:00 +0000 The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum? Full Article
ng Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries By www.welivesecurity.com Published On :: Thu, 23 May 2024 09:30:00 +0000 Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings Full Article
ng Beyond the buzz: Understanding AI and its role in cybersecurity By www.welivesecurity.com Published On :: Tue, 28 May 2024 09:30:00 +0000 A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders Full Article
ng Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 24 May 2024 13:11:17 +0000 As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond? Full Article
ng AI in HR: Is artificial intelligence changing how we hire employees forever? By www.welivesecurity.com Published On :: Thu, 30 May 2024 09:30:00 +0000 Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime? Full Article
ng What happens when facial recognition gets it wrong – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 31 May 2024 13:45:32 +0000 A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability Full Article
ng The job hunter’s guide: Separating genuine offers from scams By www.welivesecurity.com Published On :: Thu, 06 Jun 2024 09:30:00 +0000 $90,000/year, full home office, and 30 days of paid leave for a junior data analyst – what's not to like? Except that these kinds of job offers are only intended to trick unsuspecting victims into giving up their data. Full Article
ng Hacktivism is evolving – and that could be bad news for organizations everywhere By www.welivesecurity.com Published On :: Wed, 19 Jun 2024 09:30:00 +0000 Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat Full Article
ng Buying a VPN? Here’s what to know and look for By www.welivesecurity.com Published On :: Tue, 25 Jun 2024 09:30:00 +0000 VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes Full Article
ng The long-tail costs of a data breach – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 21 Jun 2024 11:54:09 +0000 Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents Full Article
ng No room for error: Don’t get stung by these common Booking.com scams By www.welivesecurity.com Published On :: Wed, 03 Jul 2024 09:30:00 +0000 From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation Full Article
ng Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 28 Jun 2024 13:13:12 +0000 Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year Full Article
ng Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills By www.welivesecurity.com Published On :: Tue, 16 Jul 2024 09:30:00 +0000 These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity Full Article
ng HotPage: Story of a signed, vulnerable, ad-injecting driver By www.welivesecurity.com Published On :: Thu, 18 Jul 2024 09:30:00 +0000 A study of a sophisticated Chinese browser injector that leaves more doors open! Full Article
ng Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4) By www.welivesecurity.com Published On :: Wed, 10 Jul 2024 09:30:00 +0000 As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds? Full Article
ng Hello, is it me you’re looking for? How scammers get your phone number By www.welivesecurity.com Published On :: Mon, 15 Jul 2024 11:45:35 +0000 Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters. Full Article
ng The tap-estry of threats targeting Hamster Kombat players By www.welivesecurity.com Published On :: Tue, 23 Jul 2024 09:00:00 +0000 ESET researchers have discovered threats abusing the success of the Hamster Kombat clicker game Full Article
ng Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android By www.welivesecurity.com Published On :: Mon, 22 Jul 2024 09:00:00 +0000 ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos Full Article
ng Building cyber-resilience: Lessons learned from the CrowdStrike incident By www.welivesecurity.com Published On :: Tue, 23 Jul 2024 12:23:39 +0000 Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances Full Article
ng Phishing targeting Polish SMBs continues via ModiLoader By www.welivesecurity.com Published On :: Tue, 30 Jul 2024 09:00:00 +0000 ESET researchers detected multiple, widespread phishing campaigns targeting SMBs in Poland during May 2024, distributing various malware families Full Article
ng Beware of fake AI tools masking very real malware threats By www.welivesecurity.com Published On :: Mon, 29 Jul 2024 09:00:00 +0000 Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants Full Article
ng AI and automation reducing breach costs – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 02 Aug 2024 11:30:15 +0000 Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies Full Article
ng Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies By www.welivesecurity.com Published On :: Thu, 08 Aug 2024 14:40:36 +0000 Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards Full Article
ng Be careful what you pwish for – Phishing in PWA applications By www.welivesecurity.com Published On :: Tue, 20 Aug 2024 09:00:00 +0000 ESET analysts dissect a novel phishing method tailored to Android and iOS users Full Article
ng The great location leak: Privacy risks in dating apps By www.welivesecurity.com Published On :: Mon, 12 Aug 2024 14:51:08 +0000 What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance? Full Article
ng NGate Android malware relays NFC traffic to steal cash By www.welivesecurity.com Published On :: Thu, 22 Aug 2024 09:00:00 +0000 Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM Full Article
ng Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5) By www.welivesecurity.com Published On :: Mon, 26 Aug 2024 09:00:00 +0000 The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure Full Article
ng Old devices, new dangers: The risks of unsupported IoT tech By www.welivesecurity.com Published On :: Tue, 27 Aug 2024 09:00:00 +0000 In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors Full Article
ng PWA phishing on Android and iOS – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 23 Aug 2024 09:00:00 +0000 Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security Full Article
ng Analysis of two arbitrary code execution vulnerabilities affecting WPS Office By www.welivesecurity.com Published On :: Wed, 28 Aug 2024 09:00:00 +0000 Demystifying CVE-2024-7262 and CVE-2024-7263 Full Article
ng In plain sight: Malicious ads hiding in search results By www.welivesecurity.com Published On :: Tue, 03 Sep 2024 09:00:00 +0000 Sometimes there’s more than just an enticing product offer hiding behind an ad Full Article
ng Stealing cash using NFC relay – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Wed, 28 Aug 2024 14:01:52 +0000 The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become Full Article
ng AI security bubble already springing leaks By www.welivesecurity.com Published On :: Mon, 16 Sep 2024 09:00:00 +0000 Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one Full Article
ng Understanding cyber-incident disclosure By www.welivesecurity.com Published On :: Wed, 18 Sep 2024 09:02:40 +0000 Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help Full Article
ng Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6) By www.welivesecurity.com Published On :: Thu, 19 Sep 2024 09:00:00 +0000 How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out. Full Article
ng Time to engage: How parents can help keep their children safe on Snapchat By www.welivesecurity.com Published On :: Tue, 24 Sep 2024 09:00:00 +0000 Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app Full Article
ng FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 20 Sep 2024 11:03:10 +0000 With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process Full Article