at

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?




at

NGate Android malware relays NFC traffic to steal cash

Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM




at

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with




at

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




at

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options




at

CosmicBeetle steps up: Probation period at RansomHub

CosmicBeetle, after improving its own ransomware, tries its luck as a RansomHub affiliate




at

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams




at

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends




at

Time to engage: How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app




at

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process




at

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices




at

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years




at

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia




at

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience




at

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week




at

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?




at

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details




at

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers




at

Don't become a statistic: Tips to help keep your personal data off the dark web

You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it




at

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year




at

Tony Fadell: Innovating to save our planet | Starmus highlights

As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts




at

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.




at

MatCal

Will's pick this week is MatCal by Bryan. I'm no archaeologist, but I read a fair number of books that cover the topic. A common point of discussion is the wonder and challenges of radiocarbon... read more >>




at

Bouncing Rod Simulator

Jiro's Pick this week is Bouncing Rod Simulator by Matthew Sheen.As a mechanical engineer, I love simulating physical phenomena. When you have equations of motion, you can easily simulate them in... read more >>




at

MCmatlab: A Monte Carlo simulation for photon transport in 3D voxel space

Today, I am inviting Temo, who is from the academic discipline marketing team, and he looks after the physics discipline. He will share his Pick from the field of optics.This week's Pick is MCmatlab... read more >>




at

Simulate Home Battery Management System

Jiro's Pick this week is Home Battery Energy Management System by Rodney Tan.I met Dr. Rodney Tan at a virtual educator workshop we held last year, and there I learned that he is very active in the... read more >>




at

Statistical visualization functions and “Open in MATLAB Online”

Jiro's Pick this week is dabarplot, daviolinplot, daboxplot by Povilas Karvelis.Today, I'd like to highlight a couple of things in this post.Statistical visualization functions"Open in MATLAB Online"... read more >>




at

Celebrating Pi Day with cool visualizations

Jiro's Pick this week is Happy Pi Day by Zhaoxu Liu / slandarer. I'm a couple of days late, but I wanted to highlight this set of cool visualizations by Zhaoxu for Pi Day. It's amazing to see so... read more >>




at

Internet Archive's digital book lending violates copyrights, US judge rules

The ruling by U.S. District Judge John Koeltl in Manhattan on Friday came in a closely watched lawsuit that tested the ability of Internet Archive to lend out the works of writers and publishers protected by U.S. copyright laws.




at

Airtel upgrading infrastructure to support digital transformation in India: Ajay Chitkara

“Earlier, there used to be the largest companies who were there to solve the customers’ problems. But now there are hundreds of startups that are coming up. We need to make sure we work together with them and build an ecosystem with them. We share with them our issues, and they come back and build the products with us together. And then we help them scale,” he said.




at

Unlocking digital transformation goals for Indian enterprises with 5G

Recently, India's Hon’ble Prime Minister, Narendra Modi, inaugurated the 5G service, affirming that "India will lead the Industry 4.0 revolution with 5G at the helm." Commenting on this technology, certain experts predicted that by 2035, 5G will have a cumulative economic impact of US$ 1 trillion, and between 2025 and 2040, it could deliver an additional GDP of US$ 150 billion for the country. This aligns with India's vision of becoming a US$ 5 trillion economy by 2025.




at

HCLTech launches 5G testing, validation lab in Chennai for telecom OEMs

HCLTech said the lab is scalable to test millimeter-wave (mmWave) frequency 5G infrastructure to help OEMs and telecom service providers quickly and accurately measure critical parameters.




at

Govt should allot spectrum directly to enterprises for private networks: Voice

However, telecom operators associations COAI recently said private 5G network deployments by system integrators may lead to operational inefficiencies, capital burden, and eventually prove to be counter-productive.




at

TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India

The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP).




at

Patents need to be part of cutting-edge products: Rajaraman

“The task of coordinating, connecting and integrating all the work is what probably the Bharat 6G Alliance should do in enabling India's presence to be felt on the global telecommunications map,” Rajaraman said.




at

Want to be data-driven? Treat data as a product

In today’s data-obsessed era, treating data as you would treat your consumer products can help you realize true value from your investments. Whether individual teams piece together the data and technologies they need or centralized teams extract, cleanse, and aggregate data – the challenges plaguing data managers are many, even if not the same.




at

From chargers to children's data: How the EU reined in big tech

The groundbreaking Digital Services Act (DSA) and its sister law, the Digital Markets Act (DMA), are the biggest and most recent attempts to rein in tech companies.




at

Banking on data: Kotak Mahindra's Deepak Sharma on financial innovation

As financial institutions embark on this data-led journey, they stand at the threshold of a new era—a future where innovation and data-driven decision-making will carve the path for the financial world's evolution.




at

Ravi Vijayaraghavan sheds light on Flipkart's data-driven success

Flipkart has not only maintained its position as a retail giant but also evolved into a data-driven juggernaut.




at

Leveraging data in your AI strategy: Gopichand Katragadda, Myelin Foundry

As organizations harness the power of data, they can unlock new possibilities and drive transformative initiatives. Katragadda's insights make it abundantly clear that data is the cornerstone of any AI strategy.




at

Fostering gender diversity: Women leaders in data science share insights

Leading women data scientists and AI leaders talk about fostering more female candidates in the industry and navigating the challenges associated with it.




at

MeitY to hold consultation with industry on data law this week

Big Tech companies are likely to get less time than startups, MSMEs (micro, small and medium enterprises), government departments and other state governments to implement the rules around the DPDPA, the official had said. The government is also ready with a broad draft of the 21 rules under DPDPA, the official had said, adding that the government would now begin consultation on these rules.




at

From data chaos to data value — the undeniable case for data streaming

Data mess isn’t anybody’s fault. The situation many businesses find themselves in today is based on decisions made decades ago. It’s part of our IT legacy. And we have to deal with it.




at

Four trends that will revolutionize data management in 2024

The capabilities of data are expanding and revolutionizing with each passing day. It is important for technology business leaders to stay updated on the top data trends and use data more efficiently to improve their existing business models.




at

Simplify and accelerate your cloud journey: Genie Yuan, Couchbase

As the cloud becomes an integral part of the business infrastructure, the need for a streamlined, accelerated approach to cloud adoption coupled with consistency in technology stacks is more pronounced than ever. Genie Yuan, Regional VP and Head of Field Engineering for APJ at Couchbase, shares key insights.




at

Navigating data localization laws in an evolving business landscape

As the digital economy expands, so does the volume of data generated and stored within India. This presents an opportunity for the government to implement data localization policies to safeguard sensitive data, protect national security, and promote the growth of the domestic IT industry and related sectors.




at

Data-driven hiring practices, nearly double-digit pay hikes to mark 2024

Employees want workplace flexibility, a greater emphasis on diversity, and impartial hiring processes, while companies are eager to provide fair, engaging and streamlined candidate experiences to attract and retain top talent, according to experts.




at

Data analytics is shaping the future of banking

Banks invest in data analytics and AI technologies to enhance customer experience, optimize decision-making, and prevent financial fraud. They focus on platform models, identity analytics, and fraud detection to improve services and security, aiming to capture the customer's financial journey for insights into their buying process.




at

Spanish prosecutors investigate Meta over data use for AI

Spanish prosecutors said Thursday that they were investigating Facebook owner Meta over suspicions it breached data-protection laws by using users' data to train its AI programme. It added that prosecutors were seeking to protect users' "personal data" and would consult the Spanish data-protection authority about possible measures. du/mb/rlp/js




at

How emerging trends in big data can transform India's retail industry

Big data allows retailers to analyze vast sets of customer information including purchase history, demographics, browsing behaviour, and social media interactions. This enables highly targeted marketing campaigns, product recommendations, and loyalty programs.