security Bridging the Social Security Divide: Lessons From Abroad By webfeeds.brookings.edu Published On :: Executive Summary Efforts by President George W. Bush to promote major reforms in the Social Security retirement program have not led to policy change, but rather to increased polarization between the two parties. And the longer we wait to address Social Security’s long-term funding problem, the bigger and more painful the changes will need to… Full Article
security Beyond 2016: Security challenges and opportunities for the next administration By webfeeds.brookings.edu Published On :: Tue, 01 Mar 2016 09:00:00 -0500 Event Information March 1, 20169:00 AM - 4:15 PM ESTFalk AuditoriumBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 Register for the EventThe Center for 21st Century Security Intelligence seventh annual military and federal fellow research symposiumOn March 1, the seventh annual military and federal fellow research symposium featured the independent research produced by members of the military services and federal agencies who are currently serving at think-tanks and universities across the nation. Organized by the fellows themselves, the symposium provides a platform for building greater awareness of the cutting-edge work that America’s military and governmental leaders are producing on key national security policy issues. With presidential primary season well underway, it’s clear that whoever emerges in November 2016 as the next commander-in-chief will have their hands full with a number of foreign policy and national security choices. This year’s panels explored these developing issues and their prospects for resolution after the final votes have been counted. During their keynote conversation, the Honorable Michèle Flournoy discussed her assessment of the strategic threat environment with General John Allen, USMC (Ret.), who also provided opening remarks on strategic leadership and the importance of military and other federal fellowship experiences. Video Opening remarks and The future of the All-Volunteer ForceThe next generation of terrorismHarnessing technology in the future forceKeynote discussion: Assessing the strategic environmentTo intervene, or not to intervene? Audio Beyond 2016: Security challenges and opportunities for the next administration Full Article
security Clinton’s emails don’t jeopardize U.S. security By webfeeds.brookings.edu Published On :: Fri, 08 Jul 2016 09:40:00 -0400 Note: FBI Director James Comey recommended this week that no criminal charges be pressed against presumptive Democratic presidential nominee Hillary Clinton for her use of a private email server while she was secretary of state. And Attorney General Loretta Lynch has formally closed the Department of Justice’s investigation. But congressional Republicans—who called Comey to testify before the House Oversight committee yesterday—insist that Clinton’s conduct jeopardized U.S. national security. As I wrote back in February, when it was revealed that 22 of the emails in question were deemed too classified to be made public: “Hillary's emails (even if they were released) could not do anything more than confirm or repudiate what has already been widely investigated.” I called for distinguishing mistakes from crimes and argued that Clinton’s use of a private email server never put America’s security at risk. Due to the renewed relevance of that post, it is re-posted below. What to make of the recent report that 22 emails from Hillary Clinton's private server, written while she was secretary of state during the first Obama term, contain such highly classified material that they cannot be released to the public? Republicans have seized on the latest news to argue that Hillary Clinton was careless or even reckless in her treatment of national secrets. They’ve thereby challenged her credentials and judgment as she pursues the presidency. Clinton has acknowledged some mistakes in the use of a personal email account and server when she led the State Department, but her campaign has dismissed the latest news as evidence of a U.S. government classification system run amok that often slaps a top secret label on even the most innocuous of information. With the emails at issue now classified, it’s hard to understand the basis for this dispute very well. Who are we to believe? Most people are probably falling back on their preconceived views about Hillary, but it would be nice to find a more objective way to assess the latest news—especially as primary voting season begins. A hypothetical I can't be sure what's going on here either. But there have been reports that some of the sensitive emails might have involved the use of drones in certain parts of the world where the U.S. government has chosen not to announce or publicize its use of that technology. Let's explore that, on the hunch that it may be what's behind the latest brouhaha. For years, there has been a great deal of media coverage of how unmanned aerial systems, including armed ones, have been used in the broader war on terror. If there ever were any real secrets here, they have been very badly kept. Certainly, Hillary's emails (even if they were released) could not do anything more than confirm or repudiate what has already been widely investigated, in this country and around the world. It seems quite unlikely that she was so careless as to describe any technical aspects of those drones or to otherwise risk the leakage of information that was truly still secret (in the sense that word is normally used in the English language, rather than the way the U.S. government employs it when making classification determinations). Hillary's emails (even if they were released) could not do anything more than confirm or repudiate what has already been widely investigated. Imagine a situation in which the United States government wished to use force as part of a broader military operation that Congress had already approved in broad contours, going back to the 2001 Authorization on the Use of Military Force that followed the 9/11 attack. But the employment of force in a particular place was seen as politically sensitive—less so in the United States, where Congress had already authorized the conflict, but in a foreign country, where the government at issue was not willing or able to publicly support America's use of military force on its territory. This could be a situation where the foreign government in question actually had few qualms about the U.S. action, but did still not wish to be associated with them—in fact, it may have wanted the license to complain about them publicly, both to its own public and other nations. It wanted, in other words, to have its cake and eat it too. In this situation, whether the U.S. decision to accept such constraints on its action was wise or not, it would not be allowable for an American public official to discuss the policy. The actual use of armed force would occur through covert elements of the U.S. government, and under domestic laws governing such activities. We would have twisted ourselves into knots to avoid displeasing a foreign government that otherwise might make a huge stink about our using American military power on its territory—and might even retaliate against us in some way if the information were publicly confirmed. Everyone in that country, the United States, and other places would have a strong suspicion of what we were actually doing, but there would be no official confirmation. It's not exactly plausible deniability. Call it implausible deniability, in fact. In such a situation, as a top official in the United States, Hillary Clinton would perhaps have been an architect of the policy (or have inherited it from a previous presidency). Either way, she would be expected to abide by it, and treat the information as highly sensitive. If she did not do so, that was indeed a mistake on her part. Distinguishing mistakes from crimes But if this thought experiment bears any resemblance to what actually is behind those 22 emails, one more thing should also be clear—no major national secret was at risk of getting out because of Secretary Clinton's misjudgment. Her email practice was potentially a mistake, but no high crime, and America's security was never put at risk. Of course, it's still up to voters to decide how to weigh this potential issue in the panoply of so many others that influence their choices for president. Even if I’m right in my guess about what's going on here, I don’t claim to be in a position to answer that question for anyone. Authors Michael E. O'Hanlon Full Article
security President Obama’s role in African security and development By webfeeds.brookings.edu Published On :: Tue, 19 Jul 2016 10:00:00 -0400 Event Information July 19, 201610:00 AM - 11:30 AM EDTFalk AuditoriumBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 Register for the EventBarack Obama’s presidency has witnessed widespread change throughout Africa. His four trips there, spanning seven countries, reflect his belief in the continent’s potential and importance. African countries face many challenges that span issues of trade, investment, and development, as well as security and stability. With President Obama’s second term coming to an end, it is important to begin to reflect on his legacy and how his administration has helped frame the future of Africa. On July 19, the Center for 21st Century Security and Intelligence at Brookings hosted a discussion on Africa policy. Matthew Carotenuto, professor at St. Lawrence University and author of “Obama and Kenya: Contested Histories and the Politics of Belonging” (Ohio University Press, 2016) discussed his research in the region. He was joined by Sarah Margon, the Washington director of Human Rights Watch. Brookings Senior Fellow Michael O'Hanlon partook in and moderated the discussion. Video President Obama’s role in African security and development Audio President Obama’s role in African security and development Transcript Uncorrected Transcript (.pdf) Event Materials 20160719_us_africa_transcript Full Article
security District Mineral Foundation funds crucial resource for ensuring income security in mining areas post COVID-19 By webfeeds.brookings.edu Published On :: Wed, 06 May 2020 10:36:03 +0000 The Prime Minister of India held a meeting on April 30, 2020 to consider reforms in the mines and coal sector to jump-start the Indian economy in the backdrop of COVID-19. The mining sector, which is a primary supplier of raw materials to the manufacturing and infrastructure sectors, is being considered to play a crucial… Full Article
security Terrorism in the Philippines and U.S.-Philippine security cooperation By webfeeds.brookings.edu Published On :: Tue, 15 Aug 2017 17:33:11 +0000 Events of the past few months—in particular, the prolonged standoff in Marawi, Mindanao—have significantly increased concerns about terrorist activity in the southern Philippines, and in Southeast Asia more broadly. The shape and focus of the U.S.-Philippine alliance has already been somewhat in flux with the ascension of relatively new leadership in both countries—Rodrigo Duterte having… Full Article
security New cybersecurity mantra: “If you can’t protect it, don’t collect it” By webfeeds.brookings.edu Published On :: In early August I attended my 11th Black Hat USA conference in sunny Las Vegas, Nevada. Black Hat is the somewhat more corporate sibling of the annual DEF CON hacker convention, which follows Black Hat. Since my first visit to both conferences in 2002, I’ve kept tabs on the themes expressed by computer security practitioners.… Full Article Uncategorized
security Cyber Grand Challenge contrasts today’s cybersecurity risks By webfeeds.brookings.edu Published On :: Wed, 14 Sep 2016 12:08:50 +0000 Cade Metz’s article for Wired titled “Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It” described a curious event that took place in Las Vegas on August 4, 2016. The first Defense Advanced Research Projects Agency (DARPA) Cyber Grand Challenge witnessed seven teams compete for cyber security supremacy. Unlike traditional hacking contests,… Full Article
security Terrorists and Detainees: Do We Need a New National Security Court? By webfeeds.brookings.edu Published On :: In the wake of the 9/11 attacks and the capture of hundreds of suspected al Qaeda and Taliban fighters, we have been engaged in a national debate as to the proper standards and procedures for detaining “enemy combatants” and prosecuting them for war crimes. Dissatisfaction with the procedures established at Guantanamo for detention decisions and… Full Article
security The Impact of Domestic Drones on Privacy, Safety and National Security By webfeeds.brookings.edu Published On :: Legal and technology experts hosted a policy discussion on how drones and forthcoming Federal Aviation Agency regulations into unmanned aerial vehicles will affect Americans’ privacy, safety and the country’s overall security on April 4, 2012 at Brookings. The event followed a new aviation bill, signed in February, which will open domestic skies to “unmanned aircraft… Full Article
security Recent Social Security blogs—some corrections By webfeeds.brookings.edu Published On :: Fri, 15 Apr 2016 12:00:00 -0400 Recently, Brookings has posted two articles commenting on proposals to raise the full retirement age for Social Security retirement benefits from 67 to 70. One revealed a fundamental misunderstanding of how the program actually works and what the effects of the policy change would be. The other proposes changes to the system that would subvert the fundamental purpose of the Social Security in the name of ‘reforming’ it. A number of Republican presidential candidates and others have proposed raising the full retirement age. In a recent blog, Robert Shapiro, a Democrat, opposed this move, a position I applaud. But he did so based on alleged effects the proposal would in fact not have, and misunderstanding about how the program actually works. In another blog, Stuart Butler, a conservative, noted correctly that increasing the full benefit age would ‘bolster the system’s finances,’ but misunderstood this proposal’s effects. He proposed instead to end Social Security as a universal pension based on past earnings and to replace it with income-related welfare for the elderly and disabled (which he calls insurance). Let’s start with the misunderstandings common to both authors and to many others. Each writes as if raising the ‘full retirement age’ from 67 to 70 would fall more heavily on those with comparatively low incomes and short life expectancies. In fact, raising the ‘full retirement age’ would cut Social Security Old-Age Insurance benefits by the same proportion for rich and poor alike, and for people whose life expectancies are long or short. To see why, one needs to understand how Social Security works and what ‘raising the full retirement age’ means. People may claim Social Security retirement benefits starting at age 62. If they wait, they get larger benefits—about 6-8 percent more for each year they delay claiming up to age 70. Those who don’t claim their benefits until age 70 qualify for benefits -- 77 percent higher than those with the same earnings history who claim at age 62. The increments approximately compensate the average person for waiting, so that the lifetime value of benefits is independent of the age at which they claim. Mechanically, the computation pivots on the benefit payable at the ‘full retirement age,’ now age 66, but set to increase to age 67 under current law. Raising the full retirement age still more, from 67 to 70, would mean that people age 70 would get the same benefit payable under current law at age 67. That is a benefit cut of 24 percent. Because the annual percentage adjustment for waiting to claim would be unchanged, people who claim benefits at any age, down to age 62, would also receive benefits reduced by 24 percent. In plain English, ‘raising the full benefit age from 67 to 70' is simply a 24 percent across-the-board cut in benefits for all new claimants, whatever their incomes and whatever their life-expectancies. Thus, Robert Shapiro mistakenly writes that boosting the full-benefit age would ‘effectively nullify Social Security for millions of Americans’ with comparatively low life expectancies. It wouldn’t. Anyone who wanted to claim benefits at age 62 still could. Their benefits would be reduced. But so would benefits of people who retire at older ages. Equally mistaken is Stuart Butler’s comment that increasing the full-benefit age from 67 to 70 would ‘cut total lifetime retirement benefits proportionately more for those on the bottom rungs of the income ladder.’ It wouldn’t. The cut would be proportionately the same for everyone, regardless of past earnings or life expectancy. Both Shapiro and Butler, along with many others including my other colleagues Barry Bosworth and Gary Burtless, have noted correctly that life expectancies of high earners have risen considerably, while those of low earners have risen little or not at all. As a result, the lifetime value of Social Security Old-Age Insurance benefits has grown more for high- than for low-earners. That development has been at least partly offset by trends in Social Security Disability Insurance, which goes disproportionately to those with comparatively low earnings and life expectancies and which has been growing far faster than Old-Age Insurance, the largest component of Social Security. But even if the lifetime value of all Social Security benefits has risen faster for high earners than for low earners, an across the board cut in benefits does nothing to offset that trend. In the name of lowering overall Social Security spending, it would cut benefits by the same proportion for those whose life expectancies have risen not at all because the life expectancy of others has risen. Such ‘evenhandeness’ calls to mind Anatole France’s comment that French law ‘in its majestic equality, ...forbids rich and poor alike to sleep under bridges, beg in streets, or steal loaves of bread.’ Faulty analyses, such as those of Shapiro and Butler, cannot conceal a genuine challenge to policy makers. Social Security does face a projected, long-term funding shortfall. Trends in life expectancies may well have made the system less progressive overall than it was in the past. What should be done? For starters, one needs to recognize that for those in successive age cohorts who retire at any given age, rising life expectancy does not lower, but rather increases their need for Social Security retirement benefits because whatever personal savings they may have accumulated gets stretched more thinly to cover more retirement years. For those who remain healthy, the best response to rising longevity may be to retire later. Later retirement means more time to save and fewer years to depend on savings. Here is where the wrong-headedness of Butler’s proposal, to phase down benefits for those with current incomes of $25,000 or more and eliminate them for those with incomes over $100,000, becomes apparent. The only source of income for full retirees is personal savings and, to an ever diminishing degree, employer-financed pensions. Converting Social Security from a program whose benefits are based on past earnings to one that is based on current income from savings would impose a tax-like penalty on such savings, just as would a direct tax on those savings. Conservatives and liberals alike should understand that taxing something is not the way to encourage it. Still, working longer by definition lowers retirement income needs. That is why some analysts have proposed raising the age at which retirement benefits may first be claimed from age 62 to some later age. But this proposal, like across-the-board benefit cuts, falls alike on those who can work longer without undue hardship and on those in physically demanding jobs they can no longer perform, those whose abilities are reduced, and those who have low life expectancies. This group includes not only blue-collar workers, but also many white-collar employees, as indicated by a recent study of the Boston College Retirement Center. If entitlement to Social Security retirement benefits is delayed, it is incumbent on policymakers to link that change to other ‘backstop’ policies that protect those for whom continued work poses a serious burden. It is also incumbent on private employers to design ways to make workplaces friendlier to an aging workforce. The challenge of adjusting Social Security in the face of unevenly distributed increases in longevity, growing income inequality, and the prospective shortfall in Social Security financing is real. The issues are difficult. But solutions are unlikely to emerge from confusion about the way Social Security operates and the actual effects of proposed changes to the program. And it will not be advanced by proposals that would bring to Social Security the failed Vietnam War strategy of destroying a village in order to save it. Authors Henry J. Aaron Image Source: © Sam Mircovich / Reuters Full Article
security US to demand coal-burning power plants keep pumping out pollution, because National Security By www.treehugger.com Published On :: Mon, 04 Jun 2018 07:44:41 -0400 It's in the Fearless Leader's latest move to a planned economy that runs on coal. Full Article Energy
security New UN report blames pesticides for food insecurity By www.treehugger.com Published On :: Tue, 14 Mar 2017 10:45:00 -0400 The United Nations says it's time to overturn the myth that pesticides can feed the world and come up with better, safer ways of producing our food. Full Article Living
security TED conferences use security technology inspired by butterflies By www.treehugger.com Published On :: Mon, 17 Mar 2014 13:35:28 -0400 The theme of this year's conference is "the next chapter," and each attendee will receive a sample of what could be next in anti-counterfeit technology. Full Article Science
security 5 ways to improve global food security By www.treehugger.com Published On :: Fri, 25 Jul 2014 10:44:08 -0400 The US produces more than enough food to feed the world, but hunger is still a major issue around the world. A new study proposes some ways to change that. Full Article Science
security Mounties call 'anti-petroleum movement' a security threat to Canada By www.treehugger.com Published On :: Tue, 17 Feb 2015 09:30:57 -0500 Most people think of them as environmentalists, but the Royal Canadian Mounted Police have other ideas. Full Article Business
security Airport security trays have more germs than toilets By www.treehugger.com Published On :: Wed, 05 Sep 2018 17:20:00 -0400 Scientists are concerned about how airports are conducive to the spread of disease. Full Article Living
security How to Improve Food Security by Reducing Grain Demand By www.treehugger.com Published On :: Tue, 09 Nov 2010 11:33:12 -0500 After several decades of Lrapid rise in world grain yields, it is now becoming more difficult to raise land productivity fast enough to keep up with the demands of a growing, increasingly affluent, population. Full Article Business
security Redefining Security for the 21st Century By www.treehugger.com Published On :: Thu, 31 May 2012 11:26:00 -0400 The 21st century needs a redefinition of security, to something broader than military terms, a relic of the Cold War. Full Article Business
security Triodos Bank Annual Meeting Tackles Food Security By www.treehugger.com Published On :: Mon, 28 Apr 2008 08:43:25 -0400 Whenever we've discussed Triodos Bank, the European sustainability-oriented savings bank with branches in the UK, Spain, The Netherlands and Belgium, we've always been impressed at the number of customers who attend Full Article Living
security Sophisticated Cyber-Attacks Prompt Corporate Boards To Elevate Information Security To The C-Suite - Video OneTitle By feedproxy.google.com Published On :: 10 Jun 2014 12:00:00 EDT SOPHISTICATED CYBER-ATTACKS PROMPT CORPORATE BOARDS TO ELEVATE INFORMATION SECURITY TO THE C-SUITE Full Article Banking Financial Services Computer Electronics High Tech Security Workforce Management Human Resources New Products Services Broadcast Feed Announcements MultiVu Video
security Finding Financial Security When It's Needed Most - Video By feedproxy.google.com Published On :: 15 Sep 2014 12:50:00 EDT Husband and father of three young children, Travis Roberts, was diagnosed with inoperable cancer. This is his story. Full Article Banking Financial Services Insurance Health Insurance New Products Services Broadcast Feed Announcements MultiVu Video
security Retailers Push for Greater Payment Security at Checkout - Retailers Push for Greater Payment Security at Checkout to Combat Fraud and Cyber Theft By feedproxy.google.com Published On :: 22 Sep 2015 15:15:00 EDT Retailers Push for Greater Payment Security at Checkout to Combat Fraud and Cyber Theft Full Article Banking Financial Services Computer Electronics Electronic Commerce Publishing Information Services Retail Broadcast Feed Announcements Survey Polls & Research MultiVu Video
security Emerging Chinese Smartphone maker Vargo Technology Showcased in Times Square Provides closed-loop security - Vargo, an end to privacy leaks By feedproxy.google.com Published On :: 31 Dec 2015 10:45:00 EST Emerging Chinese Smartphone maker Vargo Technology Showcased in Times Square Full Article Computer Electronics Consumer Electronics Telecommunications High Tech Security Wireless Communications New Products Services Broadcast Feed Announcements MultiVu Video
security Zoom strikes a deal with NY AG office, closing the inquiry into its security problems By www.cnbc.com Published On :: Thu, 07 May 2020 20:41:09 GMT The agreement comes one day after the NYC Department of Education lifted its ban on Zoom after approving new safety features. Full Article
security US commitment to Gulf allies' security 'not at all changed' despite Patriot systems drawdown, Iran envoy says By www.cnbc.com Published On :: Fri, 08 May 2020 20:37:29 GMT Washington's commitment to the security of its Gulf allies is unchanged despite what appears to be a shift in force posture in the region, U.S. Special Representative for Iran Brian Hook told CNBC. Full Article
security Financial advisors need to put cybersecurity plans to the test By www.cnbc.com Published On :: Wed, 20 Nov 2019 13:01:30 GMT Today's advisory firms face numerous cybersecurity risks, from phishing to ransomware to email viruses, to name a few. And the one way that firms can tell if they're ready to face these risks, as well as regulators' requirements, is to put them to the test. Full Article
security Op-Ed: Here's a game plan to help create retirement security for millions of Americans By www.cnbc.com Published On :: Mon, 20 Apr 2020 13:31:21 GMT As Congress considers ideas in the coming weeks seeking to help America recover from the Covid-19 pandemic, the Insured Retirement Institute has proposed a five-point plan to help American retirement savers enhance their ability to save for retirement today and ways to strengthen their financial security for tomorrow. Full Article
security US withdraws support for UN Security Council global ceasefire resolution By www.france24.com Published On :: Sat, 09 May 2020 05:12:33 GMT The United States on Friday stunned other members of the UN Security Council by preventing a vote on a resolution for a ceasefire in various conflicts around the world to help troubled nations better fight the coronavirus pandemic, diplomats said. Full Article Americas
security Covid-19: The pandemic heightens food insecurity in Benin By www.france24.com Published On :: Sat, 09 May 2020 13:55:51 GMT While residents of Benin haven’t been ordered to stay home like their neighbours in Nigeria, the Covid-19 pandemic has forced them to slow down nevertheless, putting many at risk of food insecurity. Full Article Africa
security Security Settings By questionablecontent.net Published On :: Thu, 09 Jan 2020 22:20:25 -0400 Full Article
security Home Security By questionablecontent.net Published On :: Thu, 05 Mar 2020 22:09:06 -0400 Full Article
security Google rewards Uraguyan teenager for finding security flaw By www.mid-day.com Published On :: 27 May 2018 18:30:06 GMT Representational Image Google has rewarded an Uruguayan teenager a "bug bounty" of more than $36,000 for disclosing a severe security flaw. Ezequiel Pereira's sporadic poking around has finally paid off in a big way: Google just awarded the Uruguayan teenager $36,337 for finding a vulnerability that would have allowed him to make changes to internal company systems, CNBC reported on Saturday. "I found something almost immediately that was worth $500 and it just felt so amazing. So I decided to just keep trying ever since then," Pereira was quoted as saying by CNBC. "It feels really good - I'm glad that I found something that was so important," he added. Although, Pereira found the bug earlier this year, he only just got permission to write about how he discovered it this week, after Google confirmed that it had fixed the issue, the report said. It marks Pereira's fifth accepted bug, but it's by far his most lucrative. Pereira was about a month shy of 17 when he first got paid for exposing a Google security flaw through its bug bounty programme. Pereira got his first computer when he was 10, took an initial programming class when he was 11 and then spent years teaching himself different coding languages and techniques. In 2016, Google flew him to its California headquarters after he won a coding contest. Catch up on all the latest Crime, National, International and Hatke news here. Also download the new mid-day Android and iOS apps to get latest updates This story has been sourced from a third party syndicated feed, agencies. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever. Full Article
security Tax-News.com: French Workers In 'Third Countries' Liable For Social Security By www.tax-news.com Published On :: Thu, 18 Jan 2018 00:00:00 GMT Income from assets of French nationals who work in a state other than a member state of the EU, the European Economic Area or Switzerland may be subject to French social security contributions, the European Court of Justice has ruled. Full Article
security Press Release: First Global Estimate of Urban Agriculture Reveals Area Size of the EU that’s Boosting Food Security in Cities By www.iwmi.cgiar.org Published On :: Thu, 13 Nov 2014 02:30:44 +0000 Study finds irrigation more common on city farms than rural farms, intensifying water demands in sprawling urban zones. Full Article Media Releases Z-News Food Security irrigation Pay Drechsel Stanford University University of California-Berkeley urban agriculture
security Water security for all By www.iwmi.cgiar.org Published On :: Fri, 25 Jan 2019 09:35:12 +0000 IWMI joins a major UK-funded effort to find solutions. Full Article Africa News Blog East Africa News Regional News Z-Featured Content Z-News Claudia Sadoff Ethiopia extreme weather GCRF Groundwater pollution sustainable development UKRI urbanization Water security
security False-negative Coronavirus Test Results may Lead to a False Sense of Security By www.medindia.net Published On :: New study calls attention to the risk posed by overreliance on COVID-19 testing to make clinical and public health decisions. A false-negative test could Full Article
security Chinese Collect User Data from random Android Phones secretly: Security Firm By feedproxy.google.com Published On :: Virginia-based security firm Kryptowire recently reported that there are few Android devices from a Chinese company that are infected with software that collects users’ personal information and conversation made through text messages and calls. Full Article
security July 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 10 Jul 2019 14:17:12 GMT Microsoft addresses vulnerabilities in its July security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1001 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by the scripting engine in Microsoft browsers. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1004 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by the scripting engine in Microsoft browsers. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1062 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory in the Chakra scripting engine of Microsoft Edge. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1063 - Internet Explorer Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory by Internet Explorer. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1092 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory in the Chakra scripting engine of Microsoft Edge. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1103 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may create a specially crafted webpage that contains an exploit to this vulnerability.CVE-2019-1104 - Microsoft Browser Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the improper handling of objects in memory by Microsoft browsers. Attackers looking to exploit this vulnerability may create a specially crafted webpage that contains an exploit to this vulnerability.CVE-2019-1106 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may gain the same user rights as the currently logged on user.CVE-2019-1107 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis memory corruption vulnerability exists in the handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may gain the same user rights as the currently logged on user.CVE-2019-1112 - Microsoft Excel Information Disclosure VulnerabilityRisk Rating: ImportantThis information disclosure vulnerability exists in the disclosure of memory contents by Microsoft Excel. Attackers looking to exploit this vulnerability may host a specially crafted file that contains an exploit to this vulnerability..Read More Full Article
security August 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 14 Aug 2019 09:55:58 GMT Microsoft addresses vulnerabilities in its August security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1196 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1139 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1140 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1141 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1195 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1197 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.CVE-2019-1201 - Microsoft Word Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Word. Attackers looking to exploit this vulnerability may create a specially crafted file that contains an exploit to this vulnerability..Read More Full Article
security September 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Thu, 12 Sep 2019 15:00:56 GMT Microsoft addresses several vulnerabilities in its September security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1257 - Microsoft SharePoint Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the failure of Microsoft SharePoint to check an application package's source markup. Attackers looking to exploit this vulnerability must find a way to convince a user to open a malicious SharePoint application package.CVE-2019-1295 - Microsoft SharePoint Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper protection of data input in Microsoft SharePoint APIs. Attackers looking to exploit this vulnerability must find a way for a vulnerable Microsoft SharePoint version to input data in a susceptible API.CVE-2019-1296 - Microsoft SharePoint Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper protection of data input in Microsoft SharePoint APIs. Attackers looking to exploit this vulnerability must find a way for a vulnerable Microsoft SharePoint version to input data in a susceptible API..Read More Full Article
security October 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 09 Oct 2019 11:42:14 GMT Microsoft addresses several vulnerabilities in its October security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1335 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in Microsoft Edge's Chakra scripting engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-1364 - Win32k Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability exists in the improper handling of objects in memory by the Windows kernel-mode driver. Attackers looking to exploit this vulnerability must find a way to be logged on to the vulnerable system.CVE-2019-1060 - MS XML Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper parsing of user input by the Microsoft XML Core Services MSXML. Attackers looking to exploit this vulnerability must find a way for a user to access a website using Internet Explorer.CVE-2019-1238 - VBScript Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the VBScript engine. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1239 - VBScript Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the VBScript engine. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1307 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1308 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1366 - Chakra Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.CVE-2019-1361 - Microsoft Graphics Components Information Disclosure VulnerabilityRisk Rating: ImportantThis information disclosure vulnerability exists in the improper handling of objects in memory by the Microsoft Graphics Components. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file..Read More Full Article
security November 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Tue, 12 Nov 2019 12:06:01 GMT Microsoft addresses several vulnerabilities in its November security bulletin. Trend Micro Deep Security covers the following:CVE-2019-1390 - BScript Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the VBScript engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-1429 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis elevation of privilege vulnerability exists in the improper handling of objects in memory by the scripting engine in Internet Explorer. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-1359 - Jet Database Engine Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects by the Windows Jet Database Engine. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file.CVE-2019-1358 - Jet Database Engine Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects by the Windows Jet Database Engine. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file.CVE-2019-1311 - Windows Imaging API Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the Windows Imaging API. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted .WIM file..Read More Full Article
security December 2019 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 11 Dec 2019 17:57:43 GMT Microsoft addresses several vulnerabilities in its December security bulletin. Trend Micro Deep Security covers the following:CVE-2019-0617 - Jet Database Engine Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the Windows Jet Database engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to open a specially crafted file.CVE-2019-1485 - VBScript Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by VBScript engine. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.CVE-2019-0853 - GDI Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the improper handling of objects by the Windows Graphics Device Interface (GDI). Attackers looking to exploit this vulnerability must find a way for a user to open a website that contains the exploit, or to open a specially crafted file via file-sharing.CVE-2019-1458 - Win32k Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability exists in the improper handling of objects by the the Win32k component in Windows. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted application.CVE-2019-1439 - Windows GDI Information Disclosure VulnerabilityRisk Rating: ImportantThis information disclosure vulnerability exists in the improper handling of objects in memory by the Windows GDI component. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-1117 - DirectWrite Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-1118 - DirectWrite Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-1119 - DirectWrite Remote Code Execution VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.CVE-2019-0959 - Windows Common Log File System Driver Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability exists in the improper handling of objects in memory by the Windows Common Log File System. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted application..Read More Full Article
security January 2020 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Tue, 14 Jan 2020 15:38:30 GMT Microsoft addresses several vulnerabilities in its January security bulletin. Trend Micro Deep Security covers the following:CVE-2020-0609 - Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution, pre-authentication vulnerability exists in the Windows Remote Desktop Gateway (RD Gateway) and requires no user interaction. Attackers looking to exploit this vulnerability could send a specially crafted request via RDP.CVE-2020-0610 - Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution, pre-authentication vulnerability exists in the Windows Remote Desktop Gateway (RD Gateway) and requires no user interaction. Attackers looking to exploit this vulnerability could send a specially crafted request via RDP.CVE-2020-0652 - Microsoft Office Memory Corruption VulnerabilityRisk Rating: ImportantThis remote code execution vulnerability exists in the improper handling of objects by Microsoft Office. Attackers looking to exploit this vulnerability must find a way for a user to open a website that contains the exploit, or to open a specially crafted file.CVE-2020-0601 - Windows CryptoAPI Spoofing VulnerabilityRisk Rating: ImportantThis spoofing vulnerability exists in the validation of Elliptic Curve Cryptography (ECC) certificates by the the Windows CryptoAPI (crypt32.dll). A successful exploitation of this vulnerability could allow man-in-the-middle (MiTM) attacks..Read More Full Article
security February 2020 - Microsoft Releases Security Patches By www.trendmicro.com Published On :: Wed, 12 Feb 2020 11:08:35 GMT Microsoft addresses several vulnerabilities in its February security bulletin. Trend Micro Deep Security covers the following:CVE-2020-0674 - Scripting Engine Memory Corruption VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the scripting engine of Internet explorer in the way it handles objects in memory. Attackers looking to exploit this vulnerability could host a specially crafted website that contains an exploit.CVE-2020-0681 - Remote Desktop Client Remote Code Execution VulnerabilityRisk Rating: CriticalThis remote code execution vulnerability exists in the Windows Remote Desktop Client. It exists when a user connects to a malicious server. Attackers looking to exploit this vulnerability could find ways to convince a user of a vulnerable machine to connect to a malicious server.CVE-2020-0692 - Microsoft Exchange Server Elevation of Privilege VulnerabilityRisk Rating: ImportantThis elevation of privilege vulnerability, that requires an enabled Exchange Web Services (EWS), exists in the Microsoft Exchange Server. Attackers looking to exploit this vulnerability must find a way to change Security Access Token parameters and forward that to the vulnerable Microsoft Exchange Server..Read More Full Article
security Ethical hacker discovers 'security issue' in Aarogya Setu: Centre downplays risks By Published On :: Wed, 06 May 2020 01:14:09 +0530 If the tweet by the French hacker is to be believed, the privacy of more than 90 million Indians is at stake. The issue has been revealed to the concerned departments as the ethical hacker waits for it to be resolved. Full Article
security Leasing Consultant- Security Properties Residential (Greenwood) By jobs.monsterindia.com Published On :: 2020-04-10 02:19:52 Company: Disys India Private LimitedExperience: 0 to 50location: USRef: 24797643Summary: Job Description : Job description Position Summary The Leasing Consultant is responsible for coordinating all activities related to apartment rentals, move-ins, move-outs, and lease renewals. This position is also responsible for.... Full Article