com National Academies’ Gulf Research Program Awards $3.7 Million to Support Innovative Community Engagement Methods and Enhance Data Usage to Develop Equitable Outcomes to Climate Hazards By Published On :: Wed, 22 Jun 2022 04:00:00 GMT The Gulf Research Program (GRP) of the National Academies of Sciences, Engineering, and Medicine today announced grant awards for 13 new projects totaling $3.7 million. Full Article
com Winners Selected for the 2021-2022 TRB Airport Cooperative Research Program University Design Competition for Addressing Airport Needs By Published On :: Wed, 20 Jul 2022 04:00:00 GMT The Transportation Research Board’s Airport Cooperative Research Program (ACRP) has selected winners for its annual University Design Competition for Addressing Airport Needs. Now in its 16th year, the prestigious competition encourages students to design innovative and practical solutions to challenges at airports. Full Article
com Gulf Research Program Announces Grant Awards for Two HBCUs for Research on the Social Determinants of Health in At-Risk Gulf Communities By Published On :: Fri, 12 Aug 2022 04:00:00 GMT The Gulf Research Program (GRP) of the National Academies of Sciences, Engineering, and Medicine today announced $200,000 in planning grant awards for two historically Black universities as part of a partnership with the Robert Wood Johnson Foundation (RWJF) to understand how data on social determinants of health can transform public health data systems in the Gulf of Mexico region. Full Article
com As COP27 Approaches, Report Recommends New Global Emissions Information Clearinghouse, Steps to Improve Accuracy and Usability of Information By Published On :: Tue, 04 Oct 2022 04:00:00 GMT As the U.N. Climate Change Conference (COP27) approaches, a new report recommends steps to improve the accuracy and usability of greenhouse gas emissions information for decision-makers, including creating a global information clearinghouse. Full Article
com Gulf Research Program Welcomes 2022 Cohort of Seven Early-Career Research Fellows in Environmental Protection and Stewardship By Published On :: Thu, 06 Oct 2022 04:00:00 GMT The Gulf Research Program (GRP) of the National Academies of Sciences, Engineering, and Medicine today announced its 2022 cohort of Early-Career Research Fellows in the Environmental Protection and Stewardship track. Full Article
com National Academies Announce Inaugural Recipients of Eric and Wendy Schmidt Awards for Excellence in Science Communications By Published On :: Wed, 12 Oct 2022 04:00:00 GMT The 24 inaugural recipients of the Eric and Wendy Schmidt Awards for Excellence in Science Communication have been announced. Given by the National Academies in partnership with Schmidt Futures, the awards recognize science journalists and research scientists who have developed creative, original work about issues and advances in science, engineering, and medicine. Full Article
com VA Should Focus its Airborne Hazards and Open Burn Pit Registry on Communications and Improving Health Care By Published On :: Fri, 14 Oct 2022 04:00:00 GMT The U.S. Department of Veterans Affairs’ Airborne Hazards and Open Burn Pit Registry should be optimized to be a user-friendly resource and focus on improving health care quality and access for veterans and providing two-way communication between veterans who participate and the VA. Full Article
com Gutierrez-Scaccetti to Lead Transportation Research Board Executive Committee in 2023 By Published On :: Fri, 03 Mar 2023 05:00:00 GMT Diane Gutierrez-Scaccetti has been appointed as chair of the Transportation Research Board (TRB) Executive Committee by Marcia McNutt, president of the National Academy of Sciences. Her term begins March 4, 2023. Full Article
com More Investment and Attention Needed to Address Pandemic-Related Harms on Children and Families in Marginalized Communities By Published On :: Thu, 16 Mar 2023 04:00:00 GMT Strengthening and expanding critical safety net programs is necessary to address the COVID-19 pandemic’s effects on children and families, says a new report that examines the substantial toll the pandemic has taken on their health and well-being, especially those in marginalized communities. Full Article
com Submissions for the 2023 Eric and Wendy Schmidt Awards for Excellence in Science Communications Are Now Open By Published On :: Tue, 04 Apr 2023 04:00:00 GMT Submissions are now being accepted for the 2023 Eric and Wendy Schmidt Awards for Excellence in Science Communications, which honor top science communicators, journalists, and research scientists who have developed creative, original work to communicate issues and advances in science, engineering, and medicine for the general public. Full Article
com National Nuclear Security Administration Cannot Continue With ‘Business as Usual’ in the Shifting Supercomputing Landscape, Says New Report By Published On :: Thu, 13 Apr 2023 04:00:00 GMT The National Nuclear Security Administration needs to fundamentally rethink the strategy for its next generation of high-performance computing and cannot continue with ‘business as usual’ through shifting technical and geopolitical landscapes. Advanced computing capabilities help the NNSA ensure that the U.S. maintains a safe, secure, and reliable nuclear stockpile. Full Article
com The Untapped Potential of Computing and Cognition in Tackling Climate Change By Published On :: Tue, 25 Apr 2023 04:00:00 GMT A new NAE Perspective by Adiba M. Proma, Robert M. Wachter, and Ehsan Hoque discusses how helping people change their behaviors may be where technology can have its greatest impact on climate change. Full Article
com The who, where, and how of APT attacks – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 17 May 2024 16:09:11 +0000 This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape Full Article
com Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries By www.welivesecurity.com Published On :: Thu, 23 May 2024 09:30:00 +0000 Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings Full Article
com Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 24 May 2024 13:11:17 +0000 As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond? Full Article
com What happens when facial recognition gets it wrong – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 31 May 2024 13:45:32 +0000 A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability Full Article
com 560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 07 Jun 2024 14:04:40 +0000 Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data Full Article
com How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 14 Jun 2024 11:58:03 +0000 The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app Full Article
com The long-tail costs of a data breach – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 21 Jun 2024 11:54:09 +0000 Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents Full Article
com No room for error: Don’t get stung by these common Booking.com scams By www.welivesecurity.com Published On :: Wed, 03 Jul 2024 09:30:00 +0000 From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation Full Article
com Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 28 Jun 2024 13:13:12 +0000 Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year Full Article
com 5 common Ticketmaster scams: How fraudsters steal the show By www.welivesecurity.com Published On :: Tue, 09 Jul 2024 09:30:00 +0000 Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account Full Article
com Social media and teen mental health – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Thu, 04 Jul 2024 14:31:24 +0000 Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick? Full Article
com Should ransomware payments be banned? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 12 Jul 2024 12:30:20 +0000 Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective? Full Article
com The complexities of cybersecurity update processes By www.welivesecurity.com Published On :: Fri, 19 Jul 2024 12:28:24 +0000 If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike Full Article
com How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Sun, 21 Jul 2024 07:24:11 +0000 A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats Full Article
com Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 26 Jul 2024 11:57:23 +0000 Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files Full Article
com AI and automation reducing breach costs – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 02 Aug 2024 11:30:15 +0000 Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies Full Article
com Black Hat USA 2024 recap – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 09 Aug 2024 13:53:46 +0000 Unsurprisingly, many discussions revolved around the implications of the CrowdStrike outage, including the lessons it may have offered for bad actors Full Article
com How a BEC scam cost a company $60 million – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 16 Aug 2024 11:01:54 +0000 Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme Full Article
com PWA phishing on Android and iOS – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 23 Aug 2024 09:00:00 +0000 Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security Full Article
com Stealing cash using NFC relay – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Wed, 28 Aug 2024 14:01:52 +0000 The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become Full Article
com Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 06 Sep 2024 10:25:42 +0000 The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams Full Article
com 6 common Geek Squad scams and how to defend against them By www.welivesecurity.com Published On :: Wed, 11 Sep 2024 09:00:00 +0000 Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks Full Article
com CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 13 Sep 2024 10:21:33 +0000 ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends Full Article
com FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 20 Sep 2024 11:03:10 +0000 With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process Full Article
com Gamaredon's operations under the microscope – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 27 Sep 2024 13:26:04 +0000 ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years Full Article
com The complexities of attack attribution – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 04 Oct 2024 11:55:10 +0000 Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week Full Article
com GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 11 Oct 2024 13:28:05 +0000 ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities Full Article
com Don't become a statistic: Tips to help keep your personal data off the dark web By www.welivesecurity.com Published On :: Tue, 29 Oct 2024 10:00:00 +0000 You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it Full Article
com Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 18 Oct 2024 12:10:04 +0000 The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year Full Article
com Month in security with Tony Anscombe – October 2024 edition By www.welivesecurity.com Published On :: Thu, 31 Oct 2024 14:29:10 +0000 Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories Full Article
com Delhi HC issues notice to Telecom Department on accused judge's plea By cio.economictimes.indiatimes.com Published On :: Tue, 21 Mar 2023 08:50:43 +0530 Two former high court judges - SN Shukla of the Allahabad High Court and Quddusi of the Odisha High Court - have been charged by the CBI in the case. The agency had produced intercepted phone calls between the two judges as part of its charge sheet filed last July. It had also named other people in the alleged bribery scandal. Full Article
com HCLTech launches 5G testing, validation lab in Chennai for telecom OEMs By cio.economictimes.indiatimes.com Published On :: Wed, 07 Jun 2023 17:06:29 +0530 HCLTech said the lab is scalable to test millimeter-wave (mmWave) frequency 5G infrastructure to help OEMs and telecom service providers quickly and accurately measure critical parameters. Full Article
com Malicious IoT botnet traffic targeting telecoms networks increases 5x over 2022: Nokia By cio.economictimes.indiatimes.com Published On :: Thu, 08 Jun 2023 11:38:00 +0530 The number of IoT devices (bots) engaged in botnet-driven DDoS attacks rose from around 200,000 a year ago to approximately 1 million devices, generating more than 40% of all DDoS traffic today, according to the report. Full Article
com TRAI releases recommendations on licensing, regulatory framework for submarine cable landing in India By cio.economictimes.indiatimes.com Published On :: Wed, 21 Jun 2023 08:22:21 +0530 The telecom regulator has recommended two categories for cable landing station (CLS) location – main CLS, and CLS point-of-presence (CLS-PoP). Full Article
com Bandhan Financial Services acquires global IT company Genisys By cio.economictimes.indiatimes.com Published On :: Tue, 05 Nov 2024 10:50:48 +0530 Bandhan Financial Services Ltd (BFSL), promoter of Bandhan Bank, has ventured into the IT sector by acquiring Genisys group of companies for nearly Rs 100 crore. This strategic move aims to leverage technology for business solutions and enhance shareholder value. Genisys, specializing in AI-enabled solutions for various sectors, will operate under BFSL with expanded capabilities. Full Article
com Twitter to focus on video, commerce in business revamp: investor presentation By cio.economictimes.indiatimes.com Published On :: Sat, 17 Jun 2023 09:32:17 +0530 After Musk acquired Twitter in October, the social media firm faced months of chaos, including layoffs of thousands of employees, criticism over lax content moderation, and an exodus of many advertisers who did not want their ads appearing next to inappropriate content. Full Article
com EU welcomes Meta plans for tough content rules By cio.economictimes.indiatimes.com Published On :: Sat, 24 Jun 2023 08:22:18 +0530 The EU's Digital Services Act is one of the most ambitious pieces of legislation on controlling online content since the advent of social media, setting major obligations on how platforms deal with free speech. Meta, TikTok, Twitter, and others have to invest heavily in building compliance teams to meet the new rules. Full Article
com Twitter to be renamed X, enter payments, banking, commerce By cio.economictimes.indiatimes.com Published On :: Mon, 24 Jul 2023 09:39:21 +0530 The 52-year-old Tesla founder has previously said that his rocky takeover of Twitter last year was "an accelerant to creating X, the everything app," a reference to the X.com company he founded in 1999, a later version of which went on to become PayPal, a payments giant. Full Article