security IT Security Ask the Experts: October, 2009 By www.itsecurity.com Published On :: Thu, 05 Nov 2009 23:18:30 +0000 This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo... Full Article
security IT Security Ask the Experts: Top Queries for November, 2009 By www.itsecurity.com Published On :: Wed, 02 Dec 2009 22:03:17 +0000 This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo... Full Article
security 15 Major Reasons Businesses' Security Gets Compromised By www.itsecurity.com Published On :: Thu, 03 Dec 2009 00:01:38 +0000 In a world of ever-advancing technology and development, many company heads often get lost in the bustle and get swept up in the sea of buzzwords that happen to be popular at any given moment. They ... Full Article
security IT Security Ask the Experts: Top Queries for December, 2009 By www.itsecurity.com Published On :: Tue, 05 Jan 2010 01:45:49 +0000 This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo... Full Article
security IT Security Ask the Experts: Top Queries for January, 2010 By www.itsecurity.com Published On :: Tue, 02 Feb 2010 22:18:18 +0000 This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo... Full Article
security Driving IT Cost-Efficiency, Security and Compliance in 2010 By www.itsecurity.com Published On :: Wed, 03 Feb 2010 01:30:36 +0000 On-Demand Webcast>Watch Now! SPONSORED BY: TripwireWatch this FREE on-demand webcast and hear from leading IT experts about ways organizations are leveraging technologies such as virtualizatio... Full Article
security Information Security: Harnessing the Overlooked Source for SMB Competitive Advantage By www.itsecurity.com Published On :: Wed, 09 Jun 2010 19:43:36 +0000 On-Demand Webinar > Watch Now!>>SPONSORED BY: AT&TWatch this FREE on-demand webinar to learn how to make the connections between information security and competitive success for yo... Full Article
security Polygraph Testing Too Flawed for Security Screening By Published On :: Tue, 08 Oct 2002 05:00:00 GMT The federal government should not rely on polygraph examinations for screening prospective or current employees to identify spies or other national-security risks because the test results are too inaccurate when used this way. Full Article
security Most Social Security Representative Payees Perform Duties Well But Changes Needed to Better Prevent and Detect Misuse of Funds By Published On :: Mon, 30 Jul 2007 05:00:00 GMT Although most people who receive and manage Social Security benefits on behalf of other individuals perform their duties well. Full Article
security Future Pandemics Pose Massive Risks to Human Lives, Global Economic Security By Published On :: Wed, 13 Jan 2016 06:00:00 GMT Infectious disease outbreaks that turn into epidemics or pandemics can kill millions of people and cause trillions of dollars of damage to economic activity, says a new report from the international, independent Commission on a Global Health Risk Framework for the Future. Full Article
security New Report Informs Social Security’s Process for Determining Whether Beneficiaries Are Capable of Managing Their Benefits By Published On :: Wed, 09 Mar 2016 06:00:00 GMT The best indicator of whether a disabled adult who receives Social Security benefits is capable of managing his or her benefits is evidence of real-world performance of meeting his or her own basic needs, rather than an office-based assessment of financial competence, says a new report from the National Academies of Sciences, Engineering, and Medicine. Full Article
security NAS President Marcia McNutt’s Statement on Obama’s Memorandum on Climate Change and National Security By Published On :: Wed, 21 Sep 2016 05:00:00 GMT Today President Obama signed a Presidential Memorandum to address climate change and national security. The National Academies of Sciences, Engineering, and Medicine look forward to taking the lead in engaging the academic community in efforts to guide this initiative, and are well-positioned to tap the broad, multidisciplinary expertise of researchers across the nation. Full Article
security New Report Recommends Priority Actions to Achieve Global Health Security, Protect U.S. Position as Global Health Leader By Published On :: Mon, 15 May 2017 05:00:00 GMT A new report from the National Academies of Sciences, Engineering, and Medicine identifies global health priorities in light of current and emerging challenges and makes 14 recommendations for the U.S. government and other stakeholders to address these challenges, while maintaining U.S. status as a world leader in global health. Full Article
security Policies Governing Dual-Use Research in the Life Sciences Are Fragmented - Most Scientists Have Little Awareness of Issues Related to Biosecurity By Published On :: Thu, 14 Sep 2017 05:00:00 GMT A new report from the National Academies of Sciences, Engineering, and Medicine examines policies and practices governing dual-use research in the life sciences – research that could potentially be misused to cause harm – and its findings identify multiple shortcomings. Full Article
security New Report Examines Factors Used in Social Security’s Process for Determining Disability in Adults By Published On :: Thu, 01 Mar 2018 06:00:00 GMT A new report from the National Academies of Sciences, Engineering, and Medicine examines to what extent and in which ways health care utilization -- such as in-patient hospitalizations, emergency department use, and hospital readmission -- reflects disease severity, disability, and ability to perform gainful activity. Full Article
security Study Committee Members Brief Congress on Election Security By Published On :: Wed, 26 Jun 2019 04:00:00 GMT As jurisdictions around the nation explore how to shore up their voting systems against vulnerabilities revealed by the 2016 election, Congress held a hearing yesterday to learn more about cyberthreats and options for thwarting them. Full Article
security Paid Parental Leave, Increased Support for Caregivers, Improved Food and Economic Security Among Recommendations in New Report on Achieving Health Equity for All Children By Published On :: Thu, 25 Jul 2019 04:00:00 GMT The lack of supportive policies for families in the United States, such as paid parental leave, has serious implications for health equity, as it affects families’ overall health and financial stability, says a new report from the National Academies of Sciences, Engineering, and Medicine. Full Article
security U.S. Bioeconomy Is Strong, But Faces Challenges - Expanded Efforts in Coordination, Talent, Security, and Fundamental Research Are Needed By Published On :: Tue, 14 Jan 2020 05:00:00 GMT The U.S. is a clear leader in the global bioeconomy landscape, but faces challenges from decentralized leadership, inadequate talent development, cybersecurity vulnerabilities, stagnant investment in fundamental research, and international competition, according to Safeguarding the Bioeconomy, a new report from the National Academies of Sciences, Engineering, and Medicine. Full Article
security NASA, Teamed with FAA, Industry, and Academia, Should Research Effects of Increased Drone Traffic on Privacy, the Environment, and Cybersecurity By Published On :: Wed, 19 Feb 2020 05:00:00 GMT NASA should collaborate with the Federal Aviation Administration (FAA), industry, academia to research the full effects that increased unpiloted air vehicle traffic would have on society, including ramifications to sound, privacy, environmental matters, and cybersecurity, says a new report from the National Academies of Sciences, Engineering, and Medicine. Full Article
security DOE Plan to Dilute and Dispose of Surplus Plutonium at New Mexico Site Technically Viable if Security, Execution, Other Challenges Are Addressed, Says New Report By Published On :: Thu, 30 Apr 2020 04:00:00 GMT The U.S. Department of Energy’s plan to dilute and dispose of 34 metric tons of surplus plutonium in the Waste Isolation Pilot Plant (WIPP) in New Mexico is technically viable, provided that the plan’s implementation challenges and system vulnerabilities are resolved. Full Article
security Co-Chairs Appointed to Lead New National Science, Technology, and Security Roundtable By Published On :: Thu, 15 Oct 2020 04:00:00 GMT Maria T. Zuber, John C. Gannon, and Richard A. Meserve will serve as co-chairs of a newly launched National Science, Technology, and Security Roundtable convened by the National Academies of Sciences, Engineering, and Medicine. Full Article
security Electric Grid of the Future Should Prioritize Sustainability, Resiliency, Equity, Reliability, and Security, Says New Report By Published On :: Thu, 25 Feb 2021 05:00:00 GMT A new congressionally mandated report from the National Academies of Sciences, Engineering, and Medicine provides comprehensive recommendations for improving the U.S. electric power system so that it can adequately provide electricity to the nation in a safe, reliable, clean, resilient, and equitable way, especially as the U.S. pursues decarbonization of the energy supply. Full Article
security Use of Radioactive Materials in Commercial Applications Has Increased by 30 Percent - Government Should Improve Security and Support Development of Alternatives, Says New Report By Published On :: Mon, 14 Jun 2021 04:00:00 GMT The use of high-risk radioactive materials in medical, research, and commercial applications has increased by about 30 percent in the U.S. in the last 12 years, and the government should improve security, tracking, and accountability to reduce health and security risks — while also supporting the development of nonradioactive alternatives to replace them — says a new report from the National Academies of Sciences, Engineering, and Medicine. Full Article
security New Report Charts Path Forward for FAA’s Cybersecurity Workforce By Published On :: Mon, 21 Jun 2021 04:00:00 GMT Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration, a new report from the National Academies of Sciences, Engineering, and Medicine, charts a path forward for creating and maintaining a cybersecurity workforce at FAA that can meet the challenges of a highly competitive cybersecurity labor market and a wave of future retirements. Full Article
security Deficient Facilities Adversely Affect National Institute of Standards and Technology’s Mission, With Economic, National Security, and Safety Impacts, Says New Report By Published On :: Tue, 07 Feb 2023 05:00:00 GMT The National Institute of Standards and Technology’s facilities should be modernized to ensure that the agency can continue to deliver measurement science and standards that advance U.S. innovation and competitiveness on national technology priorities. Substandard facilities brought about through lack of investment have created ongoing problems that affect research. Full Article
security National Nuclear Security Administration Cannot Continue With ‘Business as Usual’ in the Shifting Supercomputing Landscape, Says New Report By Published On :: Thu, 13 Apr 2023 04:00:00 GMT The National Nuclear Security Administration needs to fundamentally rethink the strategy for its next generation of high-performance computing and cannot continue with ‘business as usual’ through shifting technical and geopolitical landscapes. Advanced computing capabilities help the NNSA ensure that the U.S. maintains a safe, secure, and reliable nuclear stockpile. Full Article
security Untangling the hiring dilemma: How security solutions free up HR processes By www.welivesecurity.com Published On :: Tue, 21 May 2024 09:30:00 +0000 The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum? Full Article
security The who, where, and how of APT attacks – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 17 May 2024 16:09:11 +0000 This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape Full Article
security Beyond the buzz: Understanding AI and its role in cybersecurity By www.welivesecurity.com Published On :: Tue, 28 May 2024 09:30:00 +0000 A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders Full Article
security Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 24 May 2024 13:11:17 +0000 As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond? Full Article
security What happens when facial recognition gets it wrong – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 31 May 2024 13:45:32 +0000 A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability Full Article
security 560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 07 Jun 2024 14:04:40 +0000 Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data Full Article
security WeLiveSecurity wins Best Cybersecurity Vendor Blog award! By www.welivesecurity.com Published On :: Mon, 10 Jun 2024 15:19:06 +0000 The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity! Full Article
security How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 14 Jun 2024 11:58:03 +0000 The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app Full Article
security The long-tail costs of a data breach – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 21 Jun 2024 11:54:09 +0000 Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents Full Article
security Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 28 Jun 2024 13:13:12 +0000 Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year Full Article
security Social media and teen mental health – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Thu, 04 Jul 2024 14:31:24 +0000 Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick? Full Article
security Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4) By www.welivesecurity.com Published On :: Wed, 10 Jul 2024 09:30:00 +0000 As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds? Full Article
security Should ransomware payments be banned? – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 12 Jul 2024 12:30:20 +0000 Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective? Full Article
security The complexities of cybersecurity update processes By www.welivesecurity.com Published On :: Fri, 19 Jul 2024 12:28:24 +0000 If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike Full Article
security How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Sun, 21 Jul 2024 07:24:11 +0000 A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats Full Article
security Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 26 Jul 2024 11:57:23 +0000 Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files Full Article
security AI and automation reducing breach costs – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 02 Aug 2024 11:30:15 +0000 Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies Full Article
security Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies By www.welivesecurity.com Published On :: Thu, 08 Aug 2024 14:40:36 +0000 Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards Full Article
security Black Hat USA 2024: All eyes on election security By www.welivesecurity.com Published On :: Fri, 09 Aug 2024 13:07:56 +0000 In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated Full Article
security Black Hat USA 2024 recap – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 09 Aug 2024 13:53:46 +0000 Unsurprisingly, many discussions revolved around the implications of the CrowdStrike outage, including the lessons it may have offered for bad actors Full Article
security How a BEC scam cost a company $60 million – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 16 Aug 2024 11:01:54 +0000 Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme Full Article
security Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5) By www.welivesecurity.com Published On :: Mon, 26 Aug 2024 09:00:00 +0000 The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure Full Article
security PWA phishing on Android and iOS – Week in security with Tony Anscombe By www.welivesecurity.com Published On :: Fri, 23 Aug 2024 09:00:00 +0000 Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security Full Article
security Stealing cash using NFC relay – Week in Security with Tony Anscombe By www.welivesecurity.com Published On :: Wed, 28 Aug 2024 14:01:52 +0000 The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become Full Article