security

IT Security Ask the Experts: October, 2009

This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...




security

IT Security Ask the Experts: Top Queries for November, 2009

This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...




security

15 Major Reasons Businesses' Security Gets Compromised

In a world of ever-advancing technology and development, many company heads often get lost in the bustle and get swept up in the sea of buzzwords that happen to be popular at any given moment. They ...




security

IT Security Ask the Experts: Top Queries for December, 2009

This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...




security

IT Security Ask the Experts: Top Queries for January, 2010

This Web site was designed to be a clearing house for technical IT security queries. However, readers continue to submit a broad range of fascinating questions exploring the interface between technolo...




security

Driving IT Cost-Efficiency, Security and Compliance in 2010

On-Demand Webcast>Watch Now! SPONSORED BY: TripwireWatch this FREE on-demand webcast and hear from leading IT experts about ways organizations are leveraging technologies such as virtualizatio...




security

Information Security: Harnessing the Overlooked Source for SMB Competitive Advantage

On-Demand Webinar >  Watch Now!>>SPONSORED BY: AT&TWatch this FREE on-demand webinar to learn how to make the connections between information security and competitive success for yo...




security

Polygraph Testing Too Flawed for Security Screening

The federal government should not rely on polygraph examinations for screening prospective or current employees to identify spies or other national-security risks because the test results are too inaccurate when used this way.




security

Most Social Security Representative Payees Perform Duties Well But Changes Needed to Better Prevent and Detect Misuse of Funds

Although most people who receive and manage Social Security benefits on behalf of other individuals perform their duties well.




security

Future Pandemics Pose Massive Risks to Human Lives, Global Economic Security

Infectious disease outbreaks that turn into epidemics or pandemics can kill millions of people and cause trillions of dollars of damage to economic activity, says a new report from the international, independent Commission on a Global Health Risk Framework for the Future.




security

New Report Informs Social Security’s Process for Determining Whether Beneficiaries Are Capable of Managing Their Benefits

The best indicator of whether a disabled adult who receives Social Security benefits is capable of managing his or her benefits is evidence of real-world performance of meeting his or her own basic needs, rather than an office-based assessment of financial competence, says a new report from the National Academies of Sciences, Engineering, and Medicine.




security

NAS President Marcia McNutt’s Statement on Obama’s Memorandum on Climate Change and National Security

Today President Obama signed a Presidential Memorandum to address climate change and national security. The National Academies of Sciences, Engineering, and Medicine look forward to taking the lead in engaging the academic community in efforts to guide this initiative, and are well-positioned to tap the broad, multidisciplinary expertise of researchers across the nation.




security

New Report Recommends Priority Actions to Achieve Global Health Security, Protect U.S. Position as Global Health Leader

A new report from the National Academies of Sciences, Engineering, and Medicine identifies global health priorities in light of current and emerging challenges and makes 14 recommendations for the U.S. government and other stakeholders to address these challenges, while maintaining U.S. status as a world leader in global health.




security

Policies Governing Dual-Use Research in the Life Sciences Are Fragmented - Most Scientists Have Little Awareness of Issues Related to Biosecurity

A new report from the National Academies of Sciences, Engineering, and Medicine examines policies and practices governing dual-use research in the life sciences – research that could potentially be misused to cause harm – and its findings identify multiple shortcomings.




security

New Report Examines Factors Used in Social Security’s Process for Determining Disability in Adults

A new report from the National Academies of Sciences, Engineering, and Medicine examines to what extent and in which ways health care utilization -- such as in-patient hospitalizations, emergency department use, and hospital readmission -- reflects disease severity, disability, and ability to perform gainful activity.




security

Study Committee Members Brief Congress on Election Security

As jurisdictions around the nation explore how to shore up their voting systems against vulnerabilities revealed by the 2016 election, Congress held a hearing yesterday to learn more about cyberthreats and options for thwarting them.




security

Paid Parental Leave, Increased Support for Caregivers, Improved Food and Economic Security Among Recommendations in New Report on Achieving Health Equity for All Children

The lack of supportive policies for families in the United States, such as paid parental leave, has serious implications for health equity, as it affects families’ overall health and financial stability, says a new report from the National Academies of Sciences, Engineering, and Medicine.




security

U.S. Bioeconomy Is Strong, But Faces Challenges - Expanded Efforts in Coordination, Talent, Security, and Fundamental Research Are Needed

The U.S. is a clear leader in the global bioeconomy landscape, but faces challenges from decentralized leadership, inadequate talent development, cybersecurity vulnerabilities, stagnant investment in fundamental research, and international competition, according to Safeguarding the Bioeconomy, a new report from the National Academies of Sciences, Engineering, and Medicine.




security

NASA, Teamed with FAA, Industry, and Academia, Should Research Effects of Increased Drone Traffic on Privacy, the Environment, and Cybersecurity

NASA should collaborate with the Federal Aviation Administration (FAA), industry, academia to research the full effects that increased unpiloted air vehicle traffic would have on society, including ramifications to sound, privacy, environmental matters, and cybersecurity, says a new report from the National Academies of Sciences, Engineering, and Medicine.




security

DOE Plan to Dilute and Dispose of Surplus Plutonium at New Mexico Site Technically Viable if Security, Execution, Other Challenges Are Addressed, Says New Report

The U.S. Department of Energy’s plan to dilute and dispose of 34 metric tons of surplus plutonium in the Waste Isolation Pilot Plant (WIPP) in New Mexico is technically viable, provided that the plan’s implementation challenges and system vulnerabilities are resolved.




security

Co-Chairs Appointed to Lead New National Science, Technology, and Security Roundtable

Maria T. Zuber, John C. Gannon, and Richard A. Meserve will serve as co-chairs of a newly launched National Science, Technology, and Security Roundtable convened by the National Academies of Sciences, Engineering, and Medicine.




security

Electric Grid of the Future Should Prioritize Sustainability, Resiliency, Equity, Reliability, and Security, Says New Report

A new congressionally mandated report from the National Academies of Sciences, Engineering, and Medicine provides comprehensive recommendations for improving the U.S. electric power system so that it can adequately provide electricity to the nation in a safe, reliable, clean, resilient, and equitable way, especially as the U.S. pursues decarbonization of the energy supply.




security

Use of Radioactive Materials in Commercial Applications Has Increased by 30 Percent - Government Should Improve Security and Support Development of Alternatives, Says New Report

The use of high-risk radioactive materials in medical, research, and commercial applications has increased by about 30 percent in the U.S. in the last 12 years, and the government should improve security, tracking, and accountability to reduce health and security risks — while also supporting the development of nonradioactive alternatives to replace them — says a new report from the National Academies of Sciences, Engineering, and Medicine.




security

New Report Charts Path Forward for FAA’s Cybersecurity Workforce

Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration, a new report from the National Academies of Sciences, Engineering, and Medicine, charts a path forward for creating and maintaining a cybersecurity workforce at FAA that can meet the challenges of a highly competitive cybersecurity labor market and a wave of future retirements.




security

Deficient Facilities Adversely Affect National Institute of Standards and Technology’s Mission, With Economic, National Security, and Safety Impacts, Says New Report

The National Institute of Standards and Technology’s facilities should be modernized to ensure that the agency can continue to deliver measurement science and standards that advance U.S. innovation and competitiveness on national technology priorities. Substandard facilities brought about through lack of investment have created ongoing problems that affect research.




security

National Nuclear Security Administration Cannot Continue With ‘Business as Usual’ in the Shifting Supercomputing Landscape, Says New Report

The National Nuclear Security Administration needs to fundamentally rethink the strategy for its next generation of high-performance computing and cannot continue with ‘business as usual’ through shifting technical and geopolitical landscapes. Advanced computing capabilities help the NNSA ensure that the U.S. maintains a safe, secure, and reliable nuclear stockpile.




security

Untangling the hiring dilemma: How security solutions free up HR processes

The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?




security

The who, where, and how of APT attacks – Week in security with Tony Anscombe

This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape




security

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders




security

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?




security

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability




security

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data




security

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!




security

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app




security

The long-tail costs of a data breach – Week in security with Tony Anscombe

Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents




security

Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe

Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year




security

Social media and teen mental health – Week in security with Tony Anscombe

Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?




security

Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4)

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?




security

Should ransomware payments be banned? – Week in security with Tony Anscombe

Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective?




security

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike




security

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats




security

Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe

Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files




security

AI and automation reducing breach costs – Week in security with Tony Anscombe

Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by $2.22 million compared to those that didn't deploy these technologies




security

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards




security

Black Hat USA 2024: All eyes on election security

In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated




security

Black Hat USA 2024 recap – Week in security with Tony Anscombe

Unsurprisingly, many discussions revolved around the implications of the CrowdStrike outage, including the lessons it may have offered for bad actors




security

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme




security

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




security

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security




security

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become