or

National Nuclear Security Administration Cannot Continue With ‘Business as Usual’ in the Shifting Supercomputing Landscape, Says New Report

The National Nuclear Security Administration needs to fundamentally rethink the strategy for its next generation of high-performance computing and cannot continue with ‘business as usual’ through shifting technical and geopolitical landscapes. Advanced computing capabilities help the NNSA ensure that the U.S. maintains a safe, secure, and reliable nuclear stockpile.




or

Policy Impact and Future Directions for Behavioral Economics — New Report

A new National Academies report highlights how behavioral economics has built invaluable evidence about why people may act in seemingly irrational ways, how they respond to interventions, and how public policy can be designed to help people make better decisions.




or

Statement on New York Times Article Regarding Sackler Family Donations to NAS

The news article suggests that the donations from the Sacklers presented a conflict of interest for the National Academies’ studies on chronic pain, opioid use, and ways to combat the opioid epidemic. The Sackler funds were never used to support an advisory study on these issues.




or

U.S. Should Begin Laying the Foundation for New and Advanced Nuclear Reactors, Says New Report

New nuclear reactor concepts could help the U.S. meet its long-term climate goals, but a range of technical, regulatory, economic, and societal challenges must first be overcome. A new report provides recommendations to start laying the foundation required for advanced reactors to become a viable part of the U.S. energy system.




or

Reports & Events Monthly Calendar - May 2023




or

Gaps in the Systems That Support NIH-Funded Research Using Nonhuman Primates Are Undermining U.S. Biomedical Research and Public Health Readiness, Says New Report

Research funded by NIH that uses nonhuman primates is critical to the nation’s ability to respond adequately to public health emergencies and carry out high-impact biomedical research, but gaps in the systems that support research using these animal models are undermining national health emergency readiness.




or

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings




or

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?




or

ESET World 2024: Big on prevention, even bigger on AI

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.




or

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?




or

The murky world of password leaks – and how to check if you’ve been hit

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look




or

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data




or

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!




or

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023




or

Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack




or

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat




or

My health information has been stolen. Now what?

As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records




or

ESET Threat Report H1 2024

A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts




or

Buying a VPN? Here’s what to know and look for

VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes




or

No room for error: Don’t get stung by these common Booking.com scams

From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation




or

AI in the workplace: The good, the bad, and the algorithmic

While AI can liberate us from tedious tasks and even eliminate human error, it's crucial to remember its weaknesses and the unique capabilities that humans bring to the table




or

HotPage: Story of a signed, vulnerable, ad-injecting driver

A study of a sophisticated Chinese browser injector that leaves more doors open!




or

Hello, is it me you’re looking for? How scammers get your phone number

Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters.




or

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos




or

Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe

Attackers abusing the EvilVideo vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files




or

Top 6 Craigslist scams: Don’t fall for these tricks

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun




or

Be careful what you pwish for – Phishing in PWA applications

ESET analysts dissect a novel phishing method tailored to Android and iOS users




or

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with




or

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




or

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors




or

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options




or

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics




or

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia




or

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?




or

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry




or

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year




or

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.




or

ESET APT Activity Report Q2 2024–Q3 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024




or

Jane Goodall: Reasons for hope | Starmus highlights

The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity




or

Figures for Dark Mode

Jiro's Pick this week is dark mode plot by Natan.Do you work in dark mode? If you do, you need to take a look at this entry by Natan, especially if you make presentations using the dark theme. As you... read more >>




or

Bouncing Rod Simulator

Jiro's Pick this week is Bouncing Rod Simulator by Matthew Sheen.As a mechanical engineer, I love simulating physical phenomena. When you have equations of motion, you can easily simulate them in... read more >>




or

MCmatlab: A Monte Carlo simulation for photon transport in 3D voxel space

Today, I am inviting Temo, who is from the academic discipline marketing team, and he looks after the physics discipline. He will share his Pick from the field of optics.This week's Pick is MCmatlab... read more >>




or

Report says over 700 million active internet users in India as of December 2022

The active internet user base aged 12 years and older has grown more than 20% year-on-year to reach 595 million in 2022.




or

Airtel upgrading infrastructure to support digital transformation in India: Ajay Chitkara

“Earlier, there used to be the largest companies who were there to solve the customers’ problems. But now there are hundreds of startups that are coming up. We need to make sure we work together with them and build an ecosystem with them. We share with them our issues, and they come back and build the products with us together. And then we help them scale,” he said.




or

TRAI suggests MIB to design a suitable PLI scheme for STB manufacturing

The Telecom Regulatory Authority of India (TRAI) has recommended that linear set-top boxes (STBs) be included in the PLI scheme to promote local manufacturing in the television broadcasting sector. The TRAI has also suggested conducting periodic reviews of indigenous components, factoring in local components in determining localisation levels under the PLI scheme, and reviewing investment outlays required for MSME manufacturing for selected equipment.




or

Unlocking digital transformation goals for Indian enterprises with 5G

Recently, India's Hon’ble Prime Minister, Narendra Modi, inaugurated the 5G service, affirming that "India will lead the Industry 4.0 revolution with 5G at the helm." Commenting on this technology, certain experts predicted that by 2035, 5G will have a cumulative economic impact of US$ 1 trillion, and between 2025 and 2040, it could deliver an additional GDP of US$ 150 billion for the country. This aligns with India's vision of becoming a US$ 5 trillion economy by 2025.




or

HCLTech launches 5G testing, validation lab in Chennai for telecom OEMs

HCLTech said the lab is scalable to test millimeter-wave (mmWave) frequency 5G infrastructure to help OEMs and telecom service providers quickly and accurately measure critical parameters.




or

Malicious IoT botnet traffic targeting telecoms networks increases 5x over 2022: Nokia

The number of IoT devices (bots) engaged in botnet-driven DDoS attacks rose from around 200,000 a year ago to approximately 1 million devices, generating more than 40% of all DDoS traffic today, according to the report.




or

Govt should allot spectrum directly to enterprises for private networks: Voice

However, telecom operators associations COAI recently said private 5G network deployments by system integrators may lead to operational inefficiencies, capital burden, and eventually prove to be counter-productive.




or

BSNL issues purchase order to TCS, ITI for 1 lakh 4G sites: Report

On Wednesday, the Union Cabinet approved the third revival package for the telecom PSU worth Rs 89,047 crores which also includes the allotment of 4G/5G spectrum through equity infusion.