Longtime AgriLife Research economist Dr. James Richardson to retire

Originator of farm simulation model used to analyze farm bills since 1980s Media contact: Blair Fannin, 979-845-2259, b-fannin@tamu.edu COLLEGE STATION – Since the mid-1980s, the simulation model developed by a…

Researchers zero in on potential therapeutic target for diabetes, associated diseases

Texas A&M-led study: ‘Novel regulatory mechanism’ may be key to intervention Writer: Paul Schattenberg, 210-859-5752, paschattneberg@ag.tamu.edu Contact: Dr. Shaodong Guo, 979-845-0850, shaodong.guo@tamu.edu COLLEGE STATION – A recent study led by…

Remotely controlled EV home chargers – the threats and vulnerabilities

We are now seeing signs of a possible shift in the field of personal transport. Recent events such as the ‘dieselgate’ scandal undermine customer and government confidence in combustion engines…

Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)

Executive summary In October 2018, our AEP (Automatic Exploit Prevention) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis led us to uncover…

Texas A&M Human Behavior Laboratory now open for business  

Writer: Laura Muntean, 979-847-9211, laura.muntean@ag.tamu.edu Contact: Dr. Marco Palma, 979-845-5284, mapalma@tamu.edu COLLEGE STATION – The Texas A&M Human Behavior Lab hosted an open house and guest lecture as part of…

Republicans should take Beto seriously. The 2020 revolution will be marketed, and he is a product. Texas Insider Report: AUSTIN, Texas — Former Rep. Robert “Beto” O’Rourke (D-TX) has been meeting…

Texas 4-Hers learn leadership, citizenship during trip to D.C.

Contact: Jana Barrett, 979-458-0910, jcbarrett@ag.tamu.edu Dr. Montza Williams, 903-834-6191, montza.williams@ag.tamu.edu WASHINGTON, D.C. – Twenty-four Texas 4-H members recently earned the opportunity to participate in the Texas 4-H Leadership Conference in…

DarkVishnya: Banks attacked through direct connection to local network

While novice attackers, imitating the protagonists of the U.S. drama Mr. Robot, leave USB flash drives lying around parking lots in the hope that an employee from the target company…

Texas Water Resources Institute to host watershed plan training

Contact: Nathan Glavy, 979-458-5915, nathan.glavy@ag.tamu.edu COLLEGE STATION – The Texas Water Resources Institute, or TWRI, will host an Implementing Watershed Plans Training Dec. 17 in College Station for watershed coordinators…

APT review of the year

What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial…

Preparing for spring planting, CEU ‘shootout’ program set Dec. 18 in Leming

Writer: Paul Schattenberg, 210-859-5752, paschattenberg@ag.tamu.edu Contact: Dale Rankin, 830-569-0034, dw-rankin@ag.tamu.edu LEMING – The Texas A&M AgriLife Extension Service in Atascosa County, in collaboration with the Atascosa Cattlemen’s Association, will present…

KoffeyMaker: notebook vs. ATM

Despite CCTV and the risk of being caught by security staff, attacks on ATMs using a direct connection — so-called black box attacks — are still popular with cybercriminals. The…

Kaspersky Security Bulletin 2018. Statistics

All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from…

Kaspersky Security Bulletin 2018. Top security stories

Introduction The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The…

First Annual Cyberwarcon

Cyberwarcon is a brand new event organized yesterday in Arlington, Virginia, and delivered eight hours of fantastic content. “CyberwarCon is a one-day conference in the Washington D.C. area focused on…

Kaspersky Security Bulletin 2018. Story of the year: miners

Cryptocurrency miners that infect the computers of unsuspecting users essentially operate according to the same business model as ransomware programs: the victim’s computing power is harnessed to enrich the cybercriminals.…

Christina Sumners: Welcome to Science Sound Off; I’m Christina Sumners, and with me today are two assistant professors from the Texas A&M College of Medicine, Robert Watson and Kristin Patrick.…

Amid industrial boom, Corpus Christi officials look to meet growing water demand

The inside of the Kay Bailey Hutchison Desalination Plant in El Paso on April 16, 2012. The facility produces 27.5 million gallons of water per day. It is the largest…

By Rachel Alexander Conservatives are bemoaning the mediocre performance Republicans had in the midterm elections. It is typical for the party in power to lose the House during the midterm elections, but…

Threat predictions for industrial security in 2019

Kaspersky Security Bulletin: Threat Predictions for 2019 Cryptocurrency threat predictions for 2019 Cyberthreats to financial institutions 2019: overview and predictions The past few years have been very intense and eventful…