Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists.
Read moreMachine learning models are immune to blandishments, threats, flattery and so - so why not set them against social engineers?
Read moreGoogle Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.
Read moreGoogle Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.
Read moreApproaches based on questionnaires and self-evaluation are not always a good indicator of how well a user can mitigate social engineering threats.
Read moreDHS CISA's Christopher Krebs and Georgetown University's Matt Blaze at Black Hat USA give the lowdown on where things stand so far and what still needs to happen before...
Read moreWhere Dark Reading Goes Next
August 6 2020Dark Reading Editor-in-Chief gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and...
Read moreOn ‘Invisible Salamanders’ and Insecure Messages
August 6 2020Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.
Read moreExploiting Google Cloud Platform With Ease
August 6 2020Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.
Read moreFrom Russia's "best-in-class" efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.
Read more
Recent Comments