Longtime US resident allegedly stole information for petroleum firm in China that had offered him a position. A Chinese national was arrested in the US last week for allegedly...
Read more2018: The Year Machine Intelligence Arrived in Cybersecurity
December 28 2018Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year – setting the stage for growing intelligence in security automation for 2019. Machine intelligence...
Read more2018: The Year Machine Intelligence Arrived in Cybersecurity
December 28 2018Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year – setting the stage for growing intelligence in security automation for 2019. Machine intelligence...
Read moreToxic Data: How ‘Deepfakes’ Threaten Cybersecurity
December 28 2018The joining of ‘deep learning’ and ‘fake news’ makes it possible to create audio and video of real people saying words they never spoke or things they never did....
Read moreToxic Data: How ‘Deepfakes’ Threaten Cybersecurity
December 28 2018The joining of ‘deep learning’ and ‘fake news’ makes it possible to create audio and video of real people saying words they never spoke or things they never did....
Read moreIoT Bug Grants Access to Home Video Surveillance
December 28 2018Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other’s videos. A vulnerability in the...
Read moreIoT Bug Grants Access to Home Video Surveillance
December 28 2018Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other’s videos. A vulnerability in the...
Read more6 Ways to Anger Attackers on Your Network
December 27 2018Because you can’t hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead. (Image: ls_design – stock.adobe.com) When you see an attacker on your...
Read more6 Ways to Anger Attackers on Your Network
December 27 2018Because you can’t hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead. (Image: ls_design – stock.adobe.com) When you see an attacker on your...
Read moreSpending Spree: What’s on Security Investors’ Minds for 2019
December 27 2018Cybersecurity threats, technology, and investment trends that are poised to dictate venture capital funding in 2019. The new year will bring waves of consolidation and innovation to the cybersecurity...
Read more
Recent Comments