Making Sure Lost Data Stays Lost
May 13 2023Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
Read moreRetired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
Read moreDubbed "ChattyGoblin," the China-backed actors use chatbots to scam Southeast Asian gambling companies.
Read moreThe Technology Innovation Institute’s year-long cryptographic challenge invites participants to assess concrete hardness of McEliece public-key encryption scheme.
Read moreNot just an active adversary, but a two-faced one, too.
Read moreOne long-awaited security move caused a ripple effect in the cybercrime ecosystem.
Read moreTed Chiang has an excellent essay in the New Yorker: “Will A.I. Become the New McKinsey?”
The question we should be asking is: as A.I. becomes more powerful and...
Read more
Regulators should apply a healthy skepticism to generative AI developments to guarantee a competitive marketplace.
Read moreBlack Hat Asia's NOC team gives a look inside what's really happening on the cyberfront during these events.
Read moreAs a way to enhance the security of MFA, Microsoft will require users to authorize login attempts by entering a numeric code into the Microsoft Authenticator app.
Read moreNew data shows cyberattacks targeting software supply chains will cost the global economy $80.6 billion annually by 2026.
Read more
Recent Comments