Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability
Published on: May 31, 2024 | Source:Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?
Published on: May 30, 2024 | Source:What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.
Published on: May 29, 2024 | Source:A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders
Published on: May 28, 2024 | Source:As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?
Published on: May 24, 2024 | Source:Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings
Published on: May 23, 2024 | Source:As AI gets closer to the ability to cause physical harm and impact the real world, βitβs complicatedβ is no longer a satisfying response
Published on: May 22, 2024 | Source:2.5 million people were affected, in a breach that could spell more trouble down the line.
Published on: August 31, 2022 | Source:Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Published on: August 30, 2022 | Source:Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Published on: August 29, 2022 | Source:Lockbit is by far this summerβs most prolific ransomware group, trailed by two offshoots of the Conti group.
Published on: August 26, 2022 | Source:Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Published on: August 25, 2022 | Source:Twitter is blasted for security and privacy lapses by the companyβs former head of security who alleges the social media giantβs actions amount to a national security risk.
Published on: August 24, 2022 | Source:CISA is warning that Palo Alto Networksβ PAN-OS is under active attack and needs to be patched ASAP.
Published on: August 23, 2022 | Source:Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
Published on: August 22, 2022 | Source:Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
Published on: August 19, 2022 | Source:An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.
Published on: August 18, 2022 | Source:One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
Published on: March 13, 2015 | Source:Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.
Published on: March 12, 2015 | Source:iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
Published on: March 10, 2015 | Source:ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.
Published on: March 09, 2015 | Source:A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
Published on: March 09, 2015 | Source:An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
Published on: March 09, 2015 | Source:There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.
Published on: March 06, 2015 | Source:In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.
Published on: March 05, 2015 | Source:A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.
Published on: March 04, 2015 | Source:A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.
Published on: March 02, 2015 | Source:The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.
Published on: February 26, 2015 | Source:Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.
Published on: February 20, 2015 | Source:Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.
Published on: February 19, 2015 | Source:A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.
Published on: February 13, 2015 | Source:After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
Published on: February 13, 2015 | Source:With Valentineβs Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.
Published on: February 12, 2015 | Source:Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.
Published on: February 12, 2015 | Source:One of the terms Iβm most often asked to explain is what a βzero dayβ vulnerability or exploit is; letβs look at what that phrase entails.
Published on: February 11, 2015 | Source: