Dark Reading

EU-US Privacy Shield Dissolution: What Happens Next?

In a world that isn't private by design, security, and liability implications for US-based cloud companies are huge.

Developers Need More Usable Static Code Scanners to Head Off Security Bugs

As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.

Researchers Trick Facial-Recognition Systems

At Black Hat USA 2020, McAfee researchers showed how they were able to successfully trick a facial-recognition system into misclassifying one individual as an entirely different person.

How to Help Spoil the Cybercrime Economy

Cybercrime increasingly is turning into a commodity. Stolen PII data and hijacked cloud accounts especially propel the spread, research shows.

Gamifying Password Training Shows Security Benefits

When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of researchers find.

Hacking It as a CISO: Advice for Security Leadership

The idea of "selling information security" is the area where security leaders struggle most, said Peter Keenan, CISO of a financial services company, in a DEF CON talk.

Digital Clones Could Cause Problems for Identity Systems

Three fundamental technologies - chatbots, audio fakes, and deepfake videos - have improved to the point that creating digital, realtime clones of people is merely a matter of integrating the systems.

Researcher Finds New Office Macro Attacks for MacOS

In most of the macro-based attacks, human intervention on the part of the victim is required at least once, and usually twice.

BEC Campaigns Target Financial Execs via Office 365

A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.

Researchers Create New Framework to Evaluate User Security Awareness

Researchers at Israel's Ben-Gurion University (BGU) have developed a framework for continuously evaluating the resilience of end users to phishing and similar social engineering attacks.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags