Top Blogs of 2017: Fraudsters, Data Breaches, and All Things Voice
Last year, the phone channel experienced a variety of advancements and setbacks, from an additional spike in call center fraud to the discovery of mass
Last year, the phone channel experienced a variety of advancements and setbacks, from an additional spike in call center fraud to the discovery of mass
Call center criminals are becoming increasingly sophisticated in order to maneuver around authentication and security measures, granting them access to sensitive information. It is evident
Researchers have developed a new attack against Bluetooth-enabled devices that takes advantage of the fact that these devices are always listening for connections and can
It would seem that data breaches have now reached their logically absurd peak. The compromise of Equifax, revealed last Thursday evening, is the kind of
A vulnerability in nearly all of the current versions of Android can be used by attackers to execute an overlay attack to trick users into
Researchers have developed a method for sending human-inaudible ultrasonic voice commands to voice-enabled assistants such as Alexa, Siri, and Google Assistant that could be used
A severe remote code execution vulnerability has been sitting unnoticed in the Apache Struts web-app development framework for nine years, a flaw that researchers say
The adware attack campaign that was spreading through Facebook Messenger late last month was enabled by the use of fake Chrome extensions and also stole
Police in Ukraine have arrested a 51-year-old man in connection with spreading the notorious Petya ransomware earlier this summer. In their statement, the Ukraine Cyberpolice