Using AI to Combat Healthcare Fraud
AI continues to attract attention in almost every field. Since the release of ChatGPT, we’ve been caught in a race to introduce AI in every
3 Mysteries About Deepfakes and What Your Company Can Do About It
Pindrop recently hosted a webinar on Voice Theft and How Audio Deepfakes Are Comprising Security on Tuesday, March 5th. Top C-suite execs from Pindrop shared
Testing authentication systems against deepfake vulnerabilities at Top Tier US Bank
Voice biometric authentication systems were neither designed nor operationalized to protect against the sophisticated deepfakes attacking call centers today. It’s paramount that every call center
View by category
Popular Blogs
Russian Convicted in $169M PoS Malware Scheme
A Russian man, who is the son of a politician in Russia, has been convicted of more than three dozen counts stemming from a point-of-sale
Opera Warns of Compromise of Password Sync Service
The makers of the Opera browser said attackers have compromised the servers that are used to house the data from users of Opera’s sync system,
Phone Scammers Target Immigrants in New Campaigns
Phone scams come in all shapes and sizes, and there are several new schemes that are targeting immigrants with demands for payments to maintain or
Mozilla Releases Observatory Site-Security Scanner
Mozilla has released a new tool called Observatory that site owners can use to scan their sites and assess their implementation of various security technologies, from
Apple Fixes Three iOS Zero Days Used in Targeted Attack
Apple has patched three critical vulnerabilities in iOS that were identified when an attacker targeted a human rights activist in the UAE with an exploit chain
Lieu Presses FCC to Speed Up Investigation Into SS7 Flaw
The FCC is four months into its investigation into security issues with the SS7 phone protocol, and a key member of Congress is pushing for
On the Wire Podcast: Jon Oberheide and Mikhail Davidov
It’s not often that we get to talk to someone who has launched something into space, but this week we had the chance to speak
New Sweet32 Attack Hits Blowfish, 3DES
Researchers have developed a practical, relatively fast attack on 64-bit block ciphers that can allow attackers to recover authentication cookies as well as other credentials
Google to Punish the Use of Some Interstitials on Mobile Sites
Google is making a significant change to the way that it handles page ranking for mobile sites in an effort to discourage site owners from
Snowden’s Long Shadow Darkens NSA’s Reputation
The massive data dump by the Shadow Brokers has become a kind of fun house mirror for the security industry. People come at it with