Doctored vs. Deepfake: Data-Driven Clarity in Deepfake Detection
Discussions surrounding the authenticity of content and claims of AI-generated media often occur with a very low bar of scientific analysis. To help establish a
7 Call Center Trends We Expect to See Throughout 2024
Call centers have changed significantly in the past two decades, considering the sheer amount of new technologies that have been introduced. Now, we stand on
5 Tips for Improving Contact Center Productivity
A contact center’s profitability and effectiveness depend on the agents’ productivity. Historically, contact centers have been regarded as cost centers, there to support operations and
View by category
Popular Blogs
Google to Punish the Use of Some Interstitials on Mobile Sites
Google is making a significant change to the way that it handles page ranking for mobile sites in an effort to discourage site owners from
Snowden’s Long Shadow Darkens NSA’s Reputation
The massive data dump by the Shadow Brokers has become a kind of fun house mirror for the security industry. People come at it with
Google to Update Android Nougat Quarterly
As Google begins rolling out the next version of Android, called Nougat, to users this week, the company already is planning a new strategy for
Critical RNG Flaw Fixed in GnuPG
Researchers have uncovered a critical vulnerability in the GnuPG and Libgcrypt encryption apps that has been around since 1998 and allows an attacker to predict
Juniper Investigating NetScreen Exploit
Following Cisco’s lead, Juniper is now investigating the effects of the Shadow Brokers release on its products, specifically an exploit that affects the company’s NetScreen
Apple, Google, Microsoft Join Anti-Robocall Strike Force
Nearly three dozen technology companies have joined the anti-robocall strike force led by AT&T and spurred by the FCC, and the group will work together
Eddie Bauer Hit With Massive Payment System Compromise
Malware infected the point-of-sale systems in all of Eddie Bauer’s stores in the United States and Canada for more than six months this year, stealing
On the Wire Podcast: Rick Holland on the Shadow Brokers
The release by a group called Shadow Brokers of a massive amount of tools, vulnerabilities, and exploits apparently used by the Equation Group hacking team
Cisco Warns of Firewall 0-Day From Shadow Brokers Dump
The fallout from the release of a huge toolset believed to have been used by a team of NSA-linked hackers continues, as vendors have begun
DataSploit Framework Automates Intelligence Gathering for Social Engineers
Social engineering is a broad term applied to an ill-defined list of activities, and many of the techniques that criminals and white hats both use