Fraud with a deepfake: the dark side of artificial intelligence
A cybercriminal has used deepfake technology to scam an Energy company out of €220,000 in a fraud that began back in March.
What is Alexa and how does she work?
Personal assistant? Entertainer? Shopping guide? Home automation hub? Amazon Alexa is all these things and more. Take a look at how she works.
Operation reWired: 281 BEC scammers arrested worldwide
Operation reWired, a joint effort between international law enforcement agencies led to the arrest of 281 people charged with carrying out BEC scams.
Internet Explorer and Microsoft Defender: vulnerable to RCE attacks
On September 23, Microsoft launched an urgent update for Internet Explorer to fix a critical vulnerability that is being exploited by cybercriminals.
Smart camera privacy – what you need to know
Smart cameras are very handy and make the life of parents easier– but you must take care to ensure that they are protected from criminals.
How Endpoint Detection and Response gave rise to Threat Hunting
Rather than reactively responding to malware threats, our security analysts are actively engaging in Threat Hunting looking for new threats.
Should you ditch charging cables?
New smartphones now support wireless charging – should you dump your old charging cables? We take a closer look and the advantages and disadvantages.