Search Results for
POS
Health Data of 5 Million Americans Freely Accessible Online
Personal details of approximately 5 million U.S. residents that include security information are sitting readily available for anyone.
Fraud with a deepfake: the dark side of artificial intelligence
A cybercriminal has used deepfake technology to scam an Energy company out of €220,000 in a fraud that began back in March.
What is Alexa and how does she work?
Personal assistant? Entertainer? Shopping guide? Home automation hub? Amazon Alexa is all these things and more. Take a look at how she works.
Operation reWired: 281 BEC scammers arrested worldwide
Operation reWired, a joint effort between international law enforcement agencies led to the arrest of 281 people charged with carrying out BEC scams.
Internet Explorer and Microsoft Defender: vulnerable to RCE attacks
On September 23, Microsoft launched an urgent update for Internet Explorer to fix a critical vulnerability that is being exploited by cybercriminals.
How Endpoint Detection and Response gave rise to Threat Hunting
Rather than reactively responding to malware threats, our security analysts are actively engaging in Threat Hunting looking for new threats.
Should you ditch charging cables?
New smartphones now support wireless charging – should you dump your old charging cables? We take a closer look and the advantages and disadvantages.