searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Video: How to spot deep-faked candidates during interviews

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

2021-42 Pondurance

Get our top stories in your inbox

M1_03

July 21, 2021

W1_3_bon

July 19, 2021

W1_01_02

July 8, 2021

M1_02

July 8, 2021

M1_01

June 24, 2021

Featured news

  • August 2022 Patch Tuesday forecast: Printers again?
  • Risk astute leadership: Converting intelligence into actionable controls
  • MI-X: Open source project helps you understand whether you are exploitable
eBook: Privileged Access Management for Dummies

What's new

August 2022 Patch Tuesday forecast: Printers again?

New infosec products of the week: August 5, 2022

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Don't miss

August 2022 Patch Tuesday forecast: Printers again?

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real-time

6 ways your cloud data security policies are slowing innovation – and how to avoid that

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
  • Ransomware gangs are hitting roadblocks, but aren’t stopping (yet)
  • Cyberattack prevention is cost-effective, so why aren’t businesses investing to protect?

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise