searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Video: How to spot deep-faked candidates during interviews

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

coronavirus

Get our top stories in your inbox

Cybercriminals are developing and boosting their attacks

August 6, 2020

An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments …

As personal use of managed devices becomes ubiquitous, risks increase

August 5, 2020

Netskope analyzed the most interesting trends on enterprise cloud service and app use, web and cloud-enabled threats, and cloud data migrations and transfers. Based on …

Many companies have not taken basic steps to protect their remote workforce

August 5, 2020

New research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

Analysis of 92 billion rejected emails uncovers threat actors’ motivations

August 4, 2020

Mimecast released the Threat Intelligence Report: Black Hat U.S.A. Edition 2020, which presents insights gleaned from the analysis of 195 billion emails processed by Mimecast …

The pandemic had a negative impact on data center operations

August 4, 2020

The effects of the COVID-19 pandemic have resulted in a negative impact on organizations’ ability to manage their storage infrastructures in order to ensure continued access …

The COVID-19 pandemic and its impact on cybersecurity

August 3, 2020

The COVID-19 pandemic has presented a once-in-a-lifetime opportunity for hackers and online scammers, and cybersecurity pros saw a 63 percent increase in cyber-attacks related …

How well do face recognition algorithms identify people wearing masks?

July 28, 2020

Now that so many of us are covering our faces to help reduce the spread of COVID-19, how well do face recognition algorithms identify people wearing masks? The answer, …

The future of work: 74% believe they will emerge stronger

July 24, 2020

While much has been written about the immediate pandemic-related challenges, it’s important to apply the lessons learned as many prepare for the future of work. With …

27% of consumers hit with pandemic-themed phishing scams

July 24, 2020

Phishing is the top digital fraud scheme worldwide related to the COVID-19 pandemic, TransUnion reveals. Among consumers reporting being targeted with digital COVID-19 schemes …

IT teams failing to deliver a positive remote employee experience

July 24, 2020

Conducted during the coronavirus pandemic, 1E unveils the findings of an analysis of the remote employee experience and the digital workplace in 2020. Vanson Bourne and 1E …

Closing the skills gap can minimize the business impact of cyberattacks

July 23, 2020

CISOs who are successful at reducing or closing the critical skills gap have the highest probability of minimizing the business impact of cyberattacks – even when budgets and …

20,000+ new vulnerability reports predicted for 2020, shattering previous records

July 22, 2020

Over 9,000 new vulnerabilities have been reported in the first six months of 2020, and we are on track to see more than 20,000 new vulnerability reports this year — a new …

Posts navigation

1 … 23 24 25 26 27 28 29 30 31 … 38

Featured news

  • August 2022 Patch Tuesday forecast: Printers again?
  • Risk astute leadership: Converting intelligence into actionable controls
  • MI-X: Open source project helps you understand whether you are exploitable
eBook: Privileged Access Management for Dummies

What's new

August 2022 Patch Tuesday forecast: Printers again?

New infosec products of the week: August 5, 2022

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Don't miss

Cyberattacks on healthcare organizations negatively impact patient care

August 2022 Patch Tuesday forecast: Printers again?

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real-time

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
  • Ransomware gangs are hitting roadblocks, but aren’t stopping (yet)
  • Cyberattack prevention is cost-effective, so why aren’t businesses investing to protect?

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise