searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Video: How to spot deep-faked candidates during interviews

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Week in review

Get our top stories in your inbox

Week in review: Hacking intelligent buildings, trust in critical systems under attack

April 2, 2018

Here’s an overview of some of last week’s most interesting news and articles: The current state of USB data protection The vast majority of employees rely on USB …

Week in review: PKI and IoT, Facebook’s trust crisis, understanding email fraud

March 25, 2018

Here’s an overview of some of last week’s most interesting news and articles: Top cybersecurity evasion and exfiltration techniques used by attackers SS8 released …

Week in review: Big data and insurance, wireless standards hackers will target after Wi-Fi

March 18, 2018

Here’s an overview of some of last week’s most interesting news and articles: Malicious activity surges coincide with geopolitical events 2017 was a year of …

Week in review: New LTE attacks, Android P security, backdooring connected cars

March 11, 2018

Here’s an overview of some of last week’s most interesting news and articles: How to improve your security infrastructure when you’re on a budget You may not be …

Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE

March 4, 2018

Here’s an overview of some of last week’s most interesting news and articles: Automating out of the skill gap sinkhole When thinking about the bigger picture, …

Week in review: Hidden cybersecurity talent, the myths hampering cybersecurity maturity

February 25, 2018

Here’s an overview of some of last week’s most interesting news and articles: Counterfeit digital certificates for sale on underground forums Researchers have …

Week in review: Vulnerability tracking, GDPR quick guide, tackling the insider threat

February 18, 2018

Here’s an overview of some of last week’s most interesting news and articles: Intel offers to pay for Spectre-like side channel vulnerabilities Intel is expanding …

Week in review: Crypto-mining malware hits SCADA network, server-side exploits dominate threat landscape

February 11, 2018

Here’s an overview of some of last week’s most interesting news and articles: When crypto-mining malware hits a SCADA network Radiflow has recently discovered …

Week in review: The future of smartphone security, automated cyber threat anticipation

February 4, 2018

Here’s an overview of some of last week’s most interesting news and articles: Authentication today: Moving beyond passwords A new global study from IBM Security …

Week in review: Intel testing new Spectre fixes, ICO protection, cybercrooks abusing travel industry

January 28, 2018

Here’s an overview of some of last week’s most interesting news, articles, and whitepapers: British teenager hacked top ranking US officials using social …

Week in review: DoS attacks against hard disk, ethical hacking, and the rise of ransom hacks

January 21, 2018

Here’s an overview of some of last week’s most interesting news and articles: Norwegian health authority hacked, patient data of nearly 3 million citizens possibly …

Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection

January 14, 2018

Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs …

Posts navigation

1 … 15 16 17 18 19 20 21 22 23 … 49

Featured news

  • Stratus Red Team: Open-source tool for adversary emulation in the cloud
  • August 2022 Patch Tuesday forecast: Printers again?
  • Risk astute leadership: Converting intelligence into actionable controls
eBook: Privileged Access Management for Dummies

What's new

August 2022 Patch Tuesday forecast: Printers again?

New infosec products of the week: August 5, 2022

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Don't miss

Stratus Red Team: Open-source tool for adversary emulation in the cloud

Cyberattacks on healthcare organizations negatively impact patient care

August 2022 Patch Tuesday forecast: Printers again?

Risk astute leadership: Converting intelligence into actionable controls

MI-X: Open source project helps you understand whether you are exploitable

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
  • Ransomware gangs are hitting roadblocks, but aren’t stopping (yet)
  • Cyberattack prevention is cost-effective, so why aren’t businesses investing to protect?

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise