The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
In the coming decades, artificial intelligence (AI) and machine learning technologies are going to transform many aspects of our world. […]
In the coming decades, artificial intelligence (AI) and machine learning technologies are going to transform many aspects of our world. […]
As cyber criminals concentrate on targeted, strategic, money-making attacks, they are likely to use GDPR fines as leverage to extort […]
A common objective of every European national cyber security strategy is collaboration to enhance cyber security across all levels, from […]
The OCR’s January 2018 newsletter details specific types of cyber extortion that healthcare organizations are currently encountering, including ransomware, denial […]
A recently discovered flaw in how macOS handles screenshot data could be used to spy on users and what they […]
Digital security firm Gemalto last month released its “2018 Global Cloud Data Security Study” report, commissioning the Ponemon Institute to […]
Cyberattacks are on the rise, with over 1,000 data breaches occurring at U.S. organizations in 2016 alone, most often through […]
In late July, Snap’s director of engineering emailed the company’s team in response to an unfolding privacy threat. A government […]
Cyberattacks are on the rise, with over 1,000 data breaches occurring at U.S. organizations in 2016 alone, most often through […]
There’s a chance your computer or phone is quietly producing a cryptocurrency called Monero. Criminals looking to commandeer massive processing power […]
Two Russian hackers who were key players in one of the largest, most brazen data breaches involving the theft of […]
CEOs, not chief information officers (CIOs), should be making the call on whether to report a data breach when a […]