Do you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat as AI inaugurates the deepfake era of impersonation scams.
Having trouble getting your message across? Banning these buzzwords may help.
Security startup Cymmetria has put together a tool and a framework to help security defenders hack back legally as part of incident response activities.
Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.
ICANN has postponed the deadline for updating name servers with the new root zone key signing key to early 2018 because too many ISPs and network operators are not ready, and that would cause DNSSEC validations to fail.
The scariest thing about BlueBorne, the attack vector that uses Bluetooth to spread across devices, isn't what it can do, but rather just how many similar vulnerabilities may be lurking that we don't yet know about.
Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?
You can reduce potential damage by paying attention to when attackers are most likely to strike.