Tag: Mainstream
-
AI in the Wild: Malicious Applications of Mainstream AI Tools
No doubt about it, it’s frightening to hear a loved one in distress, but try to stay as calm as possible if you receive a phone call …
-
#InfosecurityEurope2022 Defense Looks to Bring Cyber Into the Mainstream
Cybersecurity will continue to grow in importance for defense even if “cyber armageddon” has not yet happened, according to one of the …
-
2022: The Year Zero Trust Becomes Mainstream
It has never been more important for organizations of all sizes to prioritize securing their users and their infrastructure secrets with …
-
FIDO Alliance Research Tracks Passwordless Authentication as It Moves Mainstream
New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authentication …
-
Cybercrime Goes Mainstream
The World Economic Forum’s 2020 “Global Risks 2020” report notes that the digital space is characterized by growing geopolitical tensions …
-
Active Directory Attacks Hit the Mainstream
Understanding the limitations of authentication protocols like NTLM, Kerberos, and SAML — especially as enterprises link authentication …
-
Destructive Malware Goes Mainstream as Attacks Soar 200%
The volume of destructive malware attacks has risen by 200% year-on-year in the first half of 2019, according to new data from IBM X-Force. …
-
The Year Targeted Phishing Went Mainstream
A story published here on July 12 about a new sextortion-based phishing scheme that invokes a real password used by each recipient has …
-
Ethereum: The Platform That Brings Blockchain Into the Mainstream
Ethereum was an invention by Vitalik Buterin. He introduced this open-source blockchain platform in a 2013 white …
-
Why Data Classification Has Gone Mainstream
Driven by the EU’s General Data Protection Regulation and other regulations, as well as the move to the cloud, more organizations are …
-
Blockchain Technology: Five Obstacles To Mainstream Adoption
I’m a strong believer in the potential of blockchain technologies. The concept of providing trust using a distributed network rather than …
-
Critical Remote Code Execution on all Mainstream LG Smartphone Models
Multiple Critical vulnerabilities patched by LG that resides on default keyboard on all mainstream LG smartphone models. Both the …
●●●