Alternatives to facial recognition authentication
Learn the problem with facial recognition as well as software and hardware alternatives to the technology.
You're on page 30, See the latest articles on Security.
Learn the problem with facial recognition as well as software and hardware alternatives to the technology.
The new updates patch security flaws in iOS/iPadOS, macOS and Safari that could be exploited by hackers to gain remote control of an affected device.
If you're using an Apple mobile device manufactured since 2017, it has likely ditched Touch ID in favor of Face ID. Here's what you need to know about the latest Apple biometric security product.
By using a legitimate service like AWS to create phishing pages, attackers can bypass traditional security scanners, says Avanan.
Browser extensions are amazing tools but sometimes not what they pretend to be. Some are in fact malicious and might be a great risk to the user or his/her data.
The cyberespionage threat actor is aligned with Russian interests and has hit numerous organizations since 2017, aiming at stealing sensitive data.
Jack Wallen walks you through the process of deploying a Bitwarden vault server with the help of Docker containers.
TechRepublic speaks to HackerOne about how ethical hackers are helping to shrink the broader attack surface of cyber criminals.
USB-borne malware can infect your industrial equipment unless you take the proper precautions, says Honeywell.
Already three independent threat groups are using it to heavily target companies.
Sendinc lets you send encrypted messages using its own email client and third-party programs like Microsoft Outlook, Thunderbird and Gmail.
A new report from Heidrick & Struggles also finds that many feel secure in their jobs despite breaches, and only 14% of all CISOs sit on a corporate board.
Technical limitations are barriers to success but a new report finds that DevSecOps could be a game changer and will see growing market traction.
Doron Hendler, CEO and co-founder of RevealSecurity, explains the right way and the wrong way to detect malicious behavior.
Dropbox Transfer encrypts the files you share to protect them from unwanted access.