As defensive technologies based on machine learning become increasingly numerous, so will offensive ones – whether wielded by attackers or pentesters. The idea is the same: train the system/tool with quality base data, and make it able to both extrapolate

Banking With a Selfie in Argentina ICBC, the largest bank in the world by asset volume, recently embraced facial recognition based security at its Argentinian subsidiary. The biometric security comes via FacePhi’s FIDO Certified mobile authentication platform, Selphi. ICBC customers

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event management (SIEM) solutions. These systems capture all of an enterprise’s data, logs and events in one place, and provide a

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where security specialists monitor, assess and defend against computer security issues. Introducing virtual reality (VR) and augmented reality (AR) technology into

Researchers have recently discovered a critical vulnerability affect governmental sectors such as public health systems, population registration, and justice system. The flaw resides in the secure communication protocol. Basically, the OSCI-Transport communication library which is widely used and critical to

Gamification — the process of applying game principles to real-life scenarios — is everywhere, from U.S. army recruitment to immersive cybersecurity training. Employee satisfaction and motivation can be fickle. In a job that requires both repetition and razor-sharp focus to pinpoint

Security by obscurity is real. Sucuri’s CTO found that while IPv4 servers can get compromised in minutes, IPv6 servers are safe from attack because no one is looking for them. Security company Sucuri CTO Daniel Cid recently conducted a small experiment:

Barclays has announced that its personal banking customers will, starting this week, be able to use voice security technology over passwords. This would help customers avoid the need to answer various questions over the telephone to gain access to their