Software developers, how secure is your software?

If you develop software, then a Secure Software Development Lifecycle (SSDL) process must be used starting from design, during the implementation, testing, deployment and ends when the product reaches its end of life. Do not forget also about the software…

The true numbers behind deepfake fraud

The rise of AI-generated identity fraud like deepfakes is alarming, with 37% of organizations experiencing voice fraud and 29% falling victim to deepfake videos, according to a survey by Regula. In this Help Net Security video, Henry Patishman, Executive VP…

The WhatsApp of secure computation

A key term when discussing encryption these days is end-to-end (E2E) encryption. The idea with E2E encryption is that data is kept confidential between the encryptor and the intended receiver. This might seem an obvious requirement, but not all so-called…

IT Security News Weekly Summary – Week 18

IT Security News Daily Summary 2023-05-07 Global Ransomware Attack Targets VMware ESXi Servers San Bernardino County Sheriff’s Department paid a $1.1M ransom TikTok Tracked UK Journalist via her Cat’s Account Dragon Breath’s Latest Double-Clean-App Technique Targeting Gambling Industry This New…

IT Security News Daily Summary 2023-05-07

Global Ransomware Attack Targets VMware ESXi Servers San Bernardino County Sheriff’s Department paid a $1.1M ransom TikTok Tracked UK Journalist via her Cat’s Account Dragon Breath’s Latest Double-Clean-App Technique Targeting Gambling Industry This New Android FluHorse Malware Steals Passwords &…