Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized database.
Properly applied, artificial intelligence and machine learning could “crush” the ransomware pandemic, especially in the health sector.
Robots are a growing component of the IoT. And, like most smart devices, they have impressive features but numerous security holes
According to several reports, economic espionage by China has been declining since before an agreement 18 months ago to curb it.
While most of those systems are not directly connected to the internet, critics say there are still plenty of ways for hostile actors to get control of them
Experts describe the cyber insurance industry as “healthy and growing.” But they also say that, given a relatively short history of risk and claims data, pricing and exclusions can be all over the map
While ransomware and DDoS attacks get most of the publicity, the losses from bot fraud dwarf them both. And not many people, including the victims, seem to be doing much about it
FBI director tells Boston College cybersecurity conference that “ubiquitous strong encryption” is blinding his agency’s ability to fulfill its investigative mission