What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

The post What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? appeared first on Security Intelligence.

Continue reading What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

Preparing for the Unpredictable: Security in a New World of Mobile Malware

Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.

The post Preparing for the Unpredictable: Security in a New World of Mobile Malware appeared first on Security Intelligence.

Continue reading Preparing for the Unpredictable: Security in a New World of Mobile Malware

Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All

Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they’ll be used for. We should start preparing for the worst.

The post Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All appeared first on Security Intelligence.

Continue reading Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All

Are You Really Covered by Your Cyber Insurance?

Statistically, you’re probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.

The post Are You Really Covered by Your Cyber Insurance? appeared first on Security Intelligence.

Continue reading Are You Really Covered by Your Cyber Insurance?

Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?

A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.

The post Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is? appeared first on Security Intelligence.

Continue reading Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?

AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.

The post AI May Soon Defeat Biometric Security, Even Facial Recognition Software appeared first on Security Intelligence.

Continue reading AI May Soon Defeat Biometric Security, Even Facial Recognition Software

It’s Time to Dispel These Dangerous Password Security Myths

Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.

The post It’s Time to Dispel These Dangerous Password Security Myths appeared first on Security Intelligence.

Continue reading It’s Time to Dispel These Dangerous Password Security Myths

How to Prepare for the Coming 5G Security Threats

5G communications networks will empower a future that some are calling the “Fourth Industrial Revolution” — but security leaders must prepare for the coming 5G security threats.

The post How to Prepare for the Coming 5G Security Threats appeared first on Security Intelligence.

Continue reading How to Prepare for the Coming 5G Security Threats

4 New Smart Office Security Risks and How to Mitigate Them

The smart office market is forecast to double by 2023. But while IoT devices promise to bring a bevy of benefits, they also introduce entirely new categories of cyber risk.

The post 4 New Smart Office Security Risks and How to Mitigate Them appeared first on Security Intelligence.

Continue reading 4 New Smart Office Security Risks and How to Mitigate Them