Eftpos expands security kit bag with new AI anti-fraud capability

Eftpos has switched on a new AI anti-fraud online capability as the Australian debit payments provider continues to expand its security features. The new capability is underpinned by a fraud…

Researchers Flag 300K Banking Trojan Infections from Google Play in 4 Months

Attackers are honing Google Play dropper campaigns, overcoming app store restrictions. Overcoming Google Play app restrictions, attackers have successfully racked up more than 300,000 banking trojan installations over just the…

'AI Will Revolutionize Every Aspect of Connectivity,' Argue Cyber Experts

'AI Will Revolutionize Every Aspect of Connectivity,' Argue Cyber Experts "AI will revolutionize every aspect of connectivity," was the bold message delivered during a recent webinar by the IDC titled 'AI…

Online Merchants: Prevent Fraudsters from Becoming Holiday Grinches

Black Friday and Cyber Monday approach! Saryu Nayyar, CEO at Gurucul, discusses concerning statistics about skyrocketing online fraud during the festive season. As the holiday shopping season gets into full…

Engineering personality analysis from machine learning

Machine learning (ML) is used to predict many things in our life, such as bitcoin prices, sports results, weather forecasts and movie ticket prices. Numerous researchers have shown that machine…

What is Endpoint Security?

A significant portion of cyberattacks target endpoints, either individually or as gateways to the larger company network. Unfortunately, this is not a singular threat, but a layered issue: hackers exploit…

Ransomware as a Service 101

Trend Micro – Trend Micro – Ransomware as a Service 101 Risk Management To help you enhance your defense against ransomware, Trend Micro Research shares key insights on how ransomware…

3 Top Tools for Defending Against Phishing Attacks

Phishing emails are now skating past traditional defenses. Justin Jett, director of audit and compliance at Plixer, discusses what to do about it. Even with the most sophisticated email scanning…

Decoding the Data Ocean: Security Threat Context & Natural Language Processing

Threat Post –  Threat Post –  REGISTER TODAY! Join security researchers Erick Galinkin of Rapid7 and Izzy Lazerson of IntSights, as they discuss how non-experts can supercharge threat intelligence efforts…

Palo Alto Networks updates Prisma Cloud to secure the full app lifecycle

Embracing the concept of DevSecOps, Palo Alto Networks on Tuesday rolled out Prisma Cloud 3.0, bringing a number of updates to the platform focused on the security of the entire…