Mobile Security
FTC Warns AI Companies About Changing Policies to Leverage User Data
The Federal Trade Commission is warning AI companies against secretly changing their security and privacy policies in hopes of leveraging the data they collect from customers to feed models they use to ...
Security Boulevard
55% of Generative AI Inputs Include Sensitive Data: Menlo Security
The rapid growth in the number of generative AI tools and platforms and their expanding adoption by organizations are giving legs to long-held concerns about security and privacy threats from the technology ...
Security Boulevard
Infoblox Applies AI to DNS Traffic to Thwart Malware Infestations
Infoblox is leveraging AI to identify websites that are sources of malware and block them to make IT environments more secure ...
Security Boulevard
Valentine’s Day Scams Woo the Lonely-Hearted
A quarter of Valentine’s Day-themed spam emails intercepted by Bitdefender's filters were identified as scams aimed at defrauding recipients ...
Security Boulevard
‘Incompetent’ FCC Fiddles With Data Breach Rules
Richi Jennings | | breach notification, Data Breach Notification, data breach notification laws, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, GDPR Breach Notification, Jessica Rosenworcel, SB Blogwatch, U.S. Federal Communications Commission
FCC FAIL: While Rome burns, Federal Communications Commission is once again behind the curve ...
Security Boulevard
How Your Mobile Apps Leak Sensitive Data?
Do you know there are 2.9 million applications on the Google Play Store, which indicates that the Android market is growing quickly? Although there are many benefits and opportunities associated with it, ...
Breaking Bitlocker
Rick | | BitLocker, cpu, Crypto, drive encryption, encryption, Microsoft, Mobile Security, security, Windows
It was only a matter of time before someone did this. Bitlocker is Microsoft’s technique for encrypting a desktop, laptop, or other MS Windows device. We encrypt the device to protect the ...
Applying Zero-Trust to Voice Networks and the 5G Core
Zero-trust architecture is rapidly becoming the go-to approach for security and IT leaders to secure voice, mobile and 5G networks and applications ...
Security Boulevard
QR Code Phishing Attacks Target High-Level Executives: Report
C-level executives and others in managerial positions are by far the top targets of increasingly popular phishing attacks that involve malicious QR codes. According to researchers with Abnormal Security, members of the ...
Security Boulevard
Linux Vendors Squawk: PATCH NOW — CVSS 9.8 Bootkit Bug in shim.efi
Richi Jennings | | BIOS, CVE-2023-40547, Enterprise Linux and Open Source, Linux, open source, Open Source and Software Supply Chain Risks, open source code, Open Source Community, open source components, open source development, Open Source Ecosystem, SB Blogwatch, secure boot, shim, UEFI, UEFI Failing, UEFI vulnerabilities
Snow joke: A Microsoft researcher found it—and it’s somehow Microsoft’s fault ...
Security Boulevard