audio

IRONSCALES Extends Email Security Platform to Combat Deepfakes
IRONSCALES has extended the reach of the machine learning algorithms it uses to identify email anomalies to now include the video and audio files used to create deepfakes ...
Security Boulevard

Discord’s New End-to-End Encryption, LinkedIn Using Your Data for AI Training
Tom Eston | | AI, AI models, audio, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Discord, E2E, encryption, end-to-end encryption, Episodes, Information Security, Infosec, linkedin, LLM, open source, Pagers, Podcast, Podcasts, Privacy, Privacy Policy, security, technology, Trail of Bits, Voice, Weekly Edition
In episode 348, Tom and Scott discuss Discord’s new end-to-end encryption for audio and video calls, involving the DAVE Protocol, third-party vetting by Trail of Bits, and its impact on users. They ...

NetworkMiner 2.3 Released!
Erik Hjelmvik | | A-LAW, ALAW, audio, Community strings, extract, G.711, G711, Hybrid Analysis, Netresec, Network Forensics, NetworkMiner, OSINT, pcap, RTP, SIP, smtp, SNMP, u-lAW, uLAW, VoIP, WAV, μ-law
The free and open source network forensics tool NetworkMiner now comes with improved extraction of files and metadata from several protocols as well as a few GUI updates. But the biggest improvements ...
Friday Squid Blogging: Interesting Interview
Here's an hour-long audio interview with squid scientist Sarah McAnulty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered ...