So-called “sextortion” attacks are a growing threat, replacing other e-mail borne threats like spam, ransomware and business e-mail compromise attacks as they increase in sophistication and scope, a new report finds.
Search Results for "Target"
Spotlight: Synopsys on democratizing Secure Software Development
We speak with Ravi Iyer, the Head of Product Management talks to us about the “democratization” of software development, as more and more companies become software publishers. Ravi and I talk about Polaris, a new software integrity platform that integrates a wide range of software testing and analysis tools into a common platform.
Podcast Episode 135: The Future of Passwords with Google Account Security Chief Guemmy Kim
In this week’s episode (#135): we continue our series on the future of Passwords as we are joined by Guemmy Kim, a group product manager at Google in charge of that company’s account security initiatives.
EU calls for End to Default Passwords on Internet of Things
A group representing European telecommunications firms last week published technical specifications for securing a wide range of consumer Internet of Things devices including toys, smart cameras and wearable health trackers.
Podcast Episode 134: The Deep Fake Threat to Authentication and analyzing the PEAR Compromise
Vijay Balasubramaniyan of Pindrop joins us to talk about it. And, in our second segment, Sam Bisbee the CSO of the firm ThreatStack joins us to talk about last month’s hack of the PEAR open source package manager and why data deserialization attacks are a growing threat to projects that use open source components.