A prominent computer scientist who has spent 20 years publishing academic papers on cryptography, privacy, and cybersecurity has gone incommunicado, had his professor profile, email
Category: Data Protection
A phishing-as-a-service (PhaaS) platform named ‘Lucid’ has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android). Lucid,
Only a third of organizations employ adequate testing practices in AI application development, according to new research, prompting calls for increased red teaming to reduce
Al Roker never had a heart attack. He doesn’t have hypertension. But if you watched a recent deepfake video of him that spread across Facebook,
The notorious North Korean Lazarus hacking group has reportedly adopted ‘ClickFix’ tactics to deploy malware targeting job seekers in the cryptocurrency industry, particularly centralized finance
ITPro is pleased to launch its 2025 Picks Awards, with the first accolades set to be awarded at the InfoSecurity Europe event in London in
With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation rental. To the quickest route
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism
Hackers are utilizing the WordPress mu-plugins (“Must-Use Plugins”) directory to stealthily run malicious code on every page while evading detection. The technique was first observed
IT decision-makers are ramping up automation efforts in a bid to tackle internal ‘data divides’, new research shows, but they’re facing significant hurdles. According to