
Here’s what’s been hot on the AI scene over the past 12 months, how it’s changing the face of warfare, and how you can fight AI-powered scams

Source link
Related Articles
All welivesecurity →A quick guide to recovering a hacked account
Table of Contents Every minute counts Stop the damage (minutes 0–2) Secure access (minutes 3–6) Check, check, check (minutes 7–10) Clean up (minutes 11–13) Warn…
A key to business survival
Table of Contents Bruised and battered Throwing a lifeline Bracing for impact Business Security Ransomware Your company’s ability to tackle the ransomware threat head-on can…
Don’t let dormant accounts become a doorway for cybercriminals
Table of Contents Why are dormant accounts risky? The consequences of inactive accounts Time for a spring clean? Do you have online accounts you haven’t…
Operating System Vulnerabilities, Exploits and Insecurity
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. 10 Mar 2015 • , 6…
Why successful businesses are built on protection
Table of Contents SMBs are still putting out fires Counting the cost of inadequate cybersecurity From cost center to business enabler The message and the…
Kids behaving badly online? Here’s how parents can help
Table of Contents What does behaving badly mean online? Oversharing personal data Talking to strangers Lying about their age Sexting Cyberbullying Hacking or scamming others…