Remove category articles
article thumbnail

What Is FOSS Software? Definition, Usage, and Vulnerabilities

Heimadal Security

Free Open-Source Software (FOSS) is a software category that incorporates computer programs that are freely licensed and open-source. This article will focus on the major differences between FOSS and OSS (Open-Source Software), applicability, and the various security vulnerabilities associated with this type of […].

Software 105
article thumbnail

Deepfake cyberthreats – The next evolution

CyberSecurity Insiders

This blog was written by an independent guest blogger. In 2019, we published an article about deepfakes and the technology behind them. Among these categories, the following were deemed the highest risk: Audio/video impersonation. This list sparked the idea for this article. Tailored phishing. Disrupting AI-based systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Automating Microsoft Optional Quality Updates – Can it Be Done?

Heimadal Security

Asides from those, Microsoft does also offer another category of updates called optional quality (updates). So, in this article, I’m […]. appeared first on Heimdal Security Blog. For the most part, these are security-related (i.e., The post Automating Microsoft Optional Quality Updates – Can it Be Done?

59
article thumbnail

Biometrics: Does GDPR mean thumbs down for fingerprint scanners in the workplace?

BH Consulting

This blog will look at the issue relating to employee data. The regulation has specific safeguards when processing what is known as special category personal data. As Article 9 makes clear, this category includes biometric data like fingerprints. What the GDPR says about biometrics. It’s needed for medical assessment.

article thumbnail

SHARED INTEL: A foolproof consumer’s guide to creating and managing bulletproof passwords

The Last Watchdog

First, make a list of all of the sites you have a username and password for, and then put those sites into categories. For example, all of your sites for social media would be in a category, all of your email sites together, all of your banking sites together, and all of your shopping sites together. Next, remember your categories?

Passwords 133
article thumbnail

Three quick takes regarding the 2021 updates to the OWASP Top 10 list

Security Boulevard

In this article, we’ll take a look back at the changes to the OWASP Top 10 this past year. It’s been four years since OWASP updated its Top 10 list , but this year we got three brand new categories along with a reshuffling of the rest. Photo by Anna Tarazevich from Pexels. Furthermore, the updated list is. [M]ore

Software 116
article thumbnail

Security Affairs newsletter Round 369 by Pierluigi Paganini

Security Affairs

Every week the best security articles from Security Affairs for free in your email box. Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog”). Pierluigi Paganini.