Written By Shane Schick

A Good Mimic Can Bypass Voice Recognition Authentication, Research Suggests

It may be easy to dupe voice recognition authentication solutions if you're a good mimic, according to experts.

Facebook Uses Artificial Intelligence Features to Improve Privacy and Reduce Catfishing

Facebook is using artificial intelligence features that will make users aware when their photos have been posted without permission.

Study: AI Assists Security Pros but Brings New Challenges

While the rise of AI has stoked fears of job loss in many industries, security professionals have something new to worry about: AI cyberattacks.

Cybersecurity Spending Poised to Rise in 2018, Gartner Reports

According to Gartner, cybersecurity spending will reach an all-time high next year as enterprises try to maintain compliance and protect their data.

Vortex and Bugware Ransomware Use Open Source Tools to Target .NET Users

Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.

US Bill Threatens Jail Time for Failing to Disclose a Data Breach Within 30 Days

A bill proposed by members of the U.S. Senate would mandate jail time for business leaders who fail to disclose a data breach in a timely manner.

Fraudsters Use Necurs Botnet to Spread Scarab Ransomware

A group of cybercriminals used the Necurs botnet to spread Scarab ransomware to 12.5 million email accounts on Nov. 23, according to security researchers.

Cybercriminals Cash In on Compromised ATM Security, Researchers Warn

Researchers revealed how easily ATM security can be thwarted by breaking into a machine and then using malware to take down an entire network.

Toast Overlay Attacks Prompt Malware Removal for Android Users

An overlay attack involving Android's Toast feature may mean users have to deal with malware removal issues.

Study of More Than 3,200 Unique Phishing Kits Shows Fraudsters’ Inner Workings

Malicious developers commonly distribute phishing kits with built-in back doors that enable them to hijack victims infected by other threat actors.