Tag Archive for: stage

Emotet 101, stage 5: a delivery vehicle for more malware – Naked Security

Emotet 101, stage 5: a delivery vehicle for more malware  Naked Security

By SophosLabs Research. Emotet is a botnet in its own right, one so prolific and dominant that the United States CERT, the body tasked with tracking …

“malware news” – read more

GDPR Puts Response at Center Stage for All Companies – InformationWeek


InformationWeek

GDPR Puts Response at Center Stage for All Companies
InformationWeek
When the General Data Protection Regulation (GDPR) takes effect in May 2018, a company's ability to respond to a data breach will be paramount. The majority of companies already struggle with responding to cyber incidents, and even fewer are prepared …

and more »

data breach – Google News

Alex Gibney Takes on Cyber Warfare in Trailer For ‘Zero Days’ – The Film Stage (blog)


The Film Stage (blog)

Alex Gibney Takes on Cyber Warfare in Trailer For 'Zero Days'
The Film Stage (blog)
Zero Days, which premiered to acclaim at the Berlin Film Festival earlier this year, tackles cyberwarfare and the the U.S. government's tactics in the field. We were major fans of it, as our quote in the first trailer will attest to, which Magnolia

cyber warfare – read more

NIST sets the stage for contactless fingerprint readers

Biometric technologies may soon replace cumbersome passwords, but the U.S. National Institute of Technology is looking out to a time when you won’t even have to press your finger onto a grimy fingerprint reader to gain entry to a computer.

NIST has funded a number of companies to make touchless fingerprint readers possible, and is creating a framework for evaluating possible technologies for widespread use.

Touchless fingerprint readers could be particularly useful for quickly identifying large numbers of people, such as a queue entering a controlled facility, NIST contends. Germaphobes would also appreciate the technology, as they would not have to touch potentially germy fingerprint readers to gain access to their computers.

To read this article in full or to leave a comment, please click here

Network World Security