Gaming or gambling? Lifting the lid on in-game loot boxes
The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down
What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)
Ever wondered what it’s like to hack for a living – legally? Learn about the art and thrill of ethical
Neil Lawrence: What makes us unique in the age of AI | Starmus highlights
As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms
How AI-driven identify fraud is causing havoc
Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here’s how to fight
Patch or perish: How organizations can master vulnerability management
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
How scammers are exploiting DeepSeek’s rise
As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the
This month in security with Tony Anscombe – January 2025 edition
DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal
Untrustworthy AI: How to deal with data poisoning
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously
Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights
Left unchecked, AI’s energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry