From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses Advanced Threats August 8, 2019 6 min read
Scientists Show How Speech Recognition Software Can Be Compromised via Ultrasounds September 11, 2017 2 min read