Hotel room key cards everywhere could be at risk from RFID security flaw
Security researchers find flawed contactless cards dating back to late 2007, and urge users to be careful......»»
Today’s release of macOS Sequoia brings 70+ new security fixes
macOS Sequoia has officially launched with new features and improvements such as window tiling, iPhone Mirroring, the new Password app, and more. But under the hood, Apple delivered a staggering amount of patched bugs/vulnerabilities to Mac users. Th.....»»
Security Bite: A brief history of Apple’s legal fight with NSO
9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art App.....»»
Apple releases iOS 17.7 with security fixes as an iOS 18 alternative
Today Apple released iOS 18, the flagship software update for iPhones. But at the same time, a new version of iOS 17 has been released too. iOS 17.7 offers an alternative to iOS 18 for users, bringing key security fixes to last year’s software......»»
Also releasing today: New iOS 17, macOS 14 updates for the upgrade-averse
Security updates without the headaches for the risk-averse (and bug-averse). Enlarge Today is the official release date for the public versions of iOS 18, iPadOS 18, macOS 15 Sequoia, and a scad of other Apple software.....»»
23andMe set to pay millions to settle data breach lawsuit
If the judge approves the settlement terms, 23andMe will pay out millions and will have to run regular security audits......»»
Tunable nonlinear Hall effect observed at room temperature in tellurium
A research team has discovered significant nonlinear Hall and wireless rectification effects at room temperature in elemental semiconductor tellurium (Te). Their research is published in Nature Communications......»»
"Fight is coming": UAW, VW brace for start of bargaining
Profit sharing, COLA, retirement security, affordable health care and the elimination of tiers appear to be the UAW's focus points for bargaining with VW......»»
Compliance frameworks and GenAI: The Wild West of security standards
In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional software. Unlike predictable software, GenAI introduces dynamic, evolving threats, requiring new strategies for d.....»»
eBook: Navigating compliance with a security-first approach
As cyberattacks escalate, more regulations are being introduced to help protect organizations and their customers’ data. This has resulted in a complex web of legislation with which companies in the private sector must comply. It can be challenging.....»»
The ripple effects of regulatory actions on CISO reporting
In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how recent regulatory actions and high-profile legal incidents involving cybersecurity leaders have influenced CISO reporting. In a recent report of the CISO Circu.....»»
"Fight is coming:" UAW, VW brace for start of bargaining
Profit sharing, COLA, retirement security, affordable health care and the elimination of tiers appear to be the UAW's focus points for bargaining with VW......»»
Week in review: Veeam Backup & Replication RCE could soon be exploited, Microsoft fixes 4 0-days
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711) CVE-2024-40711, a critical vulnerability affecting Ve.....»»
Windows is still making changes to prevent another CrowdStrike-type disaster
After what happened with CrowdStrike, Microsoft wants to ensure that the incident doesn't repeat itself by making some important changes to its security......»»
Suppliers eye new contract terms, more collaboration to lessen EV risks
Executives at some of the world's biggest suppliers are rethinking how they manage risk as they deal with increased uncertainty on electrification......»»
GAZEploit could work out Vision Pro user passwords from watching their avatars [Fixed]
Security researchers came up with a pretty wild Vision Pro exploit. Dubbed GAZEploit, it’s a method of working out the passwords of Vision Pro users by watching the eye movements of their avatars during video calls. They’ve put together a YouT.....»»
Nudge Security unveils SSPM capabilities to strengthen SaaS security
Nudge Security unveiled new SSPM (SaaS security posture management) capabilities for its SaaS security and governance platform. This enhancement creates the industry’s most comprehensive solution of its kind, combining SaaS discovery, security.....»»
Organizations still don’t know how to handle non-human identities
Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of NHIs significantly amplifies the security challenges organizations face. Each.....»»
Security measures fail to keep up with rising email attacks
Organizations must reassess their email security posture as incidents continue to escalate, leading to financial losses. Key findings reveal a significant increase in email attacks, with many successfully bypassing standard security protocols and tar.....»»
New infosec products of the week: September 13, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Druva, Huntress, Ketch, LOKKER, Tenable, Trellix, and Wing Security. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins T.....»»
Adobe Acrobat Reader has a serious security flaw — so patch now
A bug allows threat actors to launch malicious code on Acrobat Reader remotely, and it's already being used in the wild......»»