How the pandemic is shaping US security policy
The COVID-19 pandemic was one of the most serious crises since the end of World War II, taking a staggering human and economic toll across the planet. As the world gets up again, groggily, like a punch-drunk fighter, it's become increasingly clear th.....»»
The first iOS 18 update fixes a major bug with Apple’s Passwords app
You can now download iOS 18.0.1 on your iPhone. The update includes a number of security fixes that address problems with the original iOS 18 release......»»
Shop the best budget-friendly early October Prime Day deals — all under $25
Prime Day isn't just for big purchases. Score a Blink security camera, Anker wireless charger, Soundcore earbuds, and more — all for under $25. Sometimes good things come with small price tags. Amazon' Prime Day sales are always a great time.....»»
macOS Sequoia 15.0.1 now available with important bug fixes
macOS 15.0.1 is now rolling out with some key bug fixes for Mac users. The update addresses problems in the Messages app as well as compatibility issues that had affected third-party security software. Head below for the full release notes. more.....»»
iOS 18.0.1 fixes security issues affecting iPhone microphone and Passwords app
In addition to a handful of notable bug fixes and performance improvements, today’s iOS 18.0.1 and iPadOS 18.0.1 updates also include a pair of important security fixes. Apple says that the updates include a fix for microphone access on the iPhone.....»»
New infosec products of the week: October 4, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift, SAFE Security, Veeam Software, and Legit Security. SAFE X equips CISOs with integrated data from all their existing cyber.....»»
Cybercriminals capitalize on poorly configured cloud environments
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Me.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Addressing climate change and inequality: A win-win policy solution
Climate change and economic inequality are deeply interconnected, with the potential to exacerbate each other if left unchecked. A study published in Nature Climate Change sheds light on this critical relationship using data from eight large-scale In.....»»
Toyota curbs DEI policy after activist attack over LGBTQ support
Toyota Motor Corp. will refocus DEI programs and halt sponsorship of LGBTQ events......»»
Research reveals how media coverage helped successfully mitigate forest fires in the Brazilian Amazon
A new study from the University of California San Diego's School of Global Policy and Strategy reveals that public outcry can lead to significant environmental action, even when public administrations are openly hostile to environmental priorities......»»
How Soviet legacy has influenced foreign policy in Georgia and Ukraine
The legacy of the Soviet Union's collapse plays a greater role in the foreign policies of Georgia and Ukraine than previous studies have suggested. Conducting foreign policy in former Soviet countries can be a major challenge as the Russian state doe.....»»
Aqara Smart Lock U300 is now available with Apple Home Key, Matter, and Thread support
has officially announced the release of its latest innovation in home security: the Smart Lock U300. This new smart lever lock is the third in Aqara’s lineup to support Apple Home Key. It also includes support for Thread and Matter, so it works pe.....»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
Economists recognized early on in the pandemic that working from home is here to stay
When Amazon told staffers last month to come back to the office five days a week, many observers reacted as if an earthquake struck the post-pandemic world of work. To Stanford economist Nicholas Bloom, the news barely registered......»»
Return-to-office mandates may not be the solution to downtown struggles that Canadian cities are banking on
In recent months, many Canadian employers in both the public and private sectors have implemented return-to-office mandates, requiring workers that transitioned to remote or hybrid work during the COVID-19 pandemic to work in-person again......»»
Manufacturers are lucrative targets for cybercriminals
Hackers and other bad actors believe manufacturers are behind on security measures and more likely to pay a ransom......»»
Legit Posture Score empowers security teams to measure and manage their AppSec posture
Legit Security launched its new “Legit Posture Score,” delivering a dynamic, comprehensive, and fully transparent ASPM rating system. Now security teams can proactively measure and manage their AppSec posture instantly with a holistic sco.....»»
Bird Flu Fears Stoke the Race for an mRNA Flu Vaccine
Researchers have been working on mRNA flu vaccines since before the Covid-19 pandemic, but we may get one for bird flu first......»»
15% of office workers use unsanctioned GenAI tools
Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to s.....»»
Spotting AI-generated scams: Red flags to watch for
In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims an.....»»