MoviePass Settles With FTC Over Fraud and Data Security Failures
On Monday, the Federal Trade Commission charged the executives of the long-defunct MoviePass app over allegations that they fraudulently blocked customers from using the service as advertised while failing to protect their data privacy. The FTC also.....»»
Biden administration eases rules on battery minerals as reports say it prepares to boost EV tariffs
Conflicting policy moves reflect dependence on China's supply chain and concerns about subsidies and national security.....»»
MITRE EMB3D improves security for embedded devices
MITRE released EMB3D, a cybersecurity threat model for embedded devices. The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to m.....»»
Stop spam calls at the source by fighting data brokers with Incogni
Spam calls and robocalls flood our iPhones because our personal information is accessed through data brokers, but you can end the insanity with the help of online data removal services.Stop spam calls with IncogniThe number one commodity on the inter.....»»
Securing the future through cybersecurity education
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the cybersecurity talent shortage and the role STEM education can play in solving that problem. They also discuss actions nee.....»»
How AI affects vulnerability management in open-source software
In this Help Net Security video, Itamar Sher, CEO of Seal Security, discusses how AI affects the risk and operational aspects of managing vulnerabilities in open-source software. One of the core issues around open-source vulnerability patch managemen.....»»
AI’s rapid growth puts pressure on CISOs to adapt to new security risks
The increased use of AI further complicates CISO role as industries begin to realize the full potential of GenAI and its impact on cybersecurity, according to Trellix. GenAI’s impact on CISO responsibility GenAI has rolled out at an immense spe.....»»
Establishing a security baseline for open source projects
In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and opportunities for overcoming these challenges. The OpenSSF community has.....»»
Huawei"s new NAS solution wants to tackle the biggest challenges in GenAI
OceanStor A800 AI data storage solution comes to Europe - and Huawei is hoping it tackles the big problems facing AI development......»»
Security Bite: Apple updates Platform Security guide with first-ever details on App Store security, BlastDoor, more
Apple this week updated its Platform Security guide, which contains in-depth technical information on security features implemented in its products. First released in 2015, the latest update adds six new topics, including first-ever details on BlastD.....»»
Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off!
This offer packs three cameras into one bundle. The post Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off! appeared first on Phandroid. For buyers after a reliable home surveillance and security solution, Blink’s wide.....»»
New infosec products of the week: May 10, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, AuditBoard, Cranium, Datadog, Eclypsium, ExtraHop, Forcepoint, SentinelOne, Splunk, Sumo Logic, and Trellix. AuditBoard enhances InfoSec S.....»»
Selfie spoofing becomes popular identity document fraud technique
Document image-of-image was the most prevalent identity (ID) document fraud technique in 2023, occurring in 63% of all IDs that were rejected, according to Socure. Selfie spoofing and impersonations dominate document-related identity fraud Document i.....»»
GenAI enables cybersecurity leaders to hire more entry-level talent
93% of security leaders said public GenAI was in use across their respective organizations, and 91% reported using GenAI specifically for cybersecurity operations, according to Splunk. A total of 1,650 security leaders participated in the global surv.....»»
Nmap 7.95 released: New OS and service detection signatures
Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap identifies av.....»»
How secure is the “Password Protection” on your files and drives?
People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. However, simple password protection on a PDF or Exc.....»»
Elon Musk’s X can’t invent its own copyright law, judge says
Judge rules copyright law governs public data scraping, not X’s terms. Enlarge (credit: Apu Gomes / Stringer | Getty Images News) A US district judge William Alsup has dismissed Elon Musk's X Corp's lawsuit against Bri.....»»
UK research reveals hand car wash sector is awash with exploitation
The risk of slavery in hand car washes across the UK has been exposed by new data from Nottingham Trent University (NTU) and modern slavery charity, The Clewer Initiative. It reveals a prevalence of indicators that make exploitation and slavery more.....»»
Reducing prejudice in war zones proves challenging
There are 62.5 million internally displaced persons worldwide, according to 2022 data by the UNHCR, the United Nations Refugee Agency. These individuals were forced to leave their homes but remain in the same country......»»
No ethnic minority teachers in more than half of England"s primary schools, new data shows
New research from the University of Warwick posted to the preprint SSRN Electronic Journal has laid bare the scale of the diversity crisis in schools, with more than half (55%) of primary schools having no ethnic minority teachers......»»
Parity-time symmetry: Unlocking faster and stronger optical signal processing
In the era of big data, signal processing faces significant challenges in terms of capacity and energy consumption due to the torrent of data to process. With over 90% of data transmitted through light, optical signal processing may offer unprecedent.....»»