Nothing’s iMessage app was a security catastrophe, taken down in 24 hours
Nothing promised end-to-end encryption, then stored texts publicly in plain text. Enlarge / The Nothing Phone 2 all lit up. (credit: Ron Amadeo) It turns out companies that stonewall the media's security questions actua.....»»
2024 sees continued increase in ransomware activity
In this Help Net Security video, Ryan Bell, Threat Intelligence Manager at Corvus Insurance, discusses how ransomware will continue to grow in 2024. In January, Corvus reported that global ransomware attacks in 2023 set a record high, surpassing 2022.....»»
Strategies for transitioning to a SASE architecture
In this Help Net Security, Prakash Mana, CEO at Cloudbrink, discusses the primary challenges companies face when transitioning to a SASE architecture and how to overcome them. What are companies’ primary challenges when transitioning to a SASE.....»»
CISOs pursuing AI readiness should start by updating the org’s email security policy
Over the past few years, traditional phishing messages — with their pervasive linguistic errors, thinly-veiled malicious payloads, and often outlandish pretexts — have been on the decline. Easily detected by most of today’s standard email secur.....»»
Brunt Ice Shelf in Antarctica calves new iceberg
A large iceberg (380 km2), about the size of the Isle of Wight, has broken off the 150m-thick Brunt Ice Shelf. It broke off after a crack suddenly appeared in the ice shelf a few weeks ago. The final break happened in the early hours of Monday, 20 Ma.....»»
Is Dashlane safe? Here’s what we know about its security history
If you’re looking for a safe and reliable password manager, you’ve probably seen Dashlane pop up in your search. But is Dashlane safe to use? Find out here......»»
CyberArk CORA AI accelerates identity threat detection
CyberArk announced CyberArk CORA AI, a new set of AI-powered capabilities that will be embedded across its identity security platform. CORA AI will translate vast numbers of identity data points into insights and enables multi-step actions in natural.....»»
Windows’ new Recall feature: A privacy and security nightmare?
Microsoft has announced the Copilot+ line of Windows 11-powered PCs that, among other things, will have Recall, a feature that takes screenshots every few seconds, encrypts them, saves them, and leverages AI to allow users to search through them for.....»»
AU10TIX Risk Assessment Model identifies potential vulnerabilities
AU10TIX launched a free Risk Assessment Model that enables businesses to conduct an initial assessment of their exposure to operational, security and identity fraud risk. Drawing insights from billions of transactions processed globally and years of.....»»
PlexTrac Plex AI helps offensive security teams write reports
PlexTrac announced Plex AI, the company’s AI-powered offensive security report writing tool, real-time team collaboration to enable simultaneous report editing by multiple team members, and a scheduler to help offensive security teams keep assessme.....»»
Technological complexity drives new wave of identity risks
Security leaders are facing increased technological and organizational complexity, which is creating a new wave of identity risks for their organizations, according to ConductorOne. Based on a survey of 523 US-based IT security leaders at companies w.....»»
Cybersecurity jobs available right now: May 22, 2024
Associate Director, Cyber Security AstraZeneca | Sweden | On-site – View job details You will develop and implement security policies, procedures, and operating practices in this role. You will coordinate risk profile development and.....»»
tvOS gets a minor update, to version 17.5.1
Just 24 hours after introducing a minor update to iOS and iPadOS, Apple has released a similar revision to tvOS, bringing it to version 17.5.1.Apple TV 4KOn Monday, Apple issued a point release for iOS and iPadOS 17, making a small fix to the operati.....»»
Collapse in migratory fish populations threatens health of millions and critical freshwater ecosystems
Populations of migratory freshwater fish species—including salmon, trout, eel, and sturgeon—continue to decline across the globe. This decline risks the food security and livelihoods of millions of people, the survival of countless other species,.....»»
Americans leave large sums at airport security checkpoints—what it means for the debate over getting rid of pennies
Should the U.S. get rid of pennies, nickels and dimes? The debate has gone on for years. Many people argue for keeping coins on economic-fairness grounds. Others call for eliminating them because the government loses money minting low-value coins......»»
iFixit teardown reveals big change for the M4 iPad Pro’s repairability
Thanks to teardowns and durability (bend) testing, we’re learning a lot about the new ultra-thin iPad Pro’s design. Now, the folks at iFixit have performed their in-depth teardown, revealing a big internal change that could save “hours on repa.....»»
Security Bite: Most common macOS malware in 2024 so far
It is a long-standing misconception that Macs are impervious to malware. Unfortunately, this has never been the case. While Apple might hope people continue to overlook the severity, Mac users continue to be caught off guard by cybercriminals’ adva.....»»
Best LastPass alternatives for 2024
With the LastPass security issues over the past years, you might be in the market for a new password manager. We've got you covered with these alternatives......»»
Strategies for combating AI-enhanced BEC attacks
In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of BEC sc.....»»
Fighting identity fraud? Here’s why we need better tech
In this Help Net Security video, Patrick Harding, Chief Architect at Ping Identity, discusses the state of identity fraud prevention. Businesses must adopt more advanced technologies to combat the advancing tactics of identity fraud. Organizations th.....»»
eBook: 10 reasons why demand for cloud security is sky-high
Current demand for cloud security specialists far exceeds available talent. Especially for companies seeking protection in multicloud environments, professionals with vendor-neutral knowledge and skills to their hiring wish lists. Find out how cloud.....»»