RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
Apple expands Tap to Pay on iPhone to users in the United Arab Emirates
A few weeks after launching Tap to Pay on iPhone in New Zealand, Apple on Tuesday announced another expansion of the feature. As of today, merchants in the United Arab Emirates (UAE) can accept contactless payments directly on their iPhones, without.....»»
Sentinel-1C captures first radar images of Earth
Less than a week after its launch, the Copernicus Sentinel-1C satellite has delivered its first radar images of Earth—offering a glimpse into its capabilities for environmental monitoring. These initial images feature regions of interest, including.....»»
One of ChatGPT’s latest features comes to the free tier
ChatGPT's collaborative Canvas interface is getting a host of new features and capabilities, the company announced Tuesday......»»
Apple Music expands live, hosted radio with three new stations
Apple Music has announced an expansion of its radio offerings today, with three brand new stations featuring live hosts and curation. more….....»»
Itch.io platform briefly goes down due to “AI-driven” anti-phishing report
Domain registrar failed to respond after offending content was taken down. Popular indie game platform itch.io says its domain was briefly taken down for a few hours Monday mornin.....»»
Itch.io platform briefly goes down to “AI-driven” anti-phishing report
Domain registrar failed to respond after offending content was taken down. Popular indie game platform itch.io says its domain was briefly taken down for a few hours Monday mornin.....»»
RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
Skyhigh Security strengthens data protection for Microsoft Copilot
Skyhigh Security announced the expansion of its purpose-built data protection capabilities to secure Microsoft Copilot, the fastest-growing AI solution in the enterprise. This latest milestone underscores Skyhigh Security’s commitment to enabling s.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
iOS 18.2 expands AirPods Pro 2 hearing aid and testing features to more countries
gained hearing aid capabilities with iOS 18.1, which was released to the public in October. Users can run a test to detect potential hearing loss and then use the results to adjust their own AirPods so that they function as hearing aids. With iOS.....»»
Hubble takes closest-ever look at a quasar
Astronomers have used the unique capabilities of NASA's Hubble Space Telescope to peer closer than ever into the throat of an energetic monster black hole powering a quasar. A quasar is a galactic center that glows brightly as the black hole consumes.....»»
Netography introduces AI-powered ransomware detection capabilities
Netography announced new ransomware detection capabilities that enable organizations to respond to malicious activity in real-time before it disrupts operations or threatens business continuity. These AI-powered enhancements enable Fusion customers t.....»»
Building trust in tokenized economies
As the tokenized economy expands, the digital landscape is reshaped by decentralized systems and new forms of asset ownership. In this Help Net Security video, Jeremy Bradley, COO of Zama, explores the emerging privacy-preserving technologies that ca.....»»
New synthetic receptor expands cellular control options, including immune response and neurological signaling
A basic function of cells is that they act in response to their environments. It makes sense, then, that a goal of scientists is to control that process, making cells respond how they want to what they want......»»
Elastic expands cloud detection and response capabilities from a single SIEM
Elastic announced Elastic Security now offers expanded cloud detection and response (CDR) capabilities from a single SIEM to reduce tool fragmentation and streamline cloud security. The additional features include agentless ingestion, cloud asset inv.....»»
What a new threat report says about Mac malware in 2024
Apple's macOS has been under siege in 2024 as malware-as-a-service platforms and AI-driven threats make the year a turning point for Mac security.MacBook ProFor years, macOS had a reputation for being malware-resistant, but 2024 has painted a differe.....»»
Sweet Security helps organizations protect their cloud environments
Sweet Security introduces unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments in real time. Sweet’s platform integrates the capabilities of Application Detection and Res.....»»
Thales Data Risk Intelligence identifies risks to sensitive data
Thales launched Data Risk Intelligence, an Imperva Data Security Fabric (DSF) solution that proactively addresses the risks to data wherever it resides. This is the first solution uniting the risk and threat identification capabilities of the Imperva.....»»
Future iPhones could get multiple Action buttons; iPad and Mac too
An Apple patent has revealed that future iPhones could effectively get multiple Action buttons, as all three buttons on the left side of the phone become user-configurable. The same patent indicates that similar capabilities may come to other Appl.....»»
Skyflow protects sensitive data flowing in and out of AI agents
Skyflow unveiled new capabilities for Agentic AI. These allow enterprises to build and deploy AI agents with a security and privacy trust layer with features that include protecting sensitive data flowing in and out of AI agents, auditing & logging,.....»»