SecuX Shield BIO enhances crypto security
SecuX revealed its latest creation, the Shield BIO card-type hardware wallet. The Shield BIO combines biometric fingerprint authentication with the handy format of a credit card. At the heart of this wallet is the military-grade Secure Element chip,.....»»
Patching problems: The “return” of a Windows Themes spoofing vulnerability
Despite two patching attempts, a security issue that may allow attackers to compromise Windows user’s NTLM (authentication) credentials via a malicious Windows themes file still affects Microsoft’s operating system, 0patch researchers hav.....»»
Corero CORE turns isolated security events into actionable intelligence
Corero Network Security launched a new cloud-based availability protection platform, CORE. CORE by Corero Network Security is a cloud-based availability protection platform designed to seamlessly enhance a company’s existing security infrastruc.....»»
Akamai strenghtens protection against account abuse
Akamai launched new capabilities to its Account Protector security solution. These enhancements are designed to safeguard user accounts against abuse throughout their entire lifecycle and provide advanced protection against account opening abuse, acc.....»»
Aviatrix unveils features to simplify network security management
Aviatrix unveiled new features and functionality designed to fill critical cloud network security gaps in cloud environments. With its latest software release and introduction of new features, including the Hybrid Cloud Transit and Distributed Cloud.....»»
The state of password security in 2024
In this Help Net Security video, John Bennett, CEO at Dashlane, discusses their recent Global Password Health Score Report, detailing the global state of password health and hygiene. Poor security habits like password reuse remain widespread. With pa.....»»
Cybersecurity jobs available right now: October 29, 2024
API Gateway Security Engineer Ness Technologies | Israel | Hybrid – View job details As an API Gateway Security Engineer, you will be responsible for managing and implementing API Gateway solutions with a strong focus on information s.....»»
OT PCAP Analyzer: Free PCAP analysis tool
EmberOT’s OT PCAP Analyzer, developed for the industrial security community, is a free tool providing a high-level overview of the devices and protocols in packet capture files. “The OT PCAP Analyzer was designed specifically with critica.....»»
Inside console security: How innovations shape future hardware protection
In this Help Net Security interview, security researchers Specter and ChendoChap discuss gaming consoles’ unique security model, highlighting how it differs from other consumer devices. They also share their thoughts on how advancements in cons.....»»
PIXM protects MSPs from credential theft and phishing attacks
PIXM Security launched its new Managed Service Provider (MSP) program for zero-day phishing protection. With over 500,000 end users already protected, PIXM shields MSPs and their customers from credential theft and zero-day phishing attacks that can.....»»
Trust and risk in the AI era
55% of organizations say the security risks for their business have never been higher, according to Vanta. Yet the average company only dedicates 11% of its IT budget to security — far from the ideal allocation of 17%, according to business and IT.....»»
For some reason, NASA is treating Orion’s heat shield problems as a secret
“I’m not going to share right now. When it comes out, it’ll all come out together.” For those who follow NASA's human spaceflight program, a burning question for the last.....»»
Apple releases iOS 17.7.1 with important security fixes for iPhone
Apple released a ton of software updates today, including iOS 18.1, macOS Sequoia 15.1, and more. But there was another key software release you may be unaware of. If you’re not yet running iOS 18, Apple’s new iOS 17.7.1 update includes important.....»»
Apple details all the security updates added in iOS 18.1 and more
Today Apple released big new software updates for all its platforms, including iOS 18.1, macOS Sequoia 15.1, and more. Now, the company has released full details on all of the security updates added in those releases. Here’s what you should know......»»
Apple releases visionOS 2.1 for Apple Vision Pro
Alongside iOS 18.1, Apple has also released visionOS 2.1 for Apple Vision Pro users today. Apple says that visionOS 2.1 includes bug fixes and security improvements and is recommended for everyone to install. more….....»»
ExtremeCloud Universal ZTNA enhancements boost visibility and security
Extreme Networks introduced new features within ExtremeCloud Universal Zero Trust Network Access (ZTNA), an identity-based network access solution. Universal ZTNA unifies cloud Network Access Control and ZTNA in a single, easy-to-use SaaS offering, w.....»»
Entrust helps banks fight fraud during account opening
Entrust announced an all-in-one consumer banking platform that allows banks and credit unions to provide high-assurance security throughout the customer lifecycle – from account opening to financial credential issuance to on-going, everyday transac.....»»
New partially coherent unidirectional imaging system enhances visual data transmission
A team of researchers from the University of California, Los Angeles (UCLA) has unveiled a new development in optical imaging technology that could significantly enhance visual information processing and communication systems......»»
The Pixel 11 could bring back this awesome feature
According to a recent leak, it seems that the Pixel 11 could be bringing back an IR camera system that could be used for security. The post The Pixel 11 could bring back this awesome feature appeared first on Phandroid. One of the main rea.....»»
How isolation technologies are shaping the future of Kubernetes security
In this Help Net Security interview, Emily Long, CEO at Edera, discusses the most common vulnerabilities in Kubernetes clusters and effective mitigation strategies. Long shares insights on emerging isolation technologies that could enhance Kubernetes.....»»
A good cyber leader prioritizes the greater good
In the war against malicious cyber activity, it’s time for security vendors to step in – and it’s not how you might think. CISA Director Jen Easterly put it right at this year’s Black Hat conference: “We got ourselves into this; we have to.....»»