Taiwan steps up efforts for V2X security
With the rising trend of V2X, the Taiwan Telematics Industry Association (TTIA) has founded a team to set the information and communication criteria that matches international standards, as well as monitor information security issues......»»
How to install an AMD processor
Want to know how to install an AMD CPU? It's easier than you might think. Just follow these steps. We'll teach you how to plug it in, apply the right amount of heatpaste, and get your cooler fitted to keep it nice and chilled, even under heavy load......»»
Shop the best budget-friendly early October Prime Day deals — all under $25
Prime Day isn't just for big purchases. Score a Blink security camera, Anker wireless charger, Soundcore earbuds, and more — all for under $25. Sometimes good things come with small price tags. Amazon' Prime Day sales are always a great time.....»»
macOS Sequoia 15.0.1 now available with important bug fixes
macOS 15.0.1 is now rolling out with some key bug fixes for Mac users. The update addresses problems in the Messages app as well as compatibility issues that had affected third-party security software. Head below for the full release notes. more.....»»
iOS 18.0.1 fixes security issues affecting iPhone microphone and Passwords app
In addition to a handful of notable bug fixes and performance improvements, today’s iOS 18.0.1 and iPadOS 18.0.1 updates also include a pair of important security fixes. Apple says that the updates include a fix for microphone access on the iPhone.....»»
New infosec products of the week: October 4, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift, SAFE Security, Veeam Software, and Legit Security. SAFE X equips CISOs with integrated data from all their existing cyber.....»»
Cybercriminals capitalize on poorly configured cloud environments
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Me.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Rainbow PUSH Automotive Project presses ahead amid DEI backlash
Despite Ford's pullback on DEI efforts, the chairman of the Rainbow PUSH Coalition Automotive Project sees the industry continuing to be more inclusive......»»
Aqara Smart Lock U300 is now available with Apple Home Key, Matter, and Thread support
has officially announced the release of its latest innovation in home security: the Smart Lock U300. This new smart lever lock is the third in Aqara’s lineup to support Apple Home Key. It also includes support for Thread and Matter, so it works pe.....»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
Study: Wildfires will make the land absorb much less carbon, even if warming is kept below 1.5°C
One of the aims of the Paris Agreement was to "pursue efforts" to keep global warming below 1.5°C, but even this ambitious target would not stop the land's ability to absorb carbon weakening as wildfires become fiercer and more frequent, according t.....»»
Manufacturers are lucrative targets for cybercriminals
Hackers and other bad actors believe manufacturers are behind on security measures and more likely to pay a ransom......»»
Toyota, Stellantis highest rated for diversity efforts
Toyota and Stellantis led the Rainbow PUSH Coalition Automotive Diversity Scorecard, achieving the highest marks in all six categories......»»
Legit Posture Score empowers security teams to measure and manage their AppSec posture
Legit Security launched its new “Legit Posture Score,” delivering a dynamic, comprehensive, and fully transparent ASPM rating system. Now security teams can proactively measure and manage their AppSec posture instantly with a holistic sco.....»»
Taiwan shuts down for second day as Typhoon Krathon makes landfall
Typhoon Krathon made landfall in Taiwan's south on Thursday, the island's weather agency said, after forcing schools and offices to shut for a second day amid winds and rain that have left two dead and more than 100 injured......»»
15% of office workers use unsanctioned GenAI tools
Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to s.....»»
Spotting AI-generated scams: Red flags to watch for
In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims an.....»»
Whitepaper: Reach higher in your career with cloud security
The cybersecurity skills gap presents ongoing challenges worldwide, so organizations are scrambling to fill cloud security positions. Having a subject matter expert on staff qualified to advise on cloud security requirements is more important now tha.....»»
Ransomware activity shows no signs of slowing down
Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, incidents continue to rise, signaling an ongoing and growing threat into 2024......»»
PlexTrac unveils new capabilities to prioritize proactive security remediation
PlexTrac announced significant enhancements to its platform. These updates are designed to help enterprises and security service providers harness proactive security by offering business context, automating risk scoring to focus on what matters most,.....»»