Thousands of SonicWall VPN devices are facing worrying security threats
Many SonicWall VPNs are running outdated and vulnerable software versions......»»

Businesses plagued by constant stream of malicious emails
36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and.....»»
What makes for a fulfilled cybersecurity career
In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfi.....»»
Who handles what? Common misconceptions about SaaS security responsibilities
In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common.....»»
Meet the next level MacBook battery protection – Chargie for Laptops
Technological advancements have meant that devices are lasting longer than ever. But one of the first parts to go is often the battery. Laptop batteries can especially be a problem, since many of us keep our laptops plugged in much of the time. But t.....»»
Vortex electric field discovery could impact quantum computing
A new vortex electric field with the potential to enhance future electronic, magnetic and optical devices has been observed by researchers from City University of Hong Kong (CityUHK) and local partners......»»
Meet the next level Macbook battery protection – Chargie for Laptops
Technological advancements have meant that devices are lasting longer than ever. But one of the first parts to go is often the battery. Laptop batteries can especially be a problem, since many of us keep our laptops plugged in much of the time. But t.....»»
Apple’s progress with slimmer iPhones sounds stunning and worrying
Thanks to the design liberties offered by an in-house modem, Apple has reportedly created an iPhone that is roughly a quarter slimmer than the iPhone 16 Pro......»»
Microsoft tipped to give its Surface devices a major Intel refresh in 2025
A new report outlines what Microsoft is planning for its Surface products across the next 12 months......»»
Apple’s progress with slimmer iPhones sounds stunning, and worrying
Thanks to the design liberties offered by an in-house modem, Apple has reportedly created an iPhone that is roughly a quarter slimmer than the iPhone 16 Pro......»»
The 7 best James Bond villains, ranked
Who are the bad guys worthy of facing 007? These are our picks for the best James Bond villains of all time. And no, Christopher Walken is not on the list......»»
Google’s Genie 2 “world model” reveal leaves more questions than answers
Long-term persistence, real-time interactions remain huge hurdles for AI worlds. In March, Google showed off its first Genie AI model. After training on thousands of hours of 2D r.....»»
Apple"s iPhone 17 Slim is a wrongheaded approach that ignores what people really want
Rumors continue to swirl that Apple will launch a new iPhone 17 Slim in 2025. Why does Apple think anyone wants it?A render of what the iPhone 17 Slim could look likeIn a world where people want their devices to last for longer than ever on a single.....»»
Resecurity introduces AI-powered GSOC at NATO Edge 2024
Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and Information Agency’s flagship conference. This year’s event, held from D.....»»
Echoworx enhances secure access to encrypted messages
Echoworx announced the addition of 2-Step Verification (2SV) when using OAuth and Passkeys for authentication for encrypted messages. This latest enhancement offers organizations an additional layer of security, addressing the growing demand for iden.....»»
How to choose secure, verifiable technologies?
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring.....»»
New infosec products of the week: December 6, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Datadog, Fortinet, Radiant Logic, Sweet Security, Tenable, and Veza. FortiAppSec Cloud simplifies web application security management With FortiAppSec Cloud,.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Building a robust security posture with limited resources
In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by legacy systems, and build defenses for startups. Lindahl-Wise also highlights.....»»
Straining a material"s atomic arrangement may make for cleaner, smarter devices
What's the best way to precisely manipulate a material's properties to the desired state? It may be straining the material's very atoms, according to a team led by researchers at Penn State. The team discovered that "spray painting" atoms of potassiu.....»»
HP debuts a new line of Fortis budget Chromebooks for students
HP has announced the Fortis G1i and Fortis G1m Chromebooks and Windows devices, which target students in the K-12 demographic......»»