Three OT security lessons learned from 2021’s biggest cyber incidents
What do an oil pipeline, a water treatment plant, and a railway system have in common? They each rely on operational technology (OT) environments, and they were all victims of cyber attacks that generated headlines around the world. The Colonial Pipe.....»»
The best Bitcoin wallets to hodl, trade, and exchange crypto
Whether you want the convenience of online storage or the security of a hardware wallet, these are the best Bitcoin wallets you can use in 2024......»»
Study finds wild nematode worms learn to avoid harmful bacteria—and their offspring inherit this knowledge
The nematode worm C. elegans will stay away from dangerous bacteria in its environment when exposed to certain bacterial RNAs—and can transmit that learned behavior to future generations. A team led by Coleen Murphy at Princeton University report t.....»»
Vizio’s first 86-inch 4K TV is coming soon, for $999
Ahead of the planned acquisition by Walmart, Vizio has revamped its TV lineup and revealed its biggest screen so far......»»
AppViewX partners with Fortanix to address critical enterprise security challenges
AppViewX and Fortanix announced a partnership to offer cloud-delivered secure digital identity management and code signing. Together the companies make it easy to address critical enterprise security challenges with comprehensive, robust and scalable.....»»
Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-24955 – a code injection vulnerability that allows authenticated attackers to execute code remotely on a vulnerable Microsoft SharePoint Server – to its KEV ca.....»»
How CISOs tackle business payment fraud
In this Help Net Security video, Shai Gabay, CEO of Trustmi, discusses why payments are a source of cyber worry for CISOs. CISOs are worried about Business Email Compromise (BEC), cyber attackers’ use of AI, and securing the supply chain. These.....»»
Enterprises increasingly block AI transactions over security concerns
Enterprises must secure a transformation driven by generative AI (GenAI) bidirectionally: by securely adopting GenAI tools in the enterprise with zero trust while leveraging it to defend against the new AI-driven threat landscape, according to Zscale.....»»
mophie unveils its first Qi2 chargers for a more affordable MagSafe experience [Update]
We learned more about the second generation of the Qi wireless charging standard last year and it’s ended up as compatible with iPhone 13 through 15. Now mophie is one of the first accessory makers to unveil its Qi2 devices. more….....»»
Phil Schiller will be Apple"s ecosystem defender for quite some time
Phil Schiller is Apple's biggest defender of Apple's ecosystem, a profile into the Apple Fellow declares, with the executive publicly beating the drum to maintain the vision of co-founder Steve Jobs.Phil Schiller, Apple FellowApple's many regulatory.....»»
Apple quietly releases revised build of iOS 17.4.1 and iPadOS 17.4.1
Apple last week released iOS 17.4.1 and iPadOS 17.4.1 to iPhone and iPad users. Although the updates don’t add any new features, they do bring two important security patches. For some unknown reason, Apple has now quietly released a revised build o.....»»
CyberArk Secure Browser helps prevent breaches resulting from cookie theft
CyberArk launched CyberArk Secure Browser, an identity-centric secure browser, providing enhanced security and privacy alongside a familiar, productive user experience. Backed by intelligent privilege controls and simple to deploy across devices, Cyb.....»»
Malwarebytes adds AI functionality to ThreatDown Security Advisor
Malwarebytes has added AI functionality to its Security Advisor, available in every ThreatDown Bundle. Leveraging generative AI technology, the new capabilities will transform Security Advisor into a dynamic experience that allows customers to use si.....»»
Bedrock Security protects sensitive data within one unified platform
Bedrock Security unveiled its data security platform. Empowering organizations to manage data risk introduced by cloud and generative AI, Bedrock continuously discovers, manages, and protects sensitive data. The platform is powered by data AI Reasoni.....»»
Drozer: Open-source Android security assessment framework
Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. Drozer features The solution enables the identification of security vulnerabilities in applicati.....»»
Essential elements of a strong data protection strategy
In this Help Net Security interview, Matt Waxman, SVP and GM for data protection at Veritas Technologies, discusses the components of a robust data protection strategy, emphasizing the escalating threat of ransomware. He highlights the importance of.....»»
Cybersecurity jobs available right now: March 27, 2024
Cyber Product Owner UBS | Israel | On-site – View job details Your primary responsibilities will include owning and managing application security testing products, collaborating with the cyber hygiene operational team, and understandi.....»»
How security leaders can ease healthcare workers’ EHR-related burnout
Staff experiencing burnout in healthcare settings is not something that security leaders typically worry about – unless, maybe, it is the security team itself that is suffering from it. Healthcare CISOs and privacy officers worry more about the con.....»»
How to catch iMessage impersonators with Contact Key Verification
iOS includes an iMessage security feature called Contact Key Verification (CKV) that gives users more certainty they’re messaging with the people they think they are. Follow along for what this feature is, how it works, and how to turn on Contact K.....»»
Essays on democracy draw attention to critical threats, explore safeguards ahead of Jan. 6
Following the events of Jan. 6, 2021—when a violent mob stormed the U.S. Capitol building in an effort to interrupt the certification process of the 2020 presidential election—experts began to question how to protect the next presidential electio.....»»
iPhone 16 Pro: Every new feature and change rumored
The iPhone 16 Pro and iPhone 16 Pro Max are coming. Even though we’re still several months from any official announcement, rumors have already started to paint a picture of what to expect. The iPhone 16 Pro lineup will feature Apple’s biggest iPh.....»»