UK’s IoT ‘security by design’ law will cover smartphones too
Smartphones will be included in the scope of a planned “security by design” U.K. law aimed at beefing up the security of consumer devices, the government said today. It made the announcement in its response to a consultation on legislativ.....»»
Securing the future through cybersecurity education
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the cybersecurity talent shortage and the role STEM education can play in solving that problem. They also discuss actions nee.....»»
How AI affects vulnerability management in open-source software
In this Help Net Security video, Itamar Sher, CEO of Seal Security, discusses how AI affects the risk and operational aspects of managing vulnerabilities in open-source software. One of the core issues around open-source vulnerability patch managemen.....»»
AI’s rapid growth puts pressure on CISOs to adapt to new security risks
The increased use of AI further complicates CISO role as industries begin to realize the full potential of GenAI and its impact on cybersecurity, according to Trellix. GenAI’s impact on CISO responsibility GenAI has rolled out at an immense spe.....»»
Establishing a security baseline for open source projects
In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and opportunities for overcoming these challenges. The OpenSSF community has.....»»
Apple’s new iPad Pro keyboard is a bigger deal than you think
Apple's new Magic Keyboard has got a lot going in its favor, but its predecessor has left a trail of rather pricey design woes. I hope this one gets it right......»»
Sea of Thieves alliances guide: how to join and benefits
Even pirates have a code in Sea of Thieves. it's called alliances, but you need to know how to join them. We cover everything you need to know here......»»
Elon Musk"s Neuralink Had a Brain Implant Setback. It May Come Down to Design
Neuralink experienced a mechanical issue with its first human brain-computer interface implant. Its novel design may make it more prone to failure......»»
WhatsApp officially rolling out update with refreshed design for iOS and Android
WhatsApp on Thursday announced that it is officially releasing an update that introduces a refreshed design for both iOS and Android apps. Users will notice a new color palette and other changes that make the experience of using WhatsApp on both plat.....»»
Concept imagines Apple Watch X with Ultra-inspired design and FaceTime camera
We’ve been hearing a lot of rumors about a completely redesigned “Apple Watch X” to be introduced later this year, as the Watch is about to turn 10. We still don’t know for sure what this new Apple Watch X will look like, but a group of desig.....»»
Security Bite: Apple updates Platform Security guide with first-ever details on App Store security, BlastDoor, more
Apple this week updated its Platform Security guide, which contains in-depth technical information on security features implemented in its products. First released in 2015, the latest update adds six new topics, including first-ever details on BlastD.....»»
Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off!
This offer packs three cameras into one bundle. The post Get this Awesome Deal on Blink’s 4th Gen Cam with $120 Off! appeared first on Phandroid. For buyers after a reliable home surveillance and security solution, Blink’s wide.....»»
New infosec products of the week: May 10, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, AuditBoard, Cranium, Datadog, Eclypsium, ExtraHop, Forcepoint, SentinelOne, Splunk, Sumo Logic, and Trellix. AuditBoard enhances InfoSec S.....»»
GenAI enables cybersecurity leaders to hire more entry-level talent
93% of security leaders said public GenAI was in use across their respective organizations, and 91% reported using GenAI specifically for cybersecurity operations, according to Splunk. A total of 1,650 security leaders participated in the global surv.....»»
Nmap 7.95 released: New OS and service detection signatures
Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap identifies av.....»»
How secure is the “Password Protection” on your files and drives?
People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. However, simple password protection on a PDF or Exc.....»»
Take cover: Survey shows tornado warnings widely misunderstood
Research by Nebraska's Cory Armstrong is defining the effectiveness of the alerts, warnings and advisories that swirl around extreme weather events......»»
Security flaws in BIG-IP system could have put entire networks at risk
F5 released mitigations and a patch for two high-risk flaws......»»
Researchers harness blurred light to 3D-print high-quality optical components
Canadian researchers have developed a new 3D printing method called blurred tomography that can rapidly produce microlenses with commercial-level optical quality. The new method may make it easier and faster to design and fabricate a variety of optic.....»»
Zscaler swats claims of a significant breach
On Wednesday, a threat actor named “InteIBroker” put up for sale “access to one of the largest cyber security companies” and immediately ignited speculation about which company it might be. InteIBroker claims to have access to.....»»
Ford design boss Anthony Lo leaves for "other opportunities"
Anthony Lo made the decision to leave the automaker himself, Ford said, without saying where he is moving to......»»