Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability allows Yubico security keys to be cloned Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware se.....»»
Sonic the Hedgehog 3 review: a dark, electrifying sequel
Paramount has reached an electrifying new high with Sonic the Hedgehog 3, which features incredible visuals, an emotional story, and terrific performances......»»
New MacBook Air OLED timeline reveals two unfortunate drawbacks
Last week we received word that the MacBook Pro would be getting OLED and lose its notch starting in 2026. That same report also detailed the OLED timeline for Apple’s other products, and it doesn’t look great for the MacBook Air in two key ways......»»
Deals: Apple Watch Ultra 2 doorbuster price, AirTag 4-pack down at $70 ($17.50 each), action cams, more
We are ready to cap off the work week with a fresh batch of discounts alongside ongoing lows at up to $250 off on Apple’s most affordable M4 and M4 Pro MacBook Pro configurations. The last round of Doorbuster deals from Best Buy before the holidays.....»»
Here are 20+ last-minute Apple gift ideas with holiday delivery
Are you still racing to finish your holiday shopping? Don’t worry, me too. Here are some last-minute ideas for the Apple and tech fans in your life – all of which should arrive in time for Christmas gift-giving next week. more….....»»
Advancing light control: New opportunities for metasurfaces in optoelectronics
A global review of advancements in integrating metasurfaces—thin planar arrays of nanostructures—into optoelectronic devices highlights their potential to transform technologies such as light emitting diodes (LEDs), lasers, optical modulators, an.....»»
We might new Steam Deck next month — and Valve isn’t making it
I suspected to see some new this year at CES, but it looks like something even more exciting is in store. AMD and Lenovo are hosting an event during the week of the show, and it’ll have two special guests in attendance: Valve’s Pierre-Lou.....»»
Bluesky extortion problem gets first response; Mentions tab added
We learned earlier this week of a Bluesky extortion issue, emerging after the social network said that it would use domain name ownership as a way to verify the identity of public figures. Bluesky hasn’t fully addressed the issue, but has taken.....»»
How to use AirTag sharing when travelling with family and friends
I didn’t waste any time when AirTags first came out, immediately buying eight of them: for five bags, keys, a videography rig, and a bicycle. But I’ve also repurposed some of them during trips for some AirTag sharingwith friends, and iOS 18.2 mak.....»»
New infosec products of the week: December 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian unveiled a.....»»
AI is becoming the weapon of choice for cybercriminals
AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»
Why cybersecurity is critical to energy modernization
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»
Episode One Projector review: Cheap and compact, with consequences
Episode One is a small, budget projector that delivers the features you'd expect, but it has weaknesses in brightness and audio.Episode One Projector reviewA small projector simply saves space. They're great to have in dorms, apartments, and other sm.....»»
Apple stops signing iOS 18.1.1, blocking downgrade from 18.2
Apple on Thursday stopped signing iOS 18.1.1, preventing users from downgrading to this version of the operating system if their iPhone or iPad is already running a newer version. The move comes a week after the release of iOS 18.2, which introduced.....»»
Hybrid dune experiment tests erosion resistance during storms
Last week, a 100-meter-long test dune was raised on the coast near Monster. A hybrid dune, consisting of a combination of sand and hard elements. Researchers from TU Delft are monitoring how different configurations erode during stormy weather condit.....»»
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions.....»»
CISA orders federal agencies to secure their Microsoft cloud environments
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»
Stalker 2’s 110GB patch includes a whopping 1800 updates
Stalker 2: Heart of Chornobyl is getting a much-needed update to fix the buggy A-Life system. The patch is 110GB, with more than 1,800 changes......»»
Your Oura Ring’s 2024 Year in Review is now live. Here’s how to find it
Oura Ring is one of the best smart rings you can get on the market, and now you can view your year in review......»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Are threat feeds masking your biggest security blind spot?
Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind spo.....»»