Technology

» Auto updated continuously

• Source limited to: Help Net Security

 2021-06-16 09:16 

Help Net Security

Apple fixes actively exploited vulnerabilities affecting older iDevices...

Apple has released a security update for older iDevices (iPhones, iPads and iPods) to fix three vulnerabilities, two of which are zero-days that are apparently actively exploited in attacks in the wild. About the fixed flaws The security update is iOS 12....

 2021-06-16 05:30 

Help Net Security

How to secure data one firewall at a time...

The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to ensure security and governance without frustrating users or slowing innovation. ...

 2021-06-16 05:00 

Help Net Security

Understanding the cloud shared responsibility model...

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, they prioritized practicality over security to avoid business disruption, leavi...

 2021-06-16 04:30 

Help Net Security

Corporate attack surfaces growing concurrently with a dispersed workforce...

Zscaler released a report on the state of corporate attack surfaces. Based on data sourced between February 2020 and April 2021, the report provides a first-ever look at the impact of attack surface exposure during the pandemic. As businesses began offeri...

 2021-06-16 04:00 

Help Net Security

Effects of the pandemic on consumer security behaviors...

IBM announced the results of a global survey examining consumers' digital behaviors during the pandemic, as well as their potential long-term impact on cybersecurity. With society becoming increasingly accustomed to digital-first interactions, the stu...

 2021-06-16 03:30 

Help Net Security

Identity management is now mostly about security...

IDSA released a study based on an online survey of over 500 IT decision makers. The report examines the impact that the pandemic and increase in remote work had on identity and access management (IAM) in the enterprise, as well as the implementation of id...

 2021-06-16 03:00 

Help Net Security

Open source UChecker tool detects vulnerable libraries on Linux servers...

CloudLinux announced UChecker, a free open source tool that scans Linux servers for vulnerable libraries that are outdated and being used by other applications. This provides detailed actionable information regarding which application is using which vulne...

 2021-06-16 02:30 

Help Net Security

Bad cybersecurity behaviors plaguing the remote workforce...

A report from Tessian reveals that 56% of IT leaders believe their employees have picked up bad cybersecurity behaviors since working from home. As organizations make plans for the post-pandemic hybrid workforce, the report reveals how security behaviors ...

 2021-06-16 01:30 

Help Net Security

Kensington's cross-platform solutions enable secure biometric authentication for any device...

Kensington introduced two new cross-platform solutions that feature the latest in biometric authentication, enabling secure biometric authentication in the office, at home, or abroad, on services that include Google, Facebook, Microsoft, and more, on any ...

 2021-06-16 01:15 

Help Net Security

Impinj RAIN RFID reader chips address increasing demand for item connectivity...

Impinj introduced three next-generation RAIN RFID reader chips that enable IoT device makers to meet the increasing demand for item connectivity in retail, supply chain and logistics, consumer electronics, and many other markets. The new Impinj E710, E510...

 2021-06-16 01:00 

Help Net Security

Akamai's enhancements expand possibilities for developers at the edge...

Akamai announces enhancements designed to enable Akamai customers to create and deliver even more user experiences at the edge. Since its introduction, Akamai's EdgeWorkers serverless edge compute solution has empowered developers to build and deliver...

 2021-06-16 00:45 

Help Net Security

SmartBear expands API lifecycle development platform to backend Java developers...

SmartBear has released a new plug-in for SwaggerHub API design to support IntelliJ IDEA, the popular Java-based integrated developer environment (IDE). API developers familiar with IntelliJ IDEA now have ready access to the OpenAPI compliant SwaggerHub AP...

 2021-06-16 00:30 

Help Net Security

Microchip PoE injector simplifies deployment of Wi-Fi 6 access points and small cell nodes...

Organizations can only deploy today's Wi-Fi 6 access points (APs) and 5G small cell access nodes where AC power is available or if their switch can deliver both power and data to them as required. Microchip Technology has created a more flexible and c...

 2021-06-16 00:15 

Help Net Security

EdgeQ 5G chipset-as-a-service model allows customers to configure 5G and AI services...

EdgeQ introduces 5G chipset-as-a-service model, offering customers a future proof platform that can scale 5G and AI features as a function of subscription payments. This new service model is the very first in the chip industry to scale price, performance,...

 2021-06-16 00:00 

Help Net Security

Cohere Technologies partners with VMware to help CSPs improve network and spectrum efficiencies...

As communication service providers (CSPs) move to open radio access network (O-RAN) architectures, the door to innovation opens. Partnering to accelerate this innovation, Cohere Technologies and VMware announced they are developing an O-RAN solution to he...

 2021-06-15 23:45 

Help Net Security

Syniverse and AlefEdge support enterprises in creating their own 5G edge networks...

Syniverse and AlefEdge announced a collaboration to enable global enterprises and their developers to create their own 5G Edge networks and launch 5G Edge applications and services in minutes. The combination of Syniverse's Global SIM and private LTE ...

 2021-06-15 23:30 

Help Net Security

Wipro and Oracle collaborate to help organizations migrate to the cloud...

Wipro announced it is collaborating with Oracle to launch Wipro Zero Cost Transformation, a new offering that helps organizations migrate to the cloud. Wipro is a member of Oracle PartnerNetwork (OPN). As enterprises seek to generate value from the cloud,...

 2021-06-15 23:15 

Help Net Security

Mandiant On-Demand Cyber Intelligence Training builds cyber threat intelligence expertise...

FireEye announced the launch of Mandiant On-Demand Cyber Intelligence Training. As cyber attacks continue to dominate headlines, organizations of all sizes are continuously challenged to find and retain talent. Modern security and risk leaders need to ret...

 2021-06-15 12:09 

Help Net Security

Cyber criminals are targeting digital artists...

Cyber criminals looking for a quick payout and valuables are targeting digital artists using NFTs (non-fungible tokens), warns security researcher Bart Blaze. The attackers are taking advantage of the artists' desire to work and earn money to trick th...

 2021-06-15 06:00 

Help Net Security

How do I select an ITSM solution for my business?...

An IT service management (ITSM) solution guarantees that IT processes and services are combined with the business goals of an organization, thus helping it thrive. To select a suitable ITSM solution for your business, you need to think about a variety of ...

 2021-06-15 05:30 

Help Net Security

To identify cybersecurity vendor sustainability, start with the fundamentals...

With $3.7 billion raised in cybersecurity funding so far this year, 2021 is on track to overcome last year's record $7.8 billion total. Many of these companies have very high valuations and to some experts that sounds like a bubble. As damage from hac...

 2021-06-15 05:00 

Help Net Security

Why XSS is still an XXL issue in 2021...

Cross-site scripting (XSS) attacks take advantage of coding flaws in the way websites or web applications generate input from users. Despite their longstanding reputation as a significant infosec problem, XSS attacks have remained a constant of the OWASP ...

 2021-06-15 04:30 

Help Net Security

VPN attacks up nearly 2000% as companies embrace a hybrid workplace...

Nuspire released a report which outlines new cybercriminal activity and tactics, techniques and procedures (TTPs) with additional insight from Recorded Future. "As companies return to a hybrid workplace, it's crucial that they are aware of the evo...

 2021-06-15 04:00 

Help Net Security

Cloud computing costs skyrocketing as businesses support a remote workforce...

Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves to a hybrid model. In Q2 of 2021, more than 100 senior IT, finance, and operatio...

 2021-06-15 03:30 

Help Net Security

Top threats to consumer cyber safety...

Norton Labs revealed the top cybersecurity trends from January to March 2021. Phishing campaigns remained the number one threat to consumer cyber safety, with top scams relating to the pandemic, including vaccine-oriented, financial relief, and tech suppo...

 2021-06-15 03:00 

Help Net Security

Vaccine passports challenged by data privacy and security implications...

With the ongoing distribution of COVID-19 vaccines across the globe and the broader U.S. economy preparing to reopen, the question of international travel has become a topic of debate. Managing a safe return to travel has been top of mind for many, and as...

 2021-06-15 02:00 

Help Net Security

Neustar TRUSTID Solutions helps orgs improve contact center efficiency and comply with regulations...

Neustar has launched Neustar TRUSTID Solutions, a suite of solutions designed to help organizations reduce fraud, improve contact center efficiency and comply with consumer protection regulations. Mistrust permeates today's connected world, creating n...

 2021-06-15 01:30 

Help Net Security

ShiftLeft helps orgs benchmark and validate the accuracy of ShiftLeft CORE using OWASP Benchmark...

ShiftLeft has released a tool enabling businesses to independently benchmark and validate the accuracy of ShiftLeft CORE using the Open Web Application Security Project (OWASP) Benchmark Project, a Java test suite designed to evaluate the accuracy of vuln...

 2021-06-15 00:30 

Help Net Security

Thales provides data security and identity protection capabilities through Google Workspace...

Thales announced that its CipherTrust Manager and SafeNet Trusted Access have been integrated with Google Workspace Client-side encryption (beta coming soon), a new privacy and confidentiality offering for Google Workspace users. Providing enhanced key ma...

 2021-06-15 00:00 

Help Net Security

Accurics partners with GitLab to contextualize risk across the SDLC...

Accurics announced a technology partnership with GitLab, a single application for the DevOps lifecycle, as well as the general availability of its integration with GitLab's Static Application Security Testing (SAST) solution. Accurics leverages the in...

 2021-06-14 23:30 

Help Net Security

TeamViewer partners with SAP to drive digital transformation in industrial environments...

TeamViewer announced a new partnership with SAP. The companies are joining forces to drive the digital transformation of workplaces and processes in industrial environments. The partnership will help to better address the fast growing need of customers fo...

 2021-06-14 23:00 

Help Net Security

Flashpoint partners with Cyware to deliver enhanced threat intelligence...

Flashpoint announced a partnership with Cyware, the Virtual Cyber Fusion platform provider. The partnership features a joint solution enabling customers to leverage Flashpoint's advanced threat intelligence within the Cyware Virtual Cyber Fusion platf...

 2021-06-14 22:30 

Help Net Security

Edward Choi joins Absolute as SVP of Global Alliances...

Absolute Software announced Edward Choi has joined the company in a newly created role of Senior Vice President of Global Alliances. In this role, Edward will identify and build new market opportunities for Absolute's growing Persistence-as-a-Service ...

 2021-06-14 12:24 

Help Net Security

How a conference room speakerphone might let attackers into your company network...

Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what's being discussed in its proximity, download malicious firmware, achieve and maintain network persistenc...

 2021-06-14 09:49 

Help Net Security

Ransomware attackers are leveraging old SonicWall SRA flaw (CVE-2019-7481)...

Since the beginning of the year, various cyber attackers leveraged a slew of zero-day vulnerabilities to compromise different SonicWall solutions. Crowdstrike now warns that a cyber-criminal group is exploiting CVE-2019-7481 an older SQL injection vulnera...

 2021-06-14 09:12 

Help Net Security

Netacea unveils bot management framework to combat malicious bot attacks...

Netacea unveiled bot management framework. The Business Logic Attack Definition Framework (BLADE) sets the stage for shared understanding and knowledge among vendors, cybersecurity professionals and customers who are proactively tackling an increasing num...

 2021-06-14 08:11 

Help Net Security

SS8 to acquire Bivio Networks to strengthen its platform for improved scalability and performance...

SS8 Networks announced it has entered into an agreement in which SS8 will acquire the assets of Bivio Networks. Bivio is a developer of innovative, high-performance network security platforms for federal and commercial network operators. The investment re...

 2021-06-14 04:30 

Help Net Security

Are your cyber defenses stuck in the sandbox?...

Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions are a protected and isolated environment on a network that simulates a company&...

 2021-06-14 04:00 

Help Net Security

Investing in the right future for the cloud...

In the last decade we have seen cloud technology evolve from a useful competitive business tool to one of the key foundations of the business world. Migrating assets, application and infrastructure to the cloud is an underpinning objective for most digita...

 2021-06-14 03:30 

Help Net Security

Business leaders now feel more vulnerable to cyber attacks...

45% of business leaders claim that their company has experienced more network security incidents as a result of the pandemic, according to a new survey from Telia Carrier. Geographically speaking, 55% of US and 49% of UK respondents have experienced the m...

 2021-06-14 03:00 

Help Net Security

Phishing maintained near-record levels in the first quarter of 2021...

The APWG's new Phishing Activity Trends Report reveals that phishing maintained near-record levels in the first quarter of 2021, after landmark increases of 2020 in which reported phishing websites doubled. The number of reported phishing websites pea...

 2021-06-14 02:30 

Help Net Security

PrivacyMic: A smart home system that doesn't record speech...

Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world's smart speakers. The trouble is that they're capable of hearing everything else, too. But now, a team of...

 2021-06-14 02:00 

Help Net Security

Data teams are discovering the benefits of automation and flexible coding...

Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and enterprise architects. Conducted in Q2 2021, findings from more than 400 U.S.-based dat...

 2021-06-13 08:00 

Help Net Security

Week in review: Microsoft Teams risks, open-source dependencies, DNS's role in network security...

Here's an overview of some of last week's most interesting news and articles: Data sharing in a smart city: Choosing the right approach To achieve a true smart city and improve the quality of life for citizens, it should be a citywide effort. This...

 2021-06-13 00:30 

Help Net Security

Cyborg Security's capabilities combat attacks on critical infrastructure and supply chains...

Cyborg Security unveiled new capabilities within the HUNTER content platform. These capabilities are designed to defend against rapidly evolving threats, including growing attacks on critical infrastructure and supply chains, while reducing Mean-Time-to-D...

 2021-06-12 23:30 

Help Net Security

Snowpark enables AtScale to execute complex analytical functions within the Snowflake Data Cloud...

AtScale announced integration with Snowflake's Snowpark Java UDFs. Snowpark enables AtScale to execute advanced analytic functions within the Snowflake Data Cloud, further optimizing complex analysis, query performance and resource consumption, result...

 2021-06-12 23:00 

Help Net Security

Honeycomb Metrics bridges the gap between traditional debugging practices and modern systems...

Honeycomb announced the availability of Honeycomb Metrics. The new feature enables customers already using observability to quickly identify and resolve application issues by allowing them to correlate metrics-based indicators of system health from the sa...

 2021-06-12 22:30 

Help Net Security

Adrian Szwarcburg joins DigitSec as SVP of business development...

Software industry veteran Adrian Szwarcburg has joined DigitSec, provider of the AppSec testing platform purpose-built for Salesforce, as senior vice president of business development. Szwarcburg most recently was vice president of channel sales and partn...

 2021-06-12 01:30 

Help Net Security

Arctic Wolf Service Assurance helps organizations end cyber risk...

With a proven operational approach to protecting businesses of all sizes and in all industries, Arctic Wolf now provides customers additional peace of mind with Arctic Wolf Service Assurance, should they experience a cybersecurity incident. Introduced as ...

 2021-06-12 00:00 

Help Net Security

IonQ integrates with Cirq, an open-source quantum computing framework from Google...

IonQ announced the full integration of its quantum computing platform with Cirq, an open-source quantum computing framework from Google. Volkswagen Group has already run the "paint shop problem" on IonQ via Cirq and found the performance to be con...

  • Need an account?  
    or