Top

Tag: Featured


Network security, Security

A Controversial Tool Calls Out Vulnerabilities Across the Web

July 27, 2021

Via: Wired

THE WEB HAS long been a playground for hackers, offering up hundreds of millions of public-facing servers to comb through for basic vulnerabilities to exploit. Now one hacker tool is about to take that practice to its logical, extreme conclusion: […]


Access control, Security

Consumer attitudes towards various digital identity authentication methods

July 27, 2021

Via: Help Net Security

With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from Trulioo, 84% of people believe that businesses will need to rely more on automated fraud protection […]


Network security, Security

Product showcase: ManageEngine Vulnerability Manager Plus

July 27, 2021

Via: Help Net Security

Software and hardware vulnerabilities are an ever-present threat to every enterprise. In response to the tedious and time-consuming processes often associated with traditional vulnerability management, enterprise IT administrators have started looking for better alternatives that can integrate with their existing […]


Cloud security, Security

36% of organizations suffered a serious cloud security data leak or a breach in the past year

July 27, 2021

Via: Help Net Security

As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The findings are part of the State of Cloud Security 2021 survey conducted by Fugue and […]


Network security, Security

Windows “PetitPotam” network attack – how to protect against it

July 26, 2021

Via: Naked Security

French researcher Gilles Lionel, who goes by @topotam77, recently published proof-of-concept code that attackers could use to take over a Windows network. The hack, which he has dubbed PetitPotam (which is a nod to the endangered Pygmy Hippopotamus, as far […]


Network security, Security

Norton Security UWP app helps protect Lenovo laptop PCs from hackers and online scams

July 26, 2021

Via: Help Net Security

NortonLifeLock announced that the Norton Security Universal Windows Platform (UWP) app will be pre-installed on select new Lenovo laptop PCs. Expanding its collaboration of more than two decades, NortonLifeLock will help protect Lenovo’s always-on, always-connected laptops, including the Yoga 5G […]


Cyber-crime, Data loss, Malware, Threats & Malware

Macron Among 14 Heads of States on Potential Spyware List

July 21, 2021

Via: Security Week

“The unprecedented revelation … should send a chill down the spine of world leaders,” Amnesty’s secretary general, Agnes Callamard, said in a statement. Among potential targets found on a list of 50,000 phone numbers leaked to Amnesty and the Paris-based […]


Network security, Security

IoT malware attacks rose 700% during the pandemic

July 20, 2021

Via: Help Net Security

Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The report analyzed over 575 million device transactions and 300,000 IoT-specific malware […]


Cyber-crime, Malware, Phishing

Half of organizations are ineffective at countering phishing and ransomware threats

July 19, 2021

Via: Help Net Security

Half of US organizations are not effective at countering phishing and ransomware threats, Osterman Research research reveals. The findings come from a study compiled from interviews with 130 cybersecurity professionals in mid-sized and large organizations. “Phishing and ransomware were already […]


Mobile, Wireless security

Protect your smartphone from radio-based attacks

July 19, 2021

Via: Help Net Security

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone users – such as refraining from opening suspicious links […]