Help Net Security
Worldwide wireless 5G connections reach 298 million in Q1 2021
The state of the race for the fifth generation of wireless (5G) subscriber adoption has tightened up significantly, as global wireless 5G connections for Q1 2021 reached 298 …
Week in review: PoC for Windows Print Spooler flaw leaked, conquering synthetic identity fraud
Here’s an overview of some of last week’s most interesting news and articles: PoC for critical Windows Print Spooler flaw leaked Microsoft has confirmed that the …
Single page web applications and how to keep them secure
Application developers such as Airbnb, Pinterest and LinkedIn showcase a new approach to designing and building modern web applications. Using what is known as a single page …
How facial recognition solutions can safeguard the hybrid workplace
The number of US adults teleworking due to the pandemic fell by 30% between January and May 2021 (from 23% to 16%), with the biggest drop in May. As more employees return to …
How mobile operators view security in the 5G era
There’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G …
Most enterprises started a modernization program due to the pandemic
Advanced released a report which examines the current mainframe market, the associated challenges facing large enterprises worldwide, and the impact COVID-19 has and will …
Decision makers divided about cloud technology adoption
As businesses seek technology solutions that help us prepare for a new post-pandemic normal, cloud adoption rates continue to rise. In fact, according to research, 67% of all …
Resilience by design: What security pros need to know about microlearning
It’s no secret that security training is failing us. Research has revealed that more 90% of people struggle to identify a phishing email — arguably one of the most basic …
Protecting your organizations against BEC and other email attacks
No matter who you talk to or work with, they probably use email as a primary means of communication. Most of us spend about 5 hours a day checking email, sometimes refreshing …
Industrial facilities progressively at risk of data theft and ransomware attacks
Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial …
Enhancing cloud security with a two-step cryptography technique
The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …
Secure AI is the foundation of trustworthy AI
AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)