Help Net Security

Endpoint Protector 5: Responsive interface and updated eDiscovery module
CoSoSys released Endpoint Protector 5 with updates on the management console which has been redesigned for a modern, user-friendly and responsive experience. “Endpoint …

Centrify Identity Platform now secures Mac endpoints
Centrify announced enhancements to the Centrify Identity Platform that deliver local administrator password management for Macs and Mac application management and software …

Enterprise endpoint security: Millions of devices still running outdated systems
Duo Security analyzed the security health of 4.6 million endpoint devices, including 3.5 million mobile phones across multiple industries and geographic regions. With …

High-Tech Bridge named a Cool Vendor by Gartner
High-Tech Bridge has been named a Cool Vendor in Gartner’s May 2017 research “Cool Vendors in Security for Midsize Enterprise 2017” by Adam Hils. High-Tech …

It’s time for a common sense security framework
Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board …

The cost of IoT hacks: Up to 13% of revenue for smaller firms
Nearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, …

Police dismantle organised crime network suspected of online payment scams
The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime …

Week in review: Fireball malware infects 250 million computers, attacks within the Dark Web
Here’s an overview of some of last week’s most interesting news and articles: OneLogin suffers data breach, again OneLogin, a popular single sign-on service that …

FTSE companies lack secure data collection methods
With less than a year remaining until the commencement of the GDPR, new research reveals that more than one-third of all public web pages of FTSE 30 companies capturing …

Weak DevOps cryptographic policies increase financial services cyber risk
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …

Fireball malware infected 250 million computers worldwide
Check Point researchers discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, named Fireball, takes …

Ready or not, IoT third party risks are here
A new survey conducted by The Ponemon Institute uncovered a high rate of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act