![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
You should know that most websites share your in-site search queries with third parties
If you are using a website’s internal search function, chances are good that your search terms are being leaked to third parties in some form, researchers with …
![video call](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/28130628/videocall-remotework-400x200.jpg)
Nation-state attacks are a growing threat to video conferencing
Zerify announced the findings of a survey that indicate that IT professionals are becoming increasingly concerned about the growing number of cyber threats and foreign attacks …
![coronavirus](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/05133610/coronavirus-cybercrime-400x200.jpg)
COVID-19 data put for sale on the Dark Web
Resecurity, a California-based cybersecurity company protecting Fortune 500, has identified leaked PII stolen from Thailand’s Department of Medical Sciences containing …
![Data](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/07091136/data_1-400x200.jpg)
Data security hinges on clear policies and automated enforcement
In 2003, California became the first U.S. state to require and implement a series of data breach notification laws designed to protect against the misuse of residents’ …
![cookies](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/18192925/cookies-400x200.jpg)
Exploiting stolen session cookies to bypass multi-factor authentication (MFA)
Active adversaries are increasingly exploiting stolen session cookies to bypass multi-factor authentication (MFA) and gain access to corporate resources, according to Sophos. …
![Ring Android app](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/18130901/ring-android-app-1280-400x200.jpg)
Vulnerability in Amazon Ring app allowed access to private camera recordings
A vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could have been …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104929/iot-400x200.jpg)
Data privacy regulation a top three challenge for IoT adopters
Fears over security have become less of a concern for organizations adopting IoT solutions than it was five years ago, according to a recent study by Wi-SUN Alliance, a global …
![tracking](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/26160511/track-eye-400x200.jpg)
Up to 90% of governmental websites serve cookies or third-party trackers
In some countries up to 90% of governmental websites add third-party tracker cookies without users’ consent. This occurs even in countries with strict user privacy laws, …
![mask](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112954/mask-400x200.jpg)
Researchers defeat facial recognition systems with universal face mask
Can attackers create a face mask that would defeat modern facial recognition (FR) systems? A group of researchers from from Ben-Gurion University of the Negev and Tel Aviv …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102703/privacy-400x200.jpg)
Are your site’s tracking technologies breaking the law?
Two irresistible yet conflicting forces are creating a real risk for businesses that operate on the web, which is every business that exists in 2022. Those forces are tracking …
![tracking](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/26160511/track-eye-400x200.jpg)
Nearly all governmental websites serve cookies or third-party trackers
In some countries up to 90% of governmental websites add third-party tracker cookies without users’ consent. This occurs even in countries with strict user privacy laws, …
![Apple Lockdown Mode](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/07114755/apple-lockdown-mode-hns-400x200.jpg)
Apple previews Lockdown Mode to protect users from targeted spyware
In this Help Net Security video, you’ll learn more about Lockdown Mode, a security capability from Apple that offers specialized additional protection to users who may …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege