software
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111540/collaboration-400x200.jpg)
The risks associated with the influx of unauthorized collaboration tools
A majority (82 percent) of end-users are pushing back on IT or management when the company tries to dictate which collaboration tools should be used. But IT is standing its …
![WinRar](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095152/winrar-400x200.jpg)
500 million WinRAR users open to compromise via a 19-year-old flaw
A vulnerability affecting all versions of WinRAR, the popular file archiver utility for Windows, could be exploited by attackers to deliver malware via specially crafted ACE …
![NGINX](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095223/nginx-400x200.jpg)
Building security into cloud native apps with NGINX
Companies like Airbnb, Uber and DoorDash, which have a cloud-based software infrastructure as one of their main enablers, are disrupting the hospitality, transportation and …
![Veriato Cerebral](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095240/veriato-cerebral-400x200.jpg)
Product showcase: Veriato Cerebral user & entity behavior analytics software
When it comes to identifying and stopping insider data security threats, actionable insights into people’s behaviors are invaluable. Employees involved in negative workplace …
![Google hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103340/google-hand-400x200.jpg)
Google also abused its Apple developer certificate to collect iOS user data
It turns out that Google, like Facebook, abused its Apple Enterprise Developer Certificate to distribute a data collection app to iOS users, in direct contravention of …
![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105943/firefox-independent-1200.5bd827ccf1ed-400x200.jpg)
Mozilla releases anti tracking policy, enhances tracking protection in Firefox 65
Mozilla has released Firefox 65, which includes enhanced, configurable protection against online tracking. The organization has also published an official anti tracking policy …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Researcher warns of privilege escalation flaw in Check Point ZoneAlarm
Illumant researcher Chris Anastasio has discovered a serious vulnerability in Check Point’s security software. It affects ZoneAlarm Free Firewall and ZoneAlarm Free Antivirus …
![router](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100046/router-400x200.jpg)
Most popular home routers lack basic software security features
It’s no secret that too many Internet of Things devices lack adequate security. But is it too much to expect that out home routers – the devices that …
![Circle eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194150/circle3-400x200.jpg)
Post-exploitation scanning tool scavenges for useful information
Philip Pieterse, Principal Consultant for Trustwave’s SpiderLabs, has demonstrated at Black Hat Arsenal Europe 2018 a new tool for penetration testers called Scavenger. …
![Pliz PNOZmulti Configurator](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095619/PNOZmulti_Configurator-400x200.jpg)
Vulnerability discovered in safety controller configuration software
Gjoko Krstic, an Applied Risk researcher, has discovered a vulnerability in Pilz PNOZmulti Configurator software that allows a local attacker to read sensitive data in …
![Cynet platform](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095647/cynet-platform-400x200.jpg)
Product showcase: Cynet 360 Security Platform
Resource-constrained companies that want to protect their internal environments from cyberattack face an impossible challenge: they need to spend a lot of money to buy …
![Blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101432/blocks-400x200.jpg)
For recent big data software vulnerabilities, botnets and coin mining are just the beginning
The phrase “with great power comes great responsibility” was excellent advice when Ben Parker said it to his nephew Peter, aka Spiderman. It is even more …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints