Please turn on your JavaScript for this page to function normally.
Android
Google will check apps by new developers more thoroughly

In an attempt to thwart Android developers who are set to distribute malicious apps through Google Play, Google will be taking more time when reviewing apps by developers with …

Microsoft
Microsoft 365 security: Protecting users from an ever-evolving threat landscape

In this age of frequent security and data breaches, the statement “We take our customers’ privacy and security very seriously” has been heard from breached …

FileTSAR
FileTSAR: Free digital forensic investigations toolkit for law enforcement

Purdue University cybersecurity experts have created FileTSAR, an all-in-one digital forensic investigations toolkit for law enforcement. About FileTSAR FileTSAR, which stands …

patch
April Patch Tuesday Forecast: Be aware of end-of-service issues and browser exploits

April Patch Tuesday is nearly here with two significant topics of concern. The first relates to end-of-service milestones and the second issue is browser exploits. Let’s start …

Anomali STAXX
Anomali: Threat detection, investigation and response

In this Help Net Security podcast recorded at RSA Conference 2019, Nicholas Hayden, Senior Director of Threat Intelligence at Anomali, talks about how Anomali arms security …

email
Automatically and invisibly encrypt email as soon as it is received on any trusted device

While an empty email inbox is something many people strive for, most of us are not successful. And that means that we probably have stored away hundreds, even thousands, of …

mobile apps
Consumers willing to dump apps that collect private data, but can’t tell which are doing so

Consumers are increasingly leery of third parties using and capitalizing on their private data. Two in three consumers are willing to dump data-collecting apps if the …

up
Worldwide spending on security solutions expected to continue growing

Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019, an increase of 9.4% over 2017. This pace of growth is …

traffic
Quality Assurance and Testing is a bottleneck to implementing DevOps for many organizations

The practice of Continuous Testing – the process of fast and efficient validation of software releases in agile developments through highly automated tests – is gaining ground …

Android Q
Android Q will come with improved privacy protections

Android Q, the newest iteration of Google’s popular mobile OS, is scheduled to be made available to end users at the end of August. While we still don’t know what …

collaboration
2019 may be a record year for enterprise breaches, but secure collaboration tools could help

Despite business executives agreeing that cybersecurity is a major challenge, businesses globally are severely unprepared for cyberattacks. 44% of business executives from …

NSA unveils Ghidra reverse engineering tool at RSA Conference 2019

The National Security Agency (NSA) has released Ghidra, a free and cross-platform software reverse engineering tool suite used internally by the intelligence agency. They are …

Don't miss

Cybersecurity news