![Java](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195545/Java-400x200.jpg)
Oracle agrees to settle FTC charges it deceived consumers about Java updates
Oracle has agreed to settle Federal Trade Commission charges that it deceived consumers about the security provided by updates to its Java Platform, Standard Edition software …
![User](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195548/entrepreneur-696976_1280-400x200.png)
Human behaviour still the biggest threat to company security
Nuix, a security intelligence and information management technology company, had in-depth conversations with chief information security officers and directors from Fortune 500 …
![clock](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195551/time-430625_1280-400x200.jpg)
Trends that will alter the way IT is consumed in 2016
IndependenceIT made several predictions regarding business computing trends and the consumption of information technology assets. These insights highlight the continued shift …
![Coin](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195553/coin-1080535_960_720-400x200.jpg)
Finance teams becoming involved in cyber risk mitigation oversight
CFOs and their finance teams are toughening policies on suppliers and increasing insurance coverage as they are asked take on a larger role in defending their companies from …
![Juniper Networks](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195617/juniper-400x200.jpg)
Who planted the backdoors in Juniper’s firewalls?
Who put the recently discovered “unauthorized code” in ScreenOS, which effectively opened a backdoor in Juniper’s NetScreen firewall devices and allowed …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
Top trends that will influence your security decisions in 2016
With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103547/general-400x200.jpg)
How BitTorrent activity impacts security ratings
BitSight examined BitTorrent P2P file sharing activity of over 30,700 companies. They looked at the percentage of P2P downloads containing malware, the top torrented …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195621/door_green_lock-400x200.jpg)
New date for migrating off vulnerable SSL and early TLS encryption
Following significant feedback from the global PCI community and security experts, the Payment Card Industry Security Standards Council (PCI SSC) announced a change to the …
![road](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195624/road-400x200.jpg)
Map a path through the issues of cloud, security, data analytics
2016 will be a difficult year to call for the European IT businesses – any of the usual linear progress in the IT industry in 2015 as a result of more powerful technologies …
DDoS protection service: Top vendors in the field
Distributed denial of service (DDoS) attacks have in the past been viewed mostly as a tool of online protest due to Anonymous’ obvious predilection for this service …
Week in review: ScreenOS backdoor, Twitter warns about state-sponsored attacks, and MacKeeper data breach
Here’s an overview of some of last week’s most interesting news and articles: Critical ScreenOS bugs allow undetectable decryption of VPN connections, device …
![Microsoft logo](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195628/Microsoft-logo-400x200.jpg)
Microsoft will stop trusting certificates from 20 Certificate Authorities
Starting on January 2016, Microsoft’s Trusted Root Certificate Program will no longer include twenty currently trusted CAs and will remove their root certificates …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days