Please turn on your JavaScript for this page to function normally.
jackal
Cardholders still dropping the ball when it comes to basic ID theft prevention

Four in 10 people with a credit or debit card have provided their full Social Security number in an online form in the past month, according to a new report from CompareCards, …

wireless
Researchers develop cheaper, more efficient Internet connectivity for IoT devices

A cheaper and more efficient method for IoT devices to receive high-speed wireless connectivity has been developed by researchers at the University of Waterloo. With 75 …

numbers
Quantum computing market revenue to reach $9.1 billion annually by 2030

Quantum computing can best be defined as the use of the attributes and principles of quantum mechanics to perform calculations and solve problems. The global market for …

ThreatConnect whitepaper
Whitepaper: Security Orchestration with Threat Intelligence

Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. This …

attack
Week in review: Mass iPhone hacking, SSL VPNs under attack, SOC analysts overwhelmed

Here’s an overview of some of last week’s most interesting news, articles and podcasts: Cybersecurity in the age of the remote workforce Users can be set up for a …

iPhone 8
Google discovers websites exploiting iPhones, pushing spying implants en masse

Unidentified attackers have been compromising websites for nearly three years, equipping them with exploits that would hack visiting iPhones without any user interaction and …

Google Play
Google will pay for data abuse reports related to popular Android apps, Chrome extensions

Google is expanding the Google Play Security Reward Program (GPSRP) to include all apps in Google Play with 100 million or more installs, and is launching a new Developer Data …

idea
CISO priorities: Implementing security from the get-go

Dr. David Brumley, CEO of ForAllSecure, a Carnegie Mellon computer science professor (on leave), and part of the team that won the DARPA Cyber Grand Challenge, was, at one …

Laptop
Cybersecurity in the age of the remote workforce

With the advent of cloud services and the proliferation of high end mobile devices (think iOS devices and Android phones), the workforce is moving inexorably to a mobile one …

danger
Fileless attacks designed to disguise malicious activity up 265%

Trend Micro published its roundup report for the first half of 2019, revealing a surge in fileless attacks designed to disguise malicious activity. Detections of this threat …

Qualys
Knowing what’s on your hybrid-IT environment is fundamental to security

In this Help Net Security podcast recorded at Black Hat USA 2019, Shiva Mandalam, VP of Products, Visibility and Control at Qualys, talks about the importance of visibility. …

hand
What can be done about the rising click interception threat?

Ad networks’ increasingly successful efforts to detect bot-based ad click fraud has forced attackers to focus more on intercepting and redirecting legitimate users’ …

Don't miss

Cybersecurity news