![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100855/architecture-400x200.jpg)
Government embracing digital transformation but struggling to implement data security
The push towards digital transformation in the U.S. government is putting sensitive data at risk, according to a Thales research conducted by analyst firm IDC. The 2019 Thales …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094437/alert-400x200.jpg)
Week in review: Docker Hub breach, identifying malware in embedded systems, CCPA implementation
Here’s an overview of some of last week’s most interesting news and articles: Mozilla will block Firefox add-ons that contain obfuscated code Mozilla has announced that, …
![reload](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102722/reload-400x200.jpg)
New infosec products of the week: May 3, 2019
Trustwave unveils new database security scanning and testing software Trustwave unveiled Trustwave DbProtect, new database security scanning and testing software that helps …
![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105943/firefox-independent-1200.5bd827ccf1ed-400x200.jpg)
Mozilla will block Firefox add-ons that contain obfuscated code
Mozilla has announced that, starting from June 10, Firefox add-ons containing obfuscated code will no longer be allowed on its Add-ons portal and will be blocked. “We …
![Google security](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100518/google_security-400x200.jpg)
Google offers auto-delete option for location, web tracking history
Google has added a control option to users’ accounts that will allow them to instruct the company to auto-delete their location history, browsing and search data once a …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Consumers care deeply about their privacy, security, and how their personal information is handled
65% of consumers are concerned with the way connected devices collect data. More than half (55%) do not trust their connected devices to protect their privacy and a similar …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100043/dislike2-400x200.jpg)
Cybercriminals targeting social media: Facebook and Instagram are becoming phishers’ favorites
Social media phishing, primarily Facebook and Instagram, saw the highest quarter- over-quarter growth of any industry with a 74.7 percent increase, according to the Vade …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094752/laptop-400x200.jpg)
Cybercriminals thriving on companies overlooking fundamental security requirements
IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
60% of businesses have experienced a serious security breach in the last two years
There is an increase in security breaches and businesses still face challenges surrounding cyberattacks due to lack of IT security and operations basics. With digital …
![crypto currency](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101455/crypto_currency2-400x200.jpg)
A wave of regulation is coming to the cryptocurrency economy
There is a concerning trend of cross-border crypto payments leaving U.S. exchanges and entering offshore and untraceable wallets, a CipherTrace report reveals. In the twelve …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101227/sap-400x200.jpg)
50,000 companies running SAP installations open to attack via publicly released exploits
Two exploits publicly released in late April at the OPCDE security conference in Dubai could be leveraged to compromise a great number of SAP implementations, Onapsis has …
![wolf](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094428/wolf-400x200.jpg)
Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws
Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine …
Featured news
Resources
Don't miss
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS