![access](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110948/access-400x200.jpg)
Facebook gave user data access to Chinese mobile device makers, too
On Sunday, The New York Times revealed that Facebook has been providing mobile phone and tablet vendors access to user (and users’ friends’) data even though the …
![files](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110451/files-400x200.jpg)
MyHeritage suffers data breach, account details of 92+ million users compromised
Israel-based genealogy and DNA testing company MyHeritage has apparently suffered a data breach that resulted in the compromise of email addresses and hashed passwords of all …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103241/work-400x200.jpg)
Key challenges and frustrations of SOC workers
Technology challenges, hiring and staffing issues, processes and pain points, as well as finance and funding difficulties have the potential to limit the ability of SOCs to …
Qualys streamlines supply chain GDPR compliance assessment with cloud app
Qualys announced new functionality in its Security Assessment Questionnaire (SAQ) cloud app that allows customers to better achieve visibility of data across their own network …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100906/infosecurity-europe-18-400x200.jpg)
Photo gallery: Infosecurity Europe 2018 Expo
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Qualys, Barracuda Networks, ECSC Group, Forcepoint, Pen …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102737/mobile_work-400x200.jpeg)
Most businesses still struggling with mobile working and security
95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and worryingly, 18% suggest their mobile workers don’t care about security, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Sophisticated keyloggers target the finance industry
Lastline found three separate strains of keylogger malware that are currently targeting finance. Lastline’s analysis of the 100 most recent malware samples found among finance …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Zip Slip vulnerability affects thousands of projects
An arbitrary file overwrite vulnerability that can be exploited by attackers to achieve code execution on a target system affects a myriad of projects and multiple ecosystems, …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
The harsh realities of endpoint management
88 percent of IT professionals acknowledge the importance of endpoint management, yet 30 percent don’t know how many they have. LogMeIn released findings of a new global …
![London](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195027/london-400x200.jpg)
UK businesses overlook external providers when developing cyber strategies
Large businesses in the UK could be falling short when it comes to assessing the cyber resilience of external providers within their supply chain network, according to new …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
New security, privacy features in iOS 12 and macOS Mojave
Apple has announced a slew of new features for iOS 12 and macOS Mojave (10.14), but also some security and privacy improvements that should make privacy-minded users very …
![handshake](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101343/handshake-400x200.jpeg)
How security leaders can be empowered to drive results
The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage