![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101224/sap2-400x200.jpg)
SAP systems: The threat of insecure configurations
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
![Android explode](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103322/android-explode-400x200.jpg)
New Rowhammer attack can be used to hack Android devices remotely
Researchers from Vrije Universiteit in Amsterdam have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones. What is a Rowhammer attack? …
![Twitter](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101156/twitter-400x200.jpg)
Twitter reveals security blunder, asks users to change their passwords
330 million Twitter users around the world have been urged to change their account password after a glitch resulted in some of them being stored in plaintext format inside the …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
Which type of biometrics are consumers most comfortable providing?
Consumers feel more comfortable with fingerprint scanning than with other types of biometric technology, including face, eye, voice and other biometric measurements, according …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101159/arrows-400x200.jpg)
The importance of threat intelligence and vulnerability remediation prioritization
In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat …
![building blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111907/building_blocks-400x200.jpg)
Organizations should not overestimate the short-term benefits of blockchain
Only 1 percent of CIOs indicated any kind of blockchain adoption within their organizations, and only 8 percent of CIOs were in short-term planning or active experimentation …
![access](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102841/access-400x200.jpg)
SecBI to support Orange Polska in augmenting its managed security services
SecBI announced an agreement with Orange Polska in the field of network security. The strategic partnership was signed following a proof-of-concept (PoC) by SecBI running …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110707/keys-400x200.jpg)
Crypto flaw in Oracle Access Manager can let attackers pass through
A padding oracle vulnerability in Oracle Access Manager (CVE-2018-2879) can be exploited by attackers to bypass authentication and impersonate any user account. About the …
![Cisco WebEx](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105257/cisco_webex-400x200.jpg)
It’s time to update your Cisco WebEx software again!
Cisco has released security updates for a variety of its offerings, including some that fix critical remote code execution vulnerabilities in Webex software, Cisco Secure ACS …
![(IN)SECURE Magazine RSAC 2018](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101205/insecure-rsaconference2018-400x200.jpg)
(IN)SECURE Magazine: RSAC 2018 special issue released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 57.5, dedicated entirely to RSA Conference 2018, …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102947/password-400x200.jpg)
Password behaviors remain largely unchanged
Despite today’s increased threat landscape and heightened global awareness of hacking and data breaches, password behaviors remain largely unchanged. Data from a survey …
![Vera](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104941/vera-400x200.jpg)
Securing the digital future with Vera and Canon Solutions America
In this podcast recorded at RSA Conference 2018, Ajay Arora, founder of Vera Security, and Peter Kowalczuk, President at Canon Solutions America, talk about their recent …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage