![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100740/googleplay-400x200.jpg)
Google lays groundwork for secure offline app distribution
Google will start adding security metadata to Android application packages (APKs) distributed via Google Play, so that users with limited internet access can check whether the …
![Idea](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101427/idea-400x200.jpg)
Execs don’t believe their companies learn the right lessons in cybersecurity
A majority of executives around the world feel their organizations can do better when it comes to learning from their past cyber mistakes, according to the results of a newly …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
Inferring Internet security posture by country through port scanning
In this podcast, Tod Beardsley, Director of Research at Rapid7, talks about the recently released National Exposure Index, which aims to better understand the nature of …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101840/insider_threat-1-400x200.jpg)
Employee negligence still poses major security concerns
With one-third of working adults in the U.S. admitting to potentially risky behavior at work, employee negligence poses major security concerns for U.S. businesses, according …
![Google Firebase](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100745/google-firebase-400x200.jpg)
3,000+ mobile apps leaking data from unsecured Firebase databases
Appthority published research on its discovery of a new HospitalGown threat variant that occurs when app developers fail to require authentication to Google Firebase …
![reload](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102722/reload-400x200.jpg)
Visibility across the digital experience is critical to manage it successfully
Riverbed found that 99% of business decision makers agree that optimizing digital performance is essential to business performance, and 98% agree that digital, including the …
![World map](https://img.helpnetsecurity.com/wp-content/uploads/2015/05/09194559/world2-400x200.jpg)
CyberMap: Live map of Israel’s cybersecurity ecosystem
During CyberWeek 2018, YL Ventures launched CyberMap, the first live map of Israel’s cybersecurity ecosystem. The live landscape enables interactive filtering based on: …
![iPhone 8](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100748/iphone8_red-400x200.jpg)
iOS 12 will allow users to share their exact location with emergency services
When iOS 12 is released later this year, it will come with a new feature that will allow iPhone users in the US who call 911 to “automatically and securely” share …
![mask](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112954/mask-400x200.jpg)
Fraudster exploited US govt staff info stolen in 2015 OPM breach
The data breach suffered by the Office of Personnel Management (OPM) is, by now, very old news, but some of the people involved and affected are still feeling the …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
Early detection of compromised credentials can greatly reduce impact of attacks
According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and …
![Internet of Things](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110332/iot-400x200.jpg)
Global IoT tech spending to reach $1.2 trillion in 2022
IDC forecasts IoT spending will experience a compound annual growth rate (CAGR) of 13.6% over the 2017-2022 forecast period and reach $1.2 trillion in 2022. The forecast is …
![dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103342/dark-1-400x200.jpeg)
French authorities dismantle Black Hand dark web market
The “Black Hand” forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)