![(IN)SECURE Magazine 58](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100752/insecure58-400x200.jpg)
(IN)SECURE Magazine issue 58 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
F-Secure acquires MWR InfoSecurity
F-Secure has signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in …
![storm](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101719/storm-400x200.jpg)
Week in review: Digital signature spoofing, securing microservices
Here’s an overview of some of last week’s most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, …
![GnuPG](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110936/gnupg-400x200.jpg)
Vulnerability in GnuPG allowed digital signature spoofing for decades
A vulnerability affecting GnuPG has made some of the widely used email encryption software vulnerable to digital signature spoofing for many years. The list of affected …
![Cybric dashboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100801/cybric-dashboard-400x200.jpg)
New infosec products of the week: June 15, 2018
Container security from dev to production Sysdig released Sysdig Secure 2.0, that enables enterprises to secure containers and microservices. The latest version adds …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Exploring the maturity of corporate security awareness programs
Cyber security awareness programs are beginning to gain ground among businesses, but many of the professionals responsible for their implementation are challenged by a lack of …
![mobile worker](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104400/mobile_worker-400x200.jpg)
The challenges of securing mobile workers and keeping data secure
Recently, Apricorn announced new research highlighting that 95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and nearly one in …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113522/lock-eye-400x200.png)
New trends advance user privacy
Privacy and security online are one of the top concerns of Americans, especially after numerous massive data breaches (Equifax, Yahoo, Uber) that happened in the past couple …
![jet engine](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100806/jet-engine-400x200.jpg)
Most aerospace and defense companies to integrate blockchain by 2021
Approximately six in seven aerospace/defense companies (86 percent) expect to integrate blockchain into their corporate systems within three years, according to a new research …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100828/apple2-400x200.jpg)
Apple prohibits developers from using, selling users’ Contacts
According to new rules recently published by Apple, iOS app developers must refrain from creating a database of the information gleaned from users’ Contacts and to sell …
![Tapplock](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100804/lock-1-400x200.jpg)
Researcher hacks smart fingerprint padlock in mere seconds
The Tapplock one “smart” padlock, which received many rave reviews by tech-focused news sites and YouTubers, can be forced to open in under two seconds with a …
![blockchain](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100809/blockchain-400x200.jpg)
Don’t start the blockchain revolution without making security a top priority
McAfee released a report detailing the numerous cybersecurity risks associated with blockchain-based cryptocurrencies, and asserts the necessity of making cybersecurity a top …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)