![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101030/google_chrome-400x200.jpg)
Chrome to dynamically point out “Not secure” HTTP sites
Google expects HTTPS to become the default, and is preparing users for it by slowly moving Chrome towards showing only negative security indicators. Google’s own numbers …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102540/GDPR-400x200.jpg)
Are you ready for the GDPR deadline?
The General Data Protection Regulation (GDPR) compliance deadline looms four days away, but only 29 percent of companies will be ready, according to a new global survey by …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
Don’t let attackers worm their way in: Increase password security
Passwords are inherently the weakest form of authentication, yet they remain the most prevalent. Many organizations realize that moving beyond this single point of …
![PCI DSS](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102031/pci_dss-400x200.jpg)
PCI Security Standards Council publishes PCI DSS 3.2.1
PCI DSS version 3.2.1 replaces version 3.2 to account for effective dates and SSL/early TLS migration deadlines that have passed. No new requirements are added in PCI DSS …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches
Here’s an overview of some of last week’s most interesting news, podcasts and articles: How can Office 365 phishing threats be addressed? The frequency of phishing …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101037/android-400x200.jpg)
Google will force Android OEMs to push out security patches regularly
Android P, the ninth major version of the widely-used mobile OS, is expected to be released later this year. Google has already announced a slew of security and privacy …
![evil](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102415/evil-400x200.jpg)
Internet of Things: Who is watching you?
An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110925/europe-400x200.jpg)
Europe continues to be a cybercrime hub
ThreatMetrix announced new data revealing a 30 percent year-on-year increase in the volume of cyberattacks hitting Europe in the first quarter of 2018. As attacks patterns …
![Barracuda Networks](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101044/WAFaaS-400x200.png)
New infosec products of the week: May 18, 2018
Monitor user and entity behaviors to prevent advanced attacks Gurucul Fraud Analytics uses purpose-built machine learning models to correlate cross-channel behaviors and …
![802 Secure](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101039/iot-risks-802secure-400x200.jpg)
Relying on legacy security technologies leaves you blind to IoT threats
As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195815/dollar-943737_1280-400x200.jpg)
CUJO AI closes strategic Series B round
CUJO AI today announced it has closed a strategic Series B round, led by Charter Communications. This new investment will fuel the expansion of the company. Powered by machine …
![Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105855/telegram-danger-400x200.jpg)
Telegrab: Russian malware hijacks Telegram sessions
Researchers have discovered and analyzed an unusual piece of malware that, among other things, seeks to collect cache and key files from end-to-end encrypted instant messaging …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)