searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

research

Get our top stories in your inbox

You should know that most websites share your in-site search queries with third parties

September 9, 2022

If you are using a website’s internal search function, chances are good that your search terms are being leaked to third parties in some form, researchers with …

CIOs find it most difficult to solve cybersecurity challenges

September 2, 2022

A global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as well as …

Vulnerability in Amazon Ring app allowed access to private camera recordings

August 18, 2022

A vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could have been …

APT41 group: 4 malicious campaigns, 13 victims, new tools and techniques

August 18, 2022

Group-IB has released new research on the state-sponsored hacker group APT41. The Group-IB Threat Intelligence team estimates that in 2021 the threat actors gained access to …

How bad actors are utilizing the InterPlanetary File Systems (IPFS)

August 12, 2022

With the continued rise in adoption of cloud services, bad actors are utilizing the InterPlanetary File System (IPFS) as a new playing ground for phishing attacks. In fact, …

Dissecting Google’s Titan M chip: Vulnerability research challenges

August 9, 2022

The enterprise-grade Titan M security chip was custom built to help protect data. Derived from the same chip Google uses to protect its cloud data centers, it handles …

Browser synchronization abuse: Bookmarks as a covert data exfiltration channel

August 2, 2022

Two universal and seemingly innocuous browser features – the ability to create bookmarks (aka “favorites”) and browser synchronization – make …

Researchers create key tech for quantum cryptography commercialization

July 29, 2022

In modern cryptosystems, users generate public and private keys that guarantee security based on computational complexity and use them to encrypt and decrypt information. …

Cybercrime goods and services are cheap and plentiful

July 27, 2022

Cybercrime is being supercharged through “plug and play” malware kits that make it easier than ever to launch attacks. Cyber syndicates are collaborating with amateur …

The first formal verification of a prototype of Arm CCA firmware

July 18, 2022

As our personal data is increasingly used in many applications from advertising to finance to healthcare, protecting sensitive information has become an essential feature for …

The connected nature of smart factories is exponentially increasing the risk of cyber attacks

July 6, 2022

51% of industrial organizations believe that the number of cyber attacks on smart factories is likely to increase over the next 12 months, according to the Capgemini Research …

Evaluating the use of encryption across the world’s top one million sites

June 30, 2022

A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world’s top one million sites over the last six months and reveals …

Posts navigation

1 2 3 4 5 6 7 … 38

Featured news

  • Apple backports fix for exploited WebKit bug to older iPhones, iPads (CVE-2023-23529)
  • What you need before the next vulnerability hits
  • Running a security program before your first security hire
How to protect online privacy in the age of pixel trackers

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

Apple backports fix for exploited WebKit bug to older iPhones, iPads (CVE-2023-23529)

Europol details ChatGPT’s potential for criminal abuse

What you need before the next vulnerability hits

Running a security program before your first security hire

What the food and building industry can teach us about securing embedded systems

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us