
Week in review: Malicious Python packages, FaceApp panic, and how to avoid a biometric dystopia
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Do you have what it takes to be a hardware hacker? If you ask Yago Hansen, a hacker …

4 years after data breach, Slack resets 100,000 users’ passwords
Roughly 100,000 Slack users are getting their password reset and will have to choose a new one. The reason? During the data breach the company suffered in 2015, the attackers …

New infosec products of the week: July 19, 2019
Perimeter 81 ensures zero trust access to web applications without an agent Zero Trust Application Access is designed to meet the demands of today’s ever-expanding modern …

NSS Labs test exposes weaknesses in NGFW products
Firewalls are the most widely deployed network security devices. Enterprises expect next generation firewalls (NGFWs) to prevent exploits and malware from infecting critical …

New open source solution reduces the risks associated with cloud deployments
An open source user computer environment (UCE) for the Amazon Cloud, called Galahad, has been launched by the University of Texas at San Antonio (UTSA). The technology will …

Business owners prioritize investment in technology over upskilling
Business owners say their strategy is to prioritize investing in technology (52%) over upskilling (24%) their workforce, according to Adecco. The research titled, People, …

Mobile ID schemes take the lead over digital identity cards
The number of people using government-issued digital identity credentials will grow by over 150% from an expected 1.7 billion in 2019 to over 5 billion in 2024, according to …

Malicious Python packages found on PyPI
Researchers have uncovered another batch of malicious Python libraries hosted on Python Package Index (PyPI). The malicious packages PyPI is the official third-party software …

FaceApp privacy panic: Be careful which apps you use
The privacy panic over FaceApp, the selfie-editing mobile app that makes photo subjects younger, older or turns them into members of the opposite sex, has been overblown. The …

True passwordless authentication is still quite a while away
The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose …

Skills gap remains a top barrier to SD-WAN adoption
SD-WAN security drives selection, skills gaps remain a primary obstacle to adoption, and adoption continues to rise, according to Masergy. The survey, conducted in partnership …

The true potential of 5G for businesses
Technology is transforming our world beyond recognition and both public and private sector organizations are at a tipping point where they must embrace digital transformation …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices