Security News

TunnelBear VPN Review 2024: Pricing, Ease of Use & Security
2024-11-14 13:00

Read our in-depth analysis of TunnelBear VPN, covering its pricing, ease of use, security features, and more. Find out if this is the right VPN for you.

New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones
2024-11-14 12:05

Everybody is reporting about a new security iPhone security feature with iOS 18: if the phone hasn’t been used for a few days, it automatically goes into its “Before First Unlock” state and has to...

Kids' shoemaker Start-Rite trips over security again, spilling customer card info
2024-11-14 11:57

Full details exposed, putting shoppers at serious risk of fraud Children's shoemaker Start-Rite is dealing with a nasty "security incident" involving customer payment card details, its second...

Asda security chief replaced, retailer sheds jobs during Walmart tech divorce
2024-11-14 09:30

British grocer's workers called back to office as clock ticks for contractors The head of tech security at Asda, the UK's third-largest food retailer, has left amid an ongoing tech divorce from US...

Infostealers increasingly impact global security
2024-11-13 13:08

Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the...

Comprehensive Guide to Building a Strong Browser Security Program
2024-11-13 11:00

The rise of SaaS and cloud-based work environments has fundamentally altered the cyber risk landscape. With more than 90% of organizational network traffic flowing through browsers and web...

CISOs in 2025: Balancing security, compliance, and accountability
2024-11-13 05:30

In this Help Net Security interview, Daniel Schwalbe, CISO at DomainTools, discusses the intensifying regulatory demands that have reshaped CISO accountability and daily decision-making. He...

North Korean hackers create Flutter apps to bypass macOS security
2024-11-12 13:00

North Korean threat actors target Apple macOS systems using trojanized Notepad apps and minesweeper games created with Flutter, which are signed and notarized by legitimate Apple developer IDs. [...]

The changing face of identity security
2024-11-12 06:00

It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that...

The ROI of Security Investments: How Cybersecurity Leaders Prove It
2024-11-11 11:30

Cyber threats are intensifying, and cybersecurity has become critical to business operations. As security budgets grow, CEOs and boardrooms are demanding concrete evidence that cybersecurity...