The private health information of more than 4,000 patients was left exposed for 16 years by a US medical transplant center. Virginia Commonwealth University Health System...
The English Premier League has introduced two-factor authentication (2FA) controls to its official Fantasy Premier League game (FPL), offering football fans the option to secure their accounts. The...
Most enterprises struggle to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside attacks, according...
A security researcher has found that attackers could abuse the popular sticker feature in Microsoft Teams to conduct cross-site scripting (XSS) attacks. Microsoft Teams, alongside comparable teleconferencing services...
Microsoft has published the exploit code for a vulnerability in macOS that could help an attacker bypass sandbox restrictions and run code on the system. The...
Uniswap, a popular decentralized cryptocurrency exchange, lost close to $8 million worth of Ethereum in a sophisticated phishing attack yesterday. While the protocol hasn’t been compromised by...
Seasoned fraud expert PJ Rohall has recently become the new Head of Fraud Strategy & Education at SEON. In this Help Net Security interview, he talks about...
https://player.vimeo.com/video/727305638?h=a77d3029b9&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Cyber resilience is a top priority for global organizations. Understanding threats plays a key role in building and maintaining a strong layered security approach, according to...
INTERVIEW Jon von Tetzchner has launched not one, but two web browser companies in his career. Today, he is CEO of Vivaldi Technologies, the business behind the Vivaldi browser, which...
The UEFI firmware used in several laptops made by Lenovo is vulnerable to three buffer overflow vulnerabilities that could enable attackers to hijack the startup routine...