Addigy exposes RSR update gap in 25% of managed macOS devices

Addigy released a report that Apple RSR updates are not being deployed in about 25% of macOS devices within managed environments. Learn more. The post Addigy exposes RSR update... Read more »

Enhancing open source security: Insights from the OpenSSF on addressing key challenges

In this Help Net Security interview, we meet a prominent industry leader. Brian Behlendorf, CTO at the Open Source Security Foundation (OpenSSF), shares insights on the influence of his... Read more »

Top 10 facial recognition software vendors for 2023

Learn about the top facial recognition technology vendors. Find out how it works, what it can and can’t do, and its current state. The post Top 10 facial recognition... Read more »

Scammers exploit AI trend with fake ChatGPT apps on Google Play, Apple App Store

Sophos researchers uncovered multiple apps masquerading as legitimate, ChatGPT-based chatbots to overcharge users. These apps have popped up in the Google Play and Apple App Store. Because the free... Read more »

Malicious open-source components threatening digital infrastructure

A new risk emerges in the digital era, where open-source software has become a fundamental pillar in developing innovative applications. The threat? Malicious open-source components. In this Help Net... Read more »

Sticking to traditional security playbook is mistake for cloud security: Palo Alto Networks SVP

Ankur Shah of Palo Alto Networks’ Prisma Cloud security platform says he sees a bright future for AI in security operations, but not so much for DevOps using many... Read more »

The top 6 enterprise VPN solutions to use in 2023

Enterprise VPNs are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about six viable choices for businesses. The... Read more »

Google combats AI misinformation with Search labels, adds dark web security upgrades

Artificial intelligence art service Midjourney and Shutterstock will identify their computer-generated images in Google Search. The post Google combats AI misinformation with Search labels, adds dark web security upgrades... Read more »

How cyberstalkers could access your iPhone using the Windows Phone Link app

Someone who gains physical access to an iPhone or Android phone could use the Phone Link app to spy on the user’s text messages, phone calls and notifications, says... Read more »

How to remove specific cookies from Microsoft Edge

A corrupted cookie could block access to a site. You could delete all Microsoft Edge cookies to solve the problem, but that isn’t necessary. The post How to remove... Read more »
Subscribe to our Newsletter