Source: helpnetsecurity.com

New requirements for the secure design and development of modern payment software - Cyber security news

New requirements for the secure design and development of modern payment software

Encryption is key to protecting information as it travels outside the network - Cyber security news

Encryption is key to protecting information as it travels outside the network

Strategies for expertly protecting industrial control systems - Cyber security news

Strategies for expertly protecting industrial control systems

There’s a sizable gap between confidence in security programs and their effectiveness - Cyber security news

There’s a sizable gap between confidence in security programs and their effectiveness

Juniper releases barrage of security fixes for security, networking devices - Cyber security news

Juniper releases barrage of security fixes for security, networking devices

G Suite warns admins about domain data exfiltration attempts - Cyber security news

G Suite warns admins about domain data exfiltration attempts

Encryption backdoors open a Pandora’s Box for cybersecurity - Cyber security news

Encryption backdoors open a Pandora’s Box for cybersecurity

Popular coding advice doesn’t necessarily equal secure coding advice - Cyber security news

Popular coding advice doesn’t necessarily equal secure coding advice

Most popular home routers lack basic software security features - Cyber security news

Most popular home routers lack basic software security features

The average PC gamer has experienced almost 5 cyberattacks due to poor security habits - Cyber security news

The average PC gamer has experienced almost 5 cyberattacks due to poor security habits

Why are some vulnerabilities disclosed responsibly while others are not? - Cyber security news

Why are some vulnerabilities disclosed responsibly while others are not?

Insight into the growing problem of highly sophisticated fraud - Cyber security news

Insight into the growing problem of highly sophisticated fraud

Hackers have become increasingly deft at stealing student data - Cyber security news

Hackers have become increasingly deft at stealing student data

Vulnerabilities in high-performance computer chips could lead to failures in modern electronics - Cyber security news

Vulnerabilities in high-performance computer chips could lead to failures in modern electronics

Attackers increasingly exploiting vulnerabilities to enlarge their IoT botnets - Cyber security news

Attackers increasingly exploiting vulnerabilities to enlarge their IoT botnets

Deception technology: Authenticity and why it matters - Cyber security news

Deception technology: Authenticity and why it matters