Zeljka Zorz
![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114042/mobile-400x200.jpg)
Apple fixes FaceTime eavesdropping bug, two iOS zero-days
Apple has pushed out critical security updates for iOS and macOS, which fix the “Facepalm” FaceTime eavesdropping bug but also two zero-day flaws that, according …
![working](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095257/working-400x200.jpeg)
How today’s workforce stays secure and what apps it prefers
User-focused security apps KnowBe4, LastPass, and Proofpoint dominate the list of fastest growing apps within enterprises, according to Okta. “KnowBe4 in particular is …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100613/EU-lock2-400x200.jpg)
8 months of GDPR: 59,000+ reported breaches, 91 fines
A little over eight months have passed since the EU General Data Protection Regulation (GDPR) became enforceable, but it’s becoming clear that sweeping data breaches …
![LibreOffice](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111701/libreoffice-400x200.jpg)
Malicious macros can trigger RCE in LibreOffice, OpenOffice
Achieving remote code execution on systems running LibreOffice or Apache OpenOffice might be as easy as tricking users into opening a malicious ODT (OpenDocument) file and …
![802 Secure](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101039/iot-risks-802secure-400x200.jpg)
The problem with vulnerable IoT companion apps
There’s no shortage of exploitable security holes in widely used Internet of Things devices, so it shouldn’t come as a surprise that the communication between many …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105208/alert-400x200.jpg)
Google’s new Chrome extension flags insecure passwords
As the number of compromised and leaked credentials rises inexorably with each passing day, Google has decided to help users choose safe combinations for all their online …
![Tribe of Hackers](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095301/tribe_of_hackers-400x200.jpg)
70 real-life hackers and cybersecurity practitioners share their personal insights
Entering the information security industry can be a formidable undertaking and renowned professionals often seem larger than life and unapproachable (even though most are on …
![Magento](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100304/magento-400x200.jpg)
Most Magento shops get compromised via vulnerable extensions
Vulnerable third party extensions (modules) are now the main source of Magento hacks, says security researcher and Magento forensics investigator Willem de Groot. “The …
![Phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112408/phone-red-400x200.jpg)
Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users
5G cellular mobile communications, when implemented, are expected to provide high bandwidth, low latency, energy savings, better connectivity, but security and privacy must …
![Mac malware](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095317/mac-malware2-400x200.jpg)
New Mac malware steals cookies, cryptocurrency and computing power
A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. About the …
![Google hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103340/google-hand-400x200.jpg)
Google also abused its Apple developer certificate to collect iOS user data
It turns out that Google, like Facebook, abused its Apple Enterprise Developer Certificate to distribute a data collection app to iOS users, in direct contravention of …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
Microsoft rolls out new tools for enterprise security and compliance teams
Microsoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 security and compliance centers The new …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history