Zeljka Zorz
![macOS Mojave](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100129/macos-mojave-400x200.png)
Security and privacy improvements in macOS Mojave
Apple has released macOS Mojave, which comes with a new Dark Mode, a redesigned Mac App Store, and many new and modified features. It also sports changes aimed at enhancing …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102056/google_play-400x200.jpg)
Stealthy cryptomining apps still on Google Play
Researchers have flagged 25 apps on Google Play that are surreptitiously mining cryptocurrency for their developers, and some of these have still not been removed, they warn. …
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100145/complex-400x200.jpg)
Why security products should be more actionable for users
As an active angel investor in companies that want to bring new security technology into the market, Azi Cohen is most likely to be persuaded to invest by three things: an …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112340/lock-400x200.jpg)
French cybersecurity agency open sources security hardened CLIP OS
After developing it internally for over 10 years, the National Cybersecurity Agency of France (ANSSI) has decided to open source CLIP OS, a Linux-based operating system …
![online shop owned](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110341/online-shop-owned-400x200.jpg)
New Magecart victims ABS-CBN and Newegg are just the tip of the iceberg
With the Magecart attackers compromising web shops left and right, online shopping is becoming a risky proposition. After Ticketmaster, British Airways and Feedify, two new …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100155/bot-400x200.jpg)
How do you protect digital channels from cyber threats?
A well-thought out and managed social media presence is a must for most companies and their workforce, but too few of them think about the potential repercussions of an attack …
![Google Play malware](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102058/google_play_malware2-400x200.jpg)
Bogus finance apps on Google Play target users worldwide
ESET researchers have discovered malicious apps impersonating various financial services and the Austrian cryptocurrency exchange Bitpanda on Google Play. The fake apps …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112101/facebook-400x200.jpg)
Facebook offers bounties for user token bugs in third-party apps, websites
Facebook is expanding its bug bounty program to include vulnerabilities in third-party apps and websites that involve improper exposure of Facebook user access tokens. …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101001/apple-400x200.jpg)
Improved features and security fixes in iOS 12, watchOS 5, tvOS 12, and Safari 12
Apple has released new versions of iOS, watchOS, tvOS and Safari and has plugged a number of security holes in each. iOS 12 iOS 12 comes with improved usability, stability, …
![stock price](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104355/stock_price-400x200.jpeg)
Data breaches make companies underperform the market in the long run
While the share prices of companies that experienced a sizeable/huge data breach suffer just a temporary hit, in the long term breached companies underperformed the market, an …
![files](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110451/files-400x200.jpg)
Preventing exfiltration of sensitive docs by flooding systems with hard-to-detect fakes
A group of researchers from Queen’s University (Canada) have proposed a new approach for keeping important documents safe: creating so many believable fakes that …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103140/google_chrome-400x200.jpg)
Tech support scammers leverage “evil cursor” technique to “lock” Chrome
Tech scammers are constantly coming up with new techniques to make users panic and seek their bogus services. The latest one, documented by Malwarebytes researchers, has been …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)